Create Interactive Tour

Windows Analysis Report
Snipping Tool Plus - CHIP Installer _Pvujx.exe

Overview

General Information

Sample Name:Snipping Tool Plus - CHIP Installer _Pvujx.exe
Analysis ID:779040
MD5:f5980f17f44da870072c5ce396eb01bf
SHA1:22ce208acb16875cdd9d42a794557a56068220c2
SHA256:2f9079df89e96a997a910f9243173ac60bfe625501452152f8ab281778e5696b
Infos:

Detection

Score:28
Range:0 - 100
Whitelisted:false
Confidence:20%

Compliance

Score:62
Range:0 - 100

Signatures

Multi AV Scanner detection for submitted file
Writes to foreign memory regions
Tries to harvest and steal browser information (history, passwords, etc)
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
PE file contains sections with non-standard names
Creates processes with suspicious names
Found dropped PE file which has not been started or loaded
Contains long sleeps (>= 3 min)
Abnormal high CPU Usage
Is looking for software installed on the system
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Drops files with a non-matching file extension (content does not match file extension)
Allocates memory with a write watch (potentially for evading sandboxes)
Drops PE files
PE file contains more sections than normal
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious

Analysis Advice

Sample drops PE files which have not been started, submit dropped PE samples for a secondary analysis to Joe Sandbox
Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior
Uses HTTPS for network communication, use the 'Proxy HTTPS (port 443) to read its encrypted data' cookbook for further analysis
Sample monitors window changes (e.g. starting applications), analyze the sample with the 'Simulates keyboard and window changes' cookbook
  • System is w10x64_ra
  • Snipping Tool Plus - CHIP Installer _Pvujx.exe (PID: 1592 cmdline: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exe MD5: F5980F17F44DA870072C5CE396EB01BF)
    • explorer.exe (PID: 6400 cmdline: C:\Windows\explorer.exe" /n /select,"C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429.exe.lnk MD5: D7874DD30BA935AAED6F730A0ED84610)
    • explorer.exe (PID: 6584 cmdline: C:\Windows\explorer.exe" /select,"C:\Users\alfredo\Downloads\SnippingToolPlusv3-4-1-0.zip MD5: D7874DD30BA935AAED6F730A0ED84610)
  • explorer.exe (PID: 6432 cmdline: C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding MD5: D7874DD30BA935AAED6F730A0ED84610)
    • outsrf220429.exe (PID: 6476 cmdline: "C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429.exe" null MD5: 2670D3FCFECE2FA02CBE00AF6E462BFA)
      • conhost.exe (PID: 6484 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: C5E9B1D1103EDCEA2E408E9497A5A88F)
      • 133174844577776824.exe (PID: 6560 cmdline: C:\Users\alfredo\AppData\Roaming\stubinstaller\133174844577776824.exe MD5: 98BDFFE59B649724E7DB0148DC3A3CC8)
        • chrome.exe (PID: 1568 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-gpu --new-window https://chrome.google.com/webstore/detail/outsurf/eiamiknkelfkfombkabmpdanicllfohk MD5: 7BC7B4AEDC055BB02BCB52710132E9E1)
          • chrome.exe (PID: 2516 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2056 --field-trial-handle=1700,i,7417051785048858462,14921285242444709930,131072 /prefetch:8 MD5: 7BC7B4AEDC055BB02BCB52710132E9E1)
  • explorer.exe (PID: 6624 cmdline: C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding MD5: D7874DD30BA935AAED6F730A0ED84610)
  • cleanup
SourceRuleDescriptionAuthorStrings
C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429_exe.partsSUSP_XORed_MozillaDetects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key.Florian Roth
  • 0x58bd1:$xo1: ^\x13|\x13i\x13z\x13\x7F\x13\x7F\x13r\x13<\x13&\x13=\x13#\x13
  • 0x216ed8:$xo1: ^\x13|\x13i\x13z\x13\x7F\x13\x7F\x13r\x13<\x13&\x13=\x13#\x13
C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429_exe.partsSUSP_XORed_MozillaDetects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key.Florian Roth
  • 0x58bd1:$xo1: ^\x13|\x13i\x13z\x13\x7F\x13\x7F\x13r\x13<\x13&\x13=\x13#\x13
  • 0x216ed8:$xo1: ^\x13|\x13i\x13z\x13\x7F\x13\x7F\x13r\x13<\x13&\x13=\x13#\x13
C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429_exe.partsSUSP_XORed_MozillaDetects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key.Florian Roth
  • 0x58bd1:$xo1: ^\x13|\x13i\x13z\x13\x7F\x13\x7F\x13r\x13<\x13&\x13=\x13#\x13
  • 0x216ed8:$xo1: ^\x13|\x13i\x13z\x13\x7F\x13\x7F\x13r\x13<\x13&\x13=\x13#\x13
SourceRuleDescriptionAuthorStrings
0000000E.00000000.1625584276.000001979EBC2000.00000002.00000001.01000000.00000011.sdmpSUSP_XORed_MozillaDetects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key.Florian Roth
  • 0x589d1:$xo1: ^\x13|\x13i\x13z\x13\x7F\x13\x7F\x13r\x13<\x13&\x13=\x13#\x13
  • 0x216cd8:$xo1: ^\x13|\x13i\x13z\x13\x7F\x13\x7F\x13r\x13<\x13&\x13=\x13#\x13
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Snipping Tool Plus - CHIP Installer _Pvujx.exeVirustotal: Detection: 11%Perma Link
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeRegistry value created: HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION Snipping Tool Plus - CHIP Installer _Pvujx.exe

Compliance

barindex
Source: unknownHTTPS traffic detected: 83.125.106.237:443 -> 192.168.2.3:49714 version: TLS 1.2
Source: unknownHTTPS traffic detected: 83.125.106.237:443 -> 192.168.2.3:49715 version: TLS 1.2
Source: unknownHTTPS traffic detected: 83.125.106.237:443 -> 192.168.2.3:49718 version: TLS 1.2
Source: unknownHTTPS traffic detected: 83.125.106.237:443 -> 192.168.2.3:49717 version: TLS 1.2
Source: unknownHTTPS traffic detected: 83.125.106.237:443 -> 192.168.2.3:49716 version: TLS 1.2
Source: unknownHTTPS traffic detected: 83.125.106.237:443 -> 192.168.2.3:49719 version: TLS 1.2
Source: unknownHTTPS traffic detected: 83.125.106.237:443 -> 192.168.2.3:49720 version: TLS 1.2
Source: unknownHTTPS traffic detected: 83.125.106.237:443 -> 192.168.2.3:49721 version: TLS 1.2
Source: unknownHTTPS traffic detected: 83.125.106.237:443 -> 192.168.2.3:49723 version: TLS 1.2
Source: unknownHTTPS traffic detected: 83.125.106.237:443 -> 192.168.2.3:49722 version: TLS 1.2
Source: unknownHTTPS traffic detected: 83.125.106.237:443 -> 192.168.2.3:49724 version: TLS 1.2
Source: unknownHTTPS traffic detected: 83.125.106.237:443 -> 192.168.2.3:49726 version: TLS 1.2
Source: unknownHTTPS traffic detected: 83.125.106.237:443 -> 192.168.2.3:49725 version: TLS 1.2
Source: unknownHTTPS traffic detected: 83.125.106.237:443 -> 192.168.2.3:49731 version: TLS 1.2
Source: unknownHTTPS traffic detected: 185.212.44.250:443 -> 192.168.2.3:49733 version: TLS 1.2
Source: unknownHTTPS traffic detected: 185.26.182.112:443 -> 192.168.2.3:49732 version: TLS 1.2
Source: unknownHTTPS traffic detected: 185.212.44.250:443 -> 192.168.2.3:49738 version: TLS 1.2
Source: unknownHTTPS traffic detected: 185.158.249.69:443 -> 192.168.2.3:49742 version: TLS 1.2
Source: unknownHTTPS traffic detected: 83.125.106.237:443 -> 192.168.2.3:49743 version: TLS 1.2
Source: unknownHTTPS traffic detected: 83.125.106.237:443 -> 192.168.2.3:49744 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.208.31.180:443 -> 192.168.2.3:49746 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.208.31.180:443 -> 192.168.2.3:49747 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.208.31.180:443 -> 192.168.2.3:49748 version: TLS 1.2
Source: unknownHTTPS traffic detected: 3.122.207.2:443 -> 192.168.2.3:49749 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.208.31.180:443 -> 192.168.2.3:49750 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.208.31.180:443 -> 192.168.2.3:49751 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.57.167.243:443 -> 192.168.2.3:49754 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.208.31.180:443 -> 192.168.2.3:49767 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.208.31.180:443 -> 192.168.2.3:49768 version: TLS 1.2
Source: Snipping Tool Plus - CHIP Installer _Pvujx.exeStatic PE information: certificate valid
Source: Snipping Tool Plus - CHIP Installer _Pvujx.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownDNS traffic detected: queries for: chip-cluster.de
Source: global trafficHTTP traffic detected: GET /gfx/progress/BitGuardian/PPD_Bit-Driver-Updater_1.png HTTP/1.1Accept: */*Accept-Language: en-US,en;q=0.5User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoUA-CPU: AMD64Accept-Encoding: gzip, deflateHost: static.chip-secured-download.deConnection: Keep-Alive
Source: unknownHTTPS traffic detected: 83.125.106.237:443 -> 192.168.2.3:49714 version: TLS 1.2
Source: unknownHTTPS traffic detected: 83.125.106.237:443 -> 192.168.2.3:49715 version: TLS 1.2
Source: unknownHTTPS traffic detected: 83.125.106.237:443 -> 192.168.2.3:49718 version: TLS 1.2
Source: unknownHTTPS traffic detected: 83.125.106.237:443 -> 192.168.2.3:49717 version: TLS 1.2
Source: unknownHTTPS traffic detected: 83.125.106.237:443 -> 192.168.2.3:49716 version: TLS 1.2
Source: unknownHTTPS traffic detected: 83.125.106.237:443 -> 192.168.2.3:49719 version: TLS 1.2
Source: unknownHTTPS traffic detected: 83.125.106.237:443 -> 192.168.2.3:49720 version: TLS 1.2
Source: unknownHTTPS traffic detected: 83.125.106.237:443 -> 192.168.2.3:49721 version: TLS 1.2
Source: unknownHTTPS traffic detected: 83.125.106.237:443 -> 192.168.2.3:49723 version: TLS 1.2
Source: unknownHTTPS traffic detected: 83.125.106.237:443 -> 192.168.2.3:49722 version: TLS 1.2
Source: unknownHTTPS traffic detected: 83.125.106.237:443 -> 192.168.2.3:49724 version: TLS 1.2
Source: unknownHTTPS traffic detected: 83.125.106.237:443 -> 192.168.2.3:49726 version: TLS 1.2
Source: unknownHTTPS traffic detected: 83.125.106.237:443 -> 192.168.2.3:49725 version: TLS 1.2
Source: unknownHTTPS traffic detected: 83.125.106.237:443 -> 192.168.2.3:49731 version: TLS 1.2
Source: unknownHTTPS traffic detected: 185.212.44.250:443 -> 192.168.2.3:49733 version: TLS 1.2
Source: unknownHTTPS traffic detected: 185.26.182.112:443 -> 192.168.2.3:49732 version: TLS 1.2
Source: unknownHTTPS traffic detected: 185.212.44.250:443 -> 192.168.2.3:49738 version: TLS 1.2
Source: unknownHTTPS traffic detected: 185.158.249.69:443 -> 192.168.2.3:49742 version: TLS 1.2
Source: unknownHTTPS traffic detected: 83.125.106.237:443 -> 192.168.2.3:49743 version: TLS 1.2
Source: unknownHTTPS traffic detected: 83.125.106.237:443 -> 192.168.2.3:49744 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.208.31.180:443 -> 192.168.2.3:49746 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.208.31.180:443 -> 192.168.2.3:49747 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.208.31.180:443 -> 192.168.2.3:49748 version: TLS 1.2
Source: unknownHTTPS traffic detected: 3.122.207.2:443 -> 192.168.2.3:49749 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.208.31.180:443 -> 192.168.2.3:49750 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.208.31.180:443 -> 192.168.2.3:49751 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.57.167.243:443 -> 192.168.2.3:49754 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.208.31.180:443 -> 192.168.2.3:49767 version: TLS 1.2
Source: unknownHTTPS traffic detected: 52.208.31.180:443 -> 192.168.2.3:49768 version: TLS 1.2
Source: 0000000E.00000000.1625584276.000001979EBC2000.00000002.00000001.01000000.00000011.sdmp, type: MEMORYMatched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key., score = , reference = https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force(), modified = 2022-05-13
Source: C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429_exe.parts, type: DROPPEDMatched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key., score = , reference = https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force(), modified = 2022-05-13
Source: C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429_exe.parts, type: DROPPEDMatched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key., score = , reference = https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force(), modified = 2022-05-13
Source: C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429_exe.parts, type: DROPPEDMatched rule: SUSP_XORed_Mozilla date = 2019-10-28, author = Florian Roth, description = Detects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key., score = , reference = https://gchq.github.io/CyberChef/#recipe=XOR_Brute_Force(), modified = 2022-05-13
Source: C:\Users\alfredo\AppData\Roaming\stubinstaller\133174844577776824.exeProcess Stats: CPU usage > 98%
Source: Snipping Tool Plus - CHIP Installer _Pvujx.exeStatic PE information: Number of sections : 11 > 10
Source: Snipping Tool Plus - CHIP Installer _Pvujx.exeVirustotal: Detection: 11%
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeFile read: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exe
Source: Snipping Tool Plus - CHIP Installer _Pvujx.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: unknownProcess created: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exe C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exe
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exe" /n /select,"C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429.exe.lnk
Source: unknownProcess created: C:\Windows\explorer.exe
Source: C:\Windows\explorer.exeProcess created: C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429.exe "C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429.exe" null
Source: C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429.exeProcess created: C:\Users\alfredo\AppData\Roaming\stubinstaller\133174844577776824.exe C:\Users\alfredo\AppData\Roaming\stubinstaller\133174844577776824.exe
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exe" /select,"C:\Users\alfredo\Downloads\SnippingToolPlusv3-4-1-0.zip
Source: unknownProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
Source: C:\Windows\explorer.exeProcess created: C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429.exe "C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429.exe" null
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exe" /n /select,"C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429.exe.lnk
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exe" /select,"C:\Users\alfredo\Downloads\SnippingToolPlusv3-4-1-0.zip
Source: C:\Users\alfredo\AppData\Roaming\stubinstaller\133174844577776824.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-gpu --new-window https://chrome.google.com/webstore/detail/outsurf/eiamiknkelfkfombkabmpdanicllfohk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2056 --field-trial-handle=1700,i,7417051785048858462,14921285242444709930,131072 /prefetch:8
Source: C:\Users\alfredo\AppData\Roaming\stubinstaller\133174844577776824.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-gpu --new-window https://chrome.google.com/webstore/detail/outsurf/eiamiknkelfkfombkabmpdanicllfohk
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2056 --field-trial-handle=1700,i,7417051785048858462,14921285242444709930,131072 /prefetch:8
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{9FC8E510-A27C-4B3B-B9A3-BF65F00256A8}\InProcServer32
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeFile created: C:\Users\alfredo\AppData\Local\Microsoft\Windows\INetCache\IE\98S549LJ\easyprogresscampaign-progress-bitsolucians[1].htm
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeFile created: C:\Users\alfredo\AppData\Local\Temp\temp.html
Source: classification engineClassification label: sus28.spyw.winEXE@25/18@38/132
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeFile read: C:\Windows\win.ini
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
Source: C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ec23d1294499b4ffba61f212cb1217cd\mscorlib.ni.dll
Source: C:\Users\alfredo\AppData\Roaming\stubinstaller\133174844577776824.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ec23d1294499b4ffba61f212cb1217cd\mscorlib.ni.dll
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeMutant created: \Sessions\1\BaseNamedObjects\600103638113301
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6484:120:WilError_02
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeProcess created: C:\Windows\explorer.exe
Source: unknownProcess created: C:\Windows\explorer.exe
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeProcess created: C:\Windows\explorer.exe
Source: unknownProcess created: C:\Windows\explorer.exe
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeProcess created: C:\Windows\explorer.exe
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeProcess created: C:\Windows\explorer.exe
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeFile read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeFile read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeFile read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeFile read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeFile read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeFile read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Users\alfredo\AppData\Roaming\stubinstaller\133174844577776824.exeFile read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Users\alfredo\AppData\Roaming\stubinstaller\133174844577776824.exeFile read: C:\Windows\System32\drivers\etc\hosts
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWindow found: window name: TButton
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: Snipping Tool Plus - CHIP Installer _Pvujx.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: Snipping Tool Plus - CHIP Installer _Pvujx.exeStatic file information: File size 5331520 > 1048576
Source: Snipping Tool Plus - CHIP Installer _Pvujx.exeStatic PE information: certificate valid
Source: Snipping Tool Plus - CHIP Installer _Pvujx.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x40aa00
Source: Snipping Tool Plus - CHIP Installer _Pvujx.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: Snipping Tool Plus - CHIP Installer _Pvujx.exeStatic PE information: section name: .didata
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeFile created: \snipping tool plus - chip installer _pvujx.exe
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeFile created: \snipping tool plus - chip installer _pvujx.exe
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeFile created: \snipping tool plus - chip installer _pvujx.exe
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeFile created: \snipping tool plus - chip installer _pvujx.exe
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeFile created: C:\Users\alfredo\AppData\Local\Temp\avira_de_sptl1___chip-spotlight-release_exe_3162023214094295883251\avira_de_sptl1___chip-spotlight-release_exe.partsJump to dropped file
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeFile created: C:\Users\alfredo\AppData\Local\Temp\OperaSetup_exe_3162023214092374826251\OperaSetup_exe.partsJump to dropped file
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeFile created: C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429_exe.partsJump to dropped file
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeFile created: C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429.exe (copy)Jump to dropped file
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeFile created: C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429_exe.partsJump to dropped file
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeFile created: C:\Users\alfredo\AppData\Local\Temp\avira_de_sptl1___chip-spotlight-release_exe_3162023214094295883251\avira_de_sptl1___chip-spotlight-release_exe.partsJump to dropped file
Source: C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429.exeFile created: C:\Users\alfredo\AppData\Roaming\stubinstaller\vcruntime140.dllJump to dropped file
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeFile created: C:\Users\alfredo\AppData\Local\Temp\OperaSetup_exe_3162023214092374826251\OperaSetup.exe (copy)Jump to dropped file
Source: C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429.exeFile created: C:\Users\alfredo\AppData\Roaming\stubinstaller\133174844577776824.exeJump to dropped file
Source: C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429.exeFile created: C:\Users\alfredo\AppData\Roaming\stubinstaller\msvcp140.dllJump to dropped file
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeFile created: C:\Users\alfredo\AppData\Local\Temp\OperaSetup_exe_3162023214092374826251\OperaSetup_exe.partsJump to dropped file
Source: C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429.exeFile created: C:\Users\alfredo\AppData\Roaming\stubinstaller\vcruntime140_1.dllJump to dropped file
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeFile created: C:\Users\alfredo\AppData\Local\Temp\avira_de_sptl1___chip-spotlight-release_exe_3162023214094295883251\avira_de_sptl1___chip-spotlight-release.exe (copy)Jump to dropped file
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdate
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\alfredo\AppData\Roaming\stubinstaller\133174844577776824.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\alfredo\AppData\Roaming\stubinstaller\133174844577776824.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\alfredo\AppData\Roaming\stubinstaller\133174844577776824.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\alfredo\AppData\Roaming\stubinstaller\133174844577776824.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\alfredo\AppData\Roaming\stubinstaller\133174844577776824.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\alfredo\AppData\Roaming\stubinstaller\133174844577776824.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\alfredo\AppData\Roaming\stubinstaller\133174844577776824.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\alfredo\AppData\Roaming\stubinstaller\133174844577776824.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\alfredo\AppData\Roaming\stubinstaller\133174844577776824.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\alfredo\AppData\Roaming\stubinstaller\133174844577776824.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\alfredo\AppData\Roaming\stubinstaller\133174844577776824.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\alfredo\AppData\Roaming\stubinstaller\133174844577776824.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\alfredo\AppData\Roaming\stubinstaller\133174844577776824.exe TID: 6868Thread sleep time: -150000s >= -30000s
Source: C:\Users\alfredo\AppData\Roaming\stubinstaller\133174844577776824.exe TID: 6916Thread sleep time: -60000s >= -30000s
Source: C:\Users\alfredo\AppData\Roaming\stubinstaller\133174844577776824.exe TID: 6872Thread sleep time: -30000s >= -30000s
Source: C:\Users\alfredo\AppData\Roaming\stubinstaller\133174844577776824.exe TID: 6580Thread sleep time: -922337203685477s >= -30000s
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeDropped PE file which has not been started: C:\Users\alfredo\AppData\Local\Temp\avira_de_sptl1___chip-spotlight-release_exe_3162023214094295883251\avira_de_sptl1___chip-spotlight-release_exe.partsJump to dropped file
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeDropped PE file which has not been started: C:\Users\alfredo\AppData\Local\Temp\OperaSetup_exe_3162023214092374826251\OperaSetup.exe (copy)Jump to dropped file
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeDropped PE file which has not been started: C:\Users\alfredo\AppData\Local\Temp\OperaSetup_exe_3162023214092374826251\OperaSetup_exe.partsJump to dropped file
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeDropped PE file which has not been started: C:\Users\alfredo\AppData\Local\Temp\avira_de_sptl1___chip-spotlight-release_exe_3162023214094295883251\avira_de_sptl1___chip-spotlight-release.exe (copy)Jump to dropped file
Source: C:\Users\alfredo\AppData\Roaming\stubinstaller\133174844577776824.exeThread delayed: delay time: 922337203685477
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeRegistry key enumerated: More than 105 enums for key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeRegistry key enumerated: More than 175 enums for key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeRegistry key enumerated: More than 175 enums for key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeRegistry key enumerated: More than 175 enums for key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeRegistry key enumerated: More than 175 enums for key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeRegistry key enumerated: More than 175 enums for key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeRegistry key enumerated: More than 175 enums for key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeRegistry key enumerated: More than 175 enums for key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWindow / User API: threadDelayed 805
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeMemory allocated: 6F20000 memory reserve | memory write watch
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeMemory allocated: 7020000 memory commit | memory reserve | memory write watch
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeMemory allocated: 7280000 memory commit | memory reserve | memory write watch
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeMemory allocated: 72A0000 memory commit | memory reserve | memory write watch
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeMemory allocated: 72C0000 memory commit | memory reserve | memory write watch
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeMemory allocated: AEE0000 memory commit | memory reserve | memory write watch
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeMemory allocated: AF00000 memory reserve | memory write watch
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeProcess information queried: ProcessInformation
Source: C:\Users\alfredo\AppData\Roaming\stubinstaller\133174844577776824.exeThread delayed: delay time: 922337203685477
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeMemory allocated: page read and write | page guard

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429.exeMemory written: C:\Users\alfredo\AppData\Roaming\stubinstaller\133174844577776824.exe base: 4010B0B2D8
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exe" /n /select,"C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429.exe.lnk
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeProcess created: C:\Windows\explorer.exe C:\Windows\explorer.exe" /select,"C:\Users\alfredo\Downloads\SnippingToolPlusv3-4-1-0.zip
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation
Source: C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429.exeQueries volume information: C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429.exe VolumeInformation
Source: C:\Users\alfredo\AppData\Roaming\stubinstaller\133174844577776824.exeQueries volume information: C:\Users\alfredo\AppData\Roaming\stubinstaller\133174844577776824.exe VolumeInformation
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiSpywareProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiSpywareProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiSpywareProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiSpywareProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiSpywareProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiSpywareProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiSpywareProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiSpywareProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiSpywareProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiSpywareProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiSpywareProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiSpywareProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiSpywareProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiSpywareProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiSpywareProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiSpywareProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiSpywareProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiSpywareProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiSpywareProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiSpywareProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiSpywareProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiSpywareProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiSpywareProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiSpywareProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiSpywareProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiSpywareProduct
Source: C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exeRegistry value created: HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION

Stealing of Sensitive Information

barindex
Source: C:\Users\alfredo\AppData\Roaming\stubinstaller\133174844577776824.exeFile opened: C:\Users\alfredo\AppData\Roaming\Mozilla\Firefox\profiles.ini
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid Accounts1
Windows Management Instrumentation
Path Interception111
Process Injection
11
Masquerading
1
OS Credential Dumping
1
Query Registry
Remote Services1
Data from Local System
Exfiltration Over Other Network Medium2
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default Accounts1
Scripting
Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Modify Registry
LSASS Memory1
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
Ingress Tool Transfer
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
Disable or Modify Tools
Security Account Manager11
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
Non-Application Layer Protocol
Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)31
Virtualization/Sandbox Evasion
NTDS31
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput CaptureScheduled Transfer3
Application Layer Protocol
SIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script111
Process Injection
LSA Secrets1
Application Window Discovery
SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Replication Through Removable MediaLaunchdRc.commonRc.common1
Scripting
Cached Domain Credentials1
Remote System Discovery
VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync1
File and Directory Discovery
Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem21
System Information Discovery
Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Snipping Tool Plus - CHIP Installer _Pvujx.exe4%ReversingLabs
Snipping Tool Plus - CHIP Installer _Pvujx.exe11%VirustotalBrowse
SourceDetectionScannerLabelLink
C:\Users\alfredo\AppData\Local\Temp\avira_de_sptl1___chip-spotlight-release_exe_3162023214094295883251\avira_de_sptl1___chip-spotlight-release.exe (copy)8%ReversingLabs
C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429.exe (copy)0%ReversingLabs
C:\Users\alfredo\AppData\Roaming\stubinstaller\133174844577776824.exe0%ReversingLabs
C:\Users\alfredo\AppData\Roaming\stubinstaller\msvcp140.dll0%ReversingLabs
C:\Users\alfredo\AppData\Roaming\stubinstaller\vcruntime140.dll0%ReversingLabs
C:\Users\alfredo\AppData\Roaming\stubinstaller\vcruntime140_1.dll0%ReversingLabs
No Antivirus matches
SourceDetectionScannerLabelLink
chip-cluster.de1%VirustotalBrowse
www.trustedoffers.de1%VirustotalBrowse
static.chip-secured-download.de0%VirustotalBrowse
api.trustedoffers.de1%VirustotalBrowse
SourceDetectionScannerLabelLink
http://static.chip-secured-download.de/gfx/progress/BitGuardian/PPD_Bit-Driver-Updater_1.png0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
accounts.google.com
172.217.18.109
truefalse
    high
    eu.net.opera.com
    185.26.182.112
    truefalse
      high
      api.trustedoffers.de
      185.158.249.69
      truefalseunknown
      outsurf.net
      52.57.167.243
      truefalse
        unknown
        www.oschwecke.com
        3.122.207.2
        truefalse
          unknown
          sni1gl.wpc.nucdn.net
          152.199.21.175
          truefalse
            unknown
            www.trustedoffers.de
            185.212.44.250
            truefalseunknown
            albapigateway01-907695634.eu-central-1.elb.amazonaws.com
            52.57.151.95
            truefalse
              high
              www3.l.google.com
              172.217.18.14
              truefalse
                high
                static.chip-secured-download.de
                116.203.169.156
                truefalseunknown
                chip-cluster.de
                83.125.106.237
                truefalseunknown
                www.google.com
                142.250.185.164
                truefalse
                  high
                  yanalogyone.com
                  52.208.31.180
                  truefalse
                    unknown
                    api.mixpanel.com
                    130.211.34.183
                    truefalse
                      high
                      clients.l.google.com
                      172.217.16.206
                      truefalse
                        high
                        package.avira.com
                        unknown
                        unknownfalse
                          high
                          net.geo.opera.com
                          unknown
                          unknownfalse
                            high
                            downloaderapi.chip.de
                            unknown
                            unknownfalse
                              high
                              clients2.google.com
                              unknown
                              unknownfalse
                                high
                                www.chip.de
                                unknown
                                unknownfalse
                                  high
                                  chrome.google.com
                                  unknown
                                  unknownfalse
                                    high
                                    api.my.avira.com
                                    unknown
                                    unknownfalse
                                      high
                                      securedl.cdn.chip.de
                                      unknown
                                      unknownfalse
                                        high
                                        NameMaliciousAntivirus DetectionReputation
                                        http://static.chip-secured-download.de/gfx/progress/BitGuardian/PPD_Bit-Driver-Updater_1.pngfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs
                                        IPDomainCountryFlagASNASN NameMalicious
                                        83.125.106.237
                                        chip-cluster.deEuropean Union
                                        198710UUU-TELECOM-ASDEfalse
                                        34.104.35.123
                                        unknownUnited States
                                        15169GOOGLEUSfalse
                                        1.1.1.1
                                        unknownAustralia
                                        13335CLOUDFLARENETUSfalse
                                        2.23.193.81
                                        unknownEuropean Union
                                        1273CWVodafoneGroupPLCEUfalse
                                        3.122.207.2
                                        www.oschwecke.comUnited States
                                        16509AMAZON-02USfalse
                                        52.57.167.243
                                        outsurf.netUnited States
                                        16509AMAZON-02USfalse
                                        172.217.16.206
                                        clients.l.google.comUnited States
                                        15169GOOGLEUSfalse
                                        172.217.18.14
                                        www3.l.google.comUnited States
                                        15169GOOGLEUSfalse
                                        2.19.126.89
                                        unknownEuropean Union
                                        16625AKAMAI-ASUSfalse
                                        142.250.185.100
                                        unknownUnited States
                                        15169GOOGLEUSfalse
                                        185.212.44.250
                                        www.trustedoffers.deSweden
                                        39378SERVINGADEfalse
                                        185.158.249.69
                                        api.trustedoffers.deNetherlands
                                        58329RACKPLACEDEfalse
                                        239.255.255.250
                                        unknownReserved
                                        unknownunknownfalse
                                        185.26.182.112
                                        eu.net.opera.comNorway
                                        39832NO-OPERANOfalse
                                        172.217.18.109
                                        accounts.google.comUnited States
                                        15169GOOGLEUSfalse
                                        52.208.31.180
                                        yanalogyone.comUnited States
                                        16509AMAZON-02USfalse
                                        142.250.184.227
                                        unknownUnited States
                                        15169GOOGLEUSfalse
                                        95.101.111.130
                                        unknownEuropean Union
                                        12956TELEFONICATELXIUSESfalse
                                        116.203.169.156
                                        static.chip-secured-download.deGermany
                                        24940HETZNER-ASDEfalse
                                        172.217.16.195
                                        unknownUnited States
                                        15169GOOGLEUSfalse
                                        IP
                                        192.168.2.1
                                        Joe Sandbox Version:36.0.0 Rainbow Opal
                                        Analysis ID:779040
                                        Start date and time:2023-01-06 14:13:14 +01:00
                                        Joe Sandbox Product:CloudBasic
                                        Overall analysis duration:
                                        Hypervisor based Inspection enabled:false
                                        Report type:full
                                        Sample file name:Snipping Tool Plus - CHIP Installer _Pvujx.exe
                                        Cookbook file name:defaultwindowsinteractivecookbook.jbs
                                        Analysis system description:Windows 10 64 bit version 1909 (MS Office 2019, IE 11, Chrome 104, Firefox 88, Adobe Reader DC 21, Java 8 u291, 7-Zip)
                                        Number of analysed new started processes analysed:29
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • EGA enabled
                                        Analysis Mode:stream
                                        Analysis stop reason:Timeout
                                        Detection:SUS
                                        Classification:sus28.spyw.winEXE@25/18@38/132
                                        Cookbook Comments:
                                        • Found application associated with file extension: .exe
                                        • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe, SgrmBroker.exe, usocoreworker.exe, svchost.exe
                                        • Excluded IPs from analysis (whitelisted): 20.190.154.19, 40.126.26.135, 20.190.154.16, 40.126.26.132, 40.126.26.133, 20.190.154.18, 20.190.154.136, 20.190.154.139
                                        • Excluded domains from analysis (whitelisted): prda.aadg.msidentity.com, slscr.update.microsoft.com, login.live.com, login.msa.msidentity.com, www.tm.a.prd.aadg.trafficmanager.net, www.tm.lg.prod.aadmsa.trafficmanager.net
                                        • Not all processes where analyzed, report is missing behavior information
                                        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                        • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                        • Report size getting too big, too many NtEnumerateKey calls found.
                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                        • VT rate limit hit for: C:\Users\alfredo\AppData\Local\Temp\OperaSetup_exe_3162023214092374826251\OperaSetup_exe.parts
                                        • VT rate limit hit for: http://static.chip-secured-download.de/gfx/progress/BitGuardian/PPD_Bit-Driver-Updater_1.png
                                        Process:C:\Users\alfredo\AppData\Roaming\stubinstaller\133174844577776824.exe
                                        File Type:ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):42
                                        Entropy (8bit):4.0050635535766075
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:84CFDB4B995B1DBF543B26B86C863ADC
                                        SHA1:D2F47764908BF30036CF8248B9FF5541E2711FA2
                                        SHA-256:D8988D672D6915B46946B28C06AD8066C50041F6152A91D37FFA5CF129CC146B
                                        SHA-512:485F0ED45E13F00A93762CBF15B4B8F996553BAA021152FAE5ABA051E3736BCD3CA8F4328F0E6D9E3E1F910C96C4A9AE055331123EE08E3C2CE3A99AC2E177CE
                                        Malicious:false
                                        Reputation:low
                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..
                                        Process:C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exe
                                        File Type:data
                                        Category:dropped
                                        Size (bytes):49120
                                        Entropy (8bit):0.0017331682157558962
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:0392ADA071EB68355BED625D8F9695F3
                                        SHA1:777253141235B6C6AC92E17E297A1482E82252CC
                                        SHA-256:B1313DD95EAF63F33F86F72F09E2ECD700D11159A8693210C37470FCB84038F7
                                        SHA-512:EF659EEFCAB16221783ECB258D19801A1FF063478698CF4FCE3C9F98059CA7B1D060B0449E6FD89D3B70439D9735FA1D50088568FF46C9927DE45808250AEC2E
                                        Malicious:false
                                        Reputation:low
                                        Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exe
                                        File Type:HTML document, ASCII text
                                        Category:dropped
                                        Size (bytes):2142
                                        Entropy (8bit):5.244871000930477
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:E6F0BD00D49D36FA1B5FABC1530DBB4F
                                        SHA1:21D98C0C180A877552DAFF7C34505DB2942F1A9A
                                        SHA-256:EE53CAA252AA150FC6641CDD76C32FCAC6B69DD4DF73D3E4E7A5F628B26D0745
                                        SHA-512:432629C723A9FB375123CD8CD86CF6F01792E45B88B34BFBD813AA2D9C58D2D88182D1436046E4D6808879CED942E9298BE3ABA0FF0E89F343AA656002DC9029
                                        Malicious:false
                                        Reputation:low
                                        Preview:<html><head><title></title></head><body> .. "click-tracking-url". "image-asset-url". "impression-tracking-url"..--><span class="disclaim">Anzeige</a></span><a target="_blank" href=...."https://webcf.bitdriverupdater.com/bitdrvupdt/instlr/build/10020/bitdurtsetup.exe"....><img src=.."http://static.chip-secured-download.de/gfx/progress/BitGuardian/PPD_Bit-Driver-Updater_1.png"....></a><div class="track" style="background:url(.https://api.trustedoffers.de/progresspagead/impression?pid=chipderedesign&id=65..)"><style>.body{.padding:0 3% 3% 3%;border:none;cursor:default;..display: table-cell;..vertical-align: middle; ..overflow:hidden;.}.html,body {height: 100%;}.html{.display: table;..margin: auto;.}.img{.padding:0;border:none;margin:0;width:100%;display:block;}..track{.display:none;}..disclaim{..font: 10px Arial, sans-serif;color: rgba(128,128,128,0.9); ..position:absolute;top:2.5%;right:3.5%;display:block;.}</style>..<img src="#" class="track" id="rholive">..<script>./* coun
                                        Process:C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exe
                                        File Type:PNG image data, 1200 x 300, 8-bit/color RGB, non-interlaced
                                        Category:dropped
                                        Size (bytes):253480
                                        Entropy (8bit):7.997455604117719
                                        Encrypted:true
                                        SSDEEP:
                                        MD5:4FA788C006BA2C165DFB15A20DD408D8
                                        SHA1:6F8D7A53BA7AE3B6B1D3B3297B730FC2A93B7D09
                                        SHA-256:AA0A1A9E282167A2A8BA84CED85760DF64311B6A2F60BF44E7BB17AAD3780C95
                                        SHA-512:7A1131BCB4323A313AEC3954CEE9C4359D2CA9A923B99C660CB47EFA60B698FBD084C18D2001058EA7972188A525AA2F5DB16A0FE9CDBDF1E1331D0E4B4AB36D
                                        Malicious:false
                                        Reputation:low
                                        Preview:.PNG........IHDR.......,.....\.......tEXtSoftware.Adobe ImageReadyq.e<....IDATx....,.....o.Y...._.~$..P....g..f.... ....l......6`.?.....K..........._w...K.........k6e....c........w.w.h4.......O..${A.....&.$.. ...H.M..V.#......8..&.a......o'..8N..I....#.)m.....hCy......8;..m,...^6$..';$....d...k.....}.P..w..1..K..........l.@h...........+~$E...a...0==..C.G..6L..x..../.......k2..?.'...............+:..M.{................._.=.W...'.3..A........o....a..o......~1<..q..>.0N......f/.?...................7;..Qt|..........8..........O.._....g...'........kua.D............o.;p....^.$a.......I...%1.#....=....$].0]c.V.1./.-?...i........IL..Z...-....:_*........o..'?.=.~.d'.=d.-]8.1.0..5..r..m..Dd...........7...._4..f..K..b."........'O..=3.C].....^...l.:^h;....pN......M].x.d8.0.`.i.....N.G."..9..x..[.k..":.O.t...q.G..f7..|?..M6$...F.G.]QR1Nx(.........66N..4......N.....D.....][.....t...~.W.}.[.........h....z..._.....i}..e.'.^'.b......6=.p.dc......p.s
                                        Process:C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exe
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                                        Category:dropped
                                        Size (bytes):2800656
                                        Entropy (8bit):7.770112097251173
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:2010FD32C94411DF0E4218EAE58E699F
                                        SHA1:D34562EF17F4A382C12F024B6E6ED4D94A3F20DE
                                        SHA-256:4D2F56127AF824C24389FC7DCD1C48D2C27865D2603B621C4B49D81A06F57D86
                                        SHA-512:D70E09E26D1BD45BD6D3ACAEF6A1FFE40094F8DA7F2E5DFF82753DB195F3BC915C63548425822E028CA6F042CDA10BF5C0615DD47AC6EDF974409428780EAA3F
                                        Malicious:false
                                        Reputation:low
                                        Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L....1.c..........".......*.......&.0&P.. &..0P...@...........................P......>+...@.................................d.P......0P.d.............*..,..`.P.$............................'P......(P.............................................UPX0......&.............................UPX1......*.. &...*.................@....rsrc........0P.......*.............@...3.96.UPX!..........z.T.P. .*..zO.&..Sa.!.U..]....U..1.]........SWV.....E.`..@....@........d.....d....}...........M.1..U..M.B..Z.9.s<.M.).).....9..L.M.4.9.r.9.wm.u..t.SPQ....ww.w.U....8..=M..+...X$.E.....{................t.N......A1.C:..;}.|...1..E....F...........^_[]...E..h...).L....h...l......Y|.....@.o8..U.......a8..WV.........x ....u.1.H^_].n...F..H..N......5.?.@8.OM.P...n...P..}..W.._.....9.s>..O.)..9.r....op..9......2QPSQR..w.?v.....TB.:.E.....E...=..X0.X......?..u.['F.E.@z...........
                                        Process:C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exe
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                                        Category:dropped
                                        Size (bytes):2800656
                                        Entropy (8bit):7.770112097251173
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:2010FD32C94411DF0E4218EAE58E699F
                                        SHA1:D34562EF17F4A382C12F024B6E6ED4D94A3F20DE
                                        SHA-256:4D2F56127AF824C24389FC7DCD1C48D2C27865D2603B621C4B49D81A06F57D86
                                        SHA-512:D70E09E26D1BD45BD6D3ACAEF6A1FFE40094F8DA7F2E5DFF82753DB195F3BC915C63548425822E028CA6F042CDA10BF5C0615DD47AC6EDF974409428780EAA3F
                                        Malicious:false
                                        Reputation:low
                                        Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L....1.c..........".......*.......&.0&P.. &..0P...@...........................P......>+...@.................................d.P......0P.d.............*..,..`.P.$............................'P......(P.............................................UPX0......&.............................UPX1......*.. &...*.................@....rsrc........0P.......*.............@...3.96.UPX!..........z.T.P. .*..zO.&..Sa.!.U..]....U..1.]........SWV.....E.`..@....@........d.....d....}...........M.1..U..M.B..Z.9.s<.M.).).....9..L.M.4.9.r.9.wm.u..t.SPQ....ww.w.U....8..=M..+...X$.E.....{................t.N......A1.C:..;}.|...1..E....F...........^_[]...E..h...).L....h...l......Y|.....@.o8..U.......a8..WV.........x ....u.1.H^_].n...F..H..N......5.?.@8.OM.P...n...P..}..W.._.....9.s>..O.)..9.r....op..9......2QPSQR..w.?v.....TB.:.E.....E...=..X0.X......?..u.['F.E.@z...........
                                        Process:C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exe
                                        File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                        Category:dropped
                                        Size (bytes):437645
                                        Entropy (8bit):7.998904525428809
                                        Encrypted:true
                                        SSDEEP:
                                        MD5:ADBE4D4E1EB146045D0AE3DFDD973554
                                        SHA1:D1AD3EBD99A13584F828CBD134918D9D8B262320
                                        SHA-256:2BC6D0092E097978B8D7EB8A7A41CF6A7C384A44C30D205407DFF946DF685837
                                        SHA-512:089A8F619305CC1B81AD86B3CE4292E703E7EF473F0FFAD6A244AEEABDB22B56BAD2A1227545785449C8863A84B3D8924F60C8A9490899460BDCF7622DD7EF44
                                        Malicious:false
                                        Reputation:low
                                        Preview:PK.........ed?.U.......'......Changelog.txt.ZI..0.....P.@3..L....@..*!..D.....F.W.\......./...@..N.....9.......t.<qT.QOOtT_=V........}....p.....>\}..P}....Xe..\..*Q#u...p...t..;....:,.'#8o..D.._....{...7.[....5..gp..........<...2.3?+.@V.+~.}.S.....3.t.5.k..:.a.....@..4......<).<U.j.8...._NO3..~2.......0..X-......!..9C..^;j...}@.-.h.........-F.3.S.=.`.....%.....v..4.4j..>i.R5$.#._ .E.MZ..B.(5>.......%.#... ...H.W.j..........v.g......Z.....^...V..o..w<....0cki..I.B[..FY'..v.g...P........r.(....N.u..%. N...41.kFNB..}2|V.E...l0%oK<Oa;,.l-/.I.xC.d.z..........k...u\..>....r.."o.o....\#.k..4..B_4..xQ.u...i.........3.......W..c.'..3.ufe.....E.....s.R.=..O......D;.....a.F......S9*u.s....)..C.y.;.#Z..6..*2...X..).{.4...T..;.}p...1#.]..*Q./X..u..W|.%5..o.s.g.I......&....B..#.....P..kL.|]D.h..:8 .Y..v....J^...yA..d....H....z......d.j}."...5...r-.9..?.E[%.P7.C. .....w.\8~S.<.....(a.6Y$...z.g.KN..q...Kq..._.(.r..D..."G..;~NQ.+.......f....X..
                                        Process:C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exe
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):6300824
                                        Entropy (8bit):6.280973596147506
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:74482ED9E6E1370416539AA9F893F100
                                        SHA1:1F42D18000670BFBB80C87CAD3B1B1476ABBF9B4
                                        SHA-256:2FE80C7262E22CF901E31B49FB1684C16402EEC8F239EF9AC961D22D592EFB36
                                        SHA-512:25310414FD1BFF1A41E2738F2CE8F374BE8D8E44728759340E20CEC559CF3CF1D7032473690B0E0CE19834DFBBE5AB9DAA290F1CBC04E315007A85AA8E7466DB
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 8%
                                        Reputation:low
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......V.B...,,..,,..,,I./-..,,I.)-..,,I.(-..,,@.(-..,,@./-..,,@.)-H.,,I.*-..,,I.--..,,..-,.,,..%-..,,...,..,,...,..,,...-..,,Rich..,,........................PE..L....P.c.....................NZ.....`.............@..........................`_......p`...@.................................x^..........`mX..........&_...... _..>..................................0...@...............|............................text............................... ..`.rdata..Xm.......n..................@..@.data...,0...p... ...X..............@....rsrc...`mX......nX..x..............@..@.reloc...>... _..@....^.............@..B................................................................................................................................................................................................................................................................................
                                        Process:C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exe
                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Category:dropped
                                        Size (bytes):6300824
                                        Entropy (8bit):6.280973596147506
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:74482ED9E6E1370416539AA9F893F100
                                        SHA1:1F42D18000670BFBB80C87CAD3B1B1476ABBF9B4
                                        SHA-256:2FE80C7262E22CF901E31B49FB1684C16402EEC8F239EF9AC961D22D592EFB36
                                        SHA-512:25310414FD1BFF1A41E2738F2CE8F374BE8D8E44728759340E20CEC559CF3CF1D7032473690B0E0CE19834DFBBE5AB9DAA290F1CBC04E315007A85AA8E7466DB
                                        Malicious:false
                                        Reputation:low
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......V.B...,,..,,..,,I./-..,,I.)-..,,I.(-..,,@.(-..,,@./-..,,@.)-H.,,I.*-..,,I.--..,,..-,.,,..%-..,,...,..,,...,..,,...-..,,Rich..,,........................PE..L....P.c.....................NZ.....`.............@..........................`_......p`...@.................................x^..........`mX..........&_...... _..>..................................0...@...............|............................text............................... ..`.rdata..Xm.......n..................@..@.data...,0...p... ...X..............@....rsrc...`mX......nX..x..............@..@.reloc...>... _..@....^.............@..B................................................................................................................................................................................................................................................................................
                                        Process:C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exe
                                        File Type:PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows
                                        Category:dropped
                                        Size (bytes):3672664
                                        Entropy (8bit):6.7007677408300115
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:2670D3FCFECE2FA02CBE00AF6E462BFA
                                        SHA1:3F092DE3DB7F89CBD4544B1168986B256CD7C4A9
                                        SHA-256:14A396E3E82B5C75FF7D2E3C607CE9F23B7D007339F1CB87C2921FD6FEB6AC43
                                        SHA-512:A8166CEDA81EFE5F0124AAE185DEE64D34FC001BED4C3AF36E87DB28C3053194A43DC84CF52E1B9244962A4ECF78B461F9FC6543B4FE85842988D0EEE9EE4828
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        Reputation:low
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d................"...0...7.............. .....@..... ....................... 8.....6.9...`...@......@............... ................................8...............7.X$............7.8............................................................ ..H............text.....7.. ....7................. ..`.rsrc.........8.......7.............@..@........................................H.......H#..d............4..X.7..........................................0..........(.....(....&.(....~....&(......(....r...p(....~.......(....(......(....-..(....&.(....-.(....(....o........+.....( ......X......i2.(!.......(".......(#...r...p(.....r'..p..(.......(....-.(....(....re..p.r...p(..... ....(....-.(....(....r...p.r...p(..... ....(....-.(....(....r=..p.r{..p(..... ....(....-.(....(....s$...%o%....o&...%o%....o'...%o%.....(....o(...%o%...o)...( ...%o*...-.(....(....%o+...o,.
                                        Process:C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exe
                                        File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hideshowminimized
                                        Category:modified
                                        Size (bytes):2212
                                        Entropy (8bit):2.8705781093841667
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:DC51EC52AC9780D78E375E3FC3ADF2EF
                                        SHA1:E3C90B70B3294292EB84A038FB4827D469AF1933
                                        SHA-256:C6DCF44CD975077A5874AC84F3D3593FA8805237A4C935EE857EC58DBB0118AF
                                        SHA-512:59538A626D909CC1233B69DDF486E420BF1E1E0886208AC8F49175482FA5E96E78532DE91C07E5931A413C43C947A6A57C7BDC21558AE348D2D5EAFA3012F94C
                                        Malicious:true
                                        Reputation:low
                                        Preview:L..................F.@...........................................................P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....V.1...........alfredo.@............................................a.l.f.r.e.d.o.....V.1...........AppData.@............................................A.p.p.D.a.t.a.....P.1...........Local.<............................................L.o.c.a.l.....N.1...........Temp..:............................................T.e.m.p.......1...........outsrf220429_exe_1162023214092743401251..............................................o.u.t.s.r.f.2.2.0.4.2.9._.e.x.e._.1.1.6.2.0.2.3.2.1.4.0.9.2.7.4.3.4.0.1.2.5.1...6.r.2...........outsrf220429.exe..R............................................o.u.t.s.r.f.2.2.0.4.2.9...e.x.e... .......\.o.u.t.s.r.f.2.2.0.4.2.9...e.x.e.L.C.:.\.U.s.e.r.s.\.a.l.f.r.e.d.o.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.o.u.t.s.r.f.2.2.0.4.2.9._.e.x.e._.1.1.6.2.0.2.3.2.1.4.0.9
                                        Process:C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exe
                                        File Type:PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows
                                        Category:dropped
                                        Size (bytes):3672664
                                        Entropy (8bit):6.7007677408300115
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:2670D3FCFECE2FA02CBE00AF6E462BFA
                                        SHA1:3F092DE3DB7F89CBD4544B1168986B256CD7C4A9
                                        SHA-256:14A396E3E82B5C75FF7D2E3C607CE9F23B7D007339F1CB87C2921FD6FEB6AC43
                                        SHA-512:A8166CEDA81EFE5F0124AAE185DEE64D34FC001BED4C3AF36E87DB28C3053194A43DC84CF52E1B9244962A4ECF78B461F9FC6543B4FE85842988D0EEE9EE4828
                                        Malicious:false
                                        Yara Hits:
                                        • Rule: SUSP_XORed_Mozilla, Description: Detects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key., Source: C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429_exe.parts, Author: Florian Roth
                                        • Rule: SUSP_XORed_Mozilla, Description: Detects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key., Source: C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429_exe.parts, Author: Florian Roth
                                        • Rule: SUSP_XORed_Mozilla, Description: Detects suspicious single byte XORed keyword \'Mozilla/5.0\' - it uses yara\'s XOR modifier and therefore cannot print the XOR key. You can use the CyberChef recipe linked in the reference field to brute force the used key., Source: C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429_exe.parts, Author: Florian Roth
                                        Reputation:low
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d................"...0...7.............. .....@..... ....................... 8.....6.9...`...@......@............... ................................8...............7.X$............7.8............................................................ ..H............text.....7.. ....7................. ..`.rsrc.........8.......7.............@..@........................................H.......H#..d............4..X.7..........................................0..........(.....(....&.(....~....&(......(....r...p(....~.......(....(......(....-..(....&.(....-.(....(....o........+.....( ......X......i2.(!.......(".......(#...r...p(.....r'..p..(.......(....-.(....(....re..p.r...p(..... ....(....-.(....(....r...p.r...p(..... ....(....-.(....(....r=..p.r{..p(..... ....(....-.(....(....s$...%o%....o&...%o%....o'...%o%.....(....o(...%o%...o)...( ...%o*...-.(....(....%o+...o,.
                                        Process:C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429.exe
                                        File Type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                        Category:dropped
                                        Size (bytes):1127512
                                        Entropy (8bit):6.066917511385274
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:98BDFFE59B649724E7DB0148DC3A3CC8
                                        SHA1:0EF517D26CE1664C8352F4310B8A4902291A84E9
                                        SHA-256:BA3DD4CB2D1E76C592AB19CC9F0A5DBF14CF45D8ABAE1FCBC4FD3896195B2C1C
                                        SHA-512:61AB162CB8C6D910FC098B128423DE83706669038D592F19D11006BA0AB2A204AB6BC5ED09E0F1272B41BE27A3FBA00C5E15B52D7A8B6B9C4A2368AD523C1A64
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        Reputation:low
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........i...............................................................................`......`............`......Rich...................PE..d.....kb.........."......b...........[.........@....................................G.....`..................................................>....... ...q..............X$..............T.......................(...@...8...............P...............H............text...[P.......R.................. ..`.nep....P....p.......V.............. ..`.rdata...............f..............@..@.data....r...........h..............@....pdata..............................@..@.rsrc....q... ...r..................@..@.reloc..............................@..B................................................................................................................................................................................
                                        Process:C:\Users\alfredo\AppData\Roaming\stubinstaller\133174844577776824.exe
                                        File Type:ASCII text, with no line terminators
                                        Category:dropped
                                        Size (bytes):5
                                        Entropy (8bit):1.9219280948873623
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:F781895C9ECFD0684F06034CD37032D5
                                        SHA1:3C92B28C4770767C170042706FEE676D95520BF4
                                        SHA-256:A8EFC28ED86A7ABF4869C1FC4C07FD00231DBE50EB6FC4F4D69E05F94E58D0D3
                                        SHA-512:33618FE4C727EF0ADD709112A0433C6069BC7870E22828BC66EF66BB45E804983E4B12A54E66843E95527D5E940009DD75D3B9E7459ADD60650BE8718063A6DF
                                        Malicious:true
                                        Reputation:low
                                        Preview:71500
                                        Process:C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429.exe
                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                        Category:dropped
                                        Size (bytes):565648
                                        Entropy (8bit):6.489456926940133
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:CB75D6437418AFE1A7B52ACF75730FF1
                                        SHA1:54C2DA9552671B161CC87EB50FBDB86319B00F56
                                        SHA-256:7C4CE9D6BFCD6D9DB4EEF4E75ECDCF5A8E5320106E80F1ECA617439FA43F33E8
                                        SHA-512:F58ABB740A30467E2D8AEDD7EED357DA020FDC7D966E245890D102A52E96FEA296E122C1D2BC112423FC64B6F5E70B7DF3F3EB7DE1BF5C2F5F0EB3644F1E06D6
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        Reputation:low
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Y...................Z.........O.....O.....O.....O.....O.....O.6....O.....Rich...........................PE..d...Z.-a.........." .....<...\.......)....................................................`A.........................................5..h...(...,............p...9...~...#......0.......T...............................8............P...............................text....;.......<.................. ..`.rdata..j....P.......@..............@..@.data...`:...0......................@....pdata...9...p...:...6..............@..@.rsrc................p..............@..@.reloc..0............t..............@..B................................................................................................................................................................................................................................................
                                        Process:C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429.exe
                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                        Category:dropped
                                        Size (bytes):97168
                                        Entropy (8bit):6.424686954579329
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:A87575E7CF8967E481241F13940EE4F7
                                        SHA1:879098B8A353A39E16C79E6479195D43CE98629E
                                        SHA-256:DED5ADAA94341E6C62AEA03845762591666381DCA30EB7C17261DD154121B83E
                                        SHA-512:E112F267AE4C9A592D0DD2A19B50187EB13E25F23DED74C2E6CCDE458BCDAEE99F4E3E0A00BAF0E3362167AE7B7FE4F96ECBCD265CC584C1C3A4D1AC316E92F0
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        Reputation:low
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......*..qn.."n.."n.."...#l.."g.."e.."n.."B.."<..#c.."<..#~.."<..#q.."<..#o.."<.g"o.."<..#o.."Richn.."................PE..d...Y.-a.........." .........`......p.....................................................`A.........................................B..4....J...............p..X....X...#..........h,..T............................,..8............................................text............................... ..`.rdata...@.......B..................@..@.data...@....`.......@..............@....pdata..X....p.......D..............@..@_RDATA...............P..............@..@.rsrc................R..............@..@.reloc...............V..............@..B........................................................................................................................................................................................................................
                                        Process:C:\Users\alfredo\AppData\Local\Temp\outsrf220429_exe_1162023214092743401251\outsrf220429.exe
                                        File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                        Category:dropped
                                        Size (bytes):37240
                                        Entropy (8bit):6.3017272133584585
                                        Encrypted:false
                                        SSDEEP:
                                        MD5:37C372DA4B1ADB96DC995ECB7E68E465
                                        SHA1:6C1B6CB92FF76C40C77F86EA9A917A5F854397E2
                                        SHA-256:1554B5802968FDB2705A67CBB61585E9560B9E429D043A5AA742EF3C9BBFB6BF
                                        SHA-512:926F081B1678C15DC649D7E53BFBE98E4983C9AD6CCDF11C9383CA1D85F2A7353D5C52BEBF867D6E155FF897F4702FC4DA36A8F4CF76B00CB842152935E319A6
                                        Malicious:false
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 0%
                                        Reputation:low
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......D_.O.>...>...>...N...>..RK...>...F^..>...>..1>..RK...>..RK...>..RK...>..RK...>..RK2..>..RK...>..Rich.>..........................PE..d...^.-a.........." .....:...6......`A..............................................7]....`A.........................................l.......m..x....................n..x#......<...(b..T............................b..8............P..X............................text...e9.......:.................. ..`.rdata.. "...P...$...>..............@..@.data... ............b..............@....pdata...............d..............@..@.rsrc................h..............@..@.reloc..<............l..............@..B................................................................................................................................................................................................................................................
                                        Process:C:\Users\alfredo\Desktop\Snipping Tool Plus - CHIP Installer _Pvujx.exe
                                        File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                        Category:dropped
                                        Size (bytes):437645
                                        Entropy (8bit):7.998904525428809
                                        Encrypted:true
                                        SSDEEP:
                                        MD5:ADBE4D4E1EB146045D0AE3DFDD973554
                                        SHA1:D1AD3EBD99A13584F828CBD134918D9D8B262320
                                        SHA-256:2BC6D0092E097978B8D7EB8A7A41CF6A7C384A44C30D205407DFF946DF685837
                                        SHA-512:089A8F619305CC1B81AD86B3CE4292E703E7EF473F0FFAD6A244AEEABDB22B56BAD2A1227545785449C8863A84B3D8924F60C8A9490899460BDCF7622DD7EF44
                                        Malicious:false
                                        Reputation:low
                                        Preview:PK.........ed?.U.......'......Changelog.txt.ZI..0.....P.@3..L....@..*!..D.....F.W.\......./...@..N.....9.......t.<qT.QOOtT_=V........}....p.....>\}..P}....Xe..\..*Q#u...p...t..;....:,.'#8o..D.._....{...7.[....5..gp..........<...2.3?+.@V.+~.}.S.....3.t.5.k..:.a.....@..4......<).<U.j.8...._NO3..~2.......0..X-......!..9C..^;j...}@.-.h.........-F.3.S.=.`.....%.....v..4.4j..>i.R5$.#._ .E.MZ..B.(5>.......%.#... ...H.W.j..........v.g......Z.....^...V..o..w<....0cki..I.B[..FY'..v.g...P........r.(....N.u..%. N...41.kFNB..}2|V.E...l0%oK<Oa;,.l-/.I.xC.d.z..........k...u\..>....r.."o.o....\#.k..4..B_4..xQ.u...i.........3.......W..c.'..3.ufe.....E.....s.R.=..O......D;.....a.F......S9*u.s....)..C.y.;.#Z..6..*2...X..).{.4...T..;.}p...1#.]..*Q./X..u..W|.%5..o.s.g.I......&....B..#.....P..kL.|]D.h..:8 .Y..v....J^...yA..d....H....z......d.j}."...5...r-.9..?.E[%.P7.C. .....w.\8~S.<.....(a.6Y$...z.g.KN..q...Kq..._.(.r..D..."G..;~NQ.+.......f....X..
                                        File type:PE32+ executable (GUI) x86-64, for MS Windows
                                        Entropy (8bit):6.013112201325464
                                        TrID:
                                        • Win64 Executable GUI (202006/5) 92.64%
                                        • Win64 Executable (generic) (12005/4) 5.51%
                                        • Generic Win/DOS Executable (2004/3) 0.92%
                                        • DOS Executable Generic (2002/1) 0.92%
                                        • VXD Driver (31/22) 0.01%
                                        File name:Snipping Tool Plus - CHIP Installer _Pvujx.exe
                                        File size:5331520
                                        MD5:f5980f17f44da870072c5ce396eb01bf
                                        SHA1:22ce208acb16875cdd9d42a794557a56068220c2
                                        SHA256:2f9079df89e96a997a910f9243173ac60bfe625501452152f8ab281778e5696b
                                        SHA512:f30c2029f7b85c7959385f64627d2443e9e76b8a025a02aa2619f0758dbdd0e00f2b0464a8af5a4607be1bff006d24f677d548bac0e755f880f7207a6e465037
                                        SSDEEP:49152:xhx7dxx15qe01xtgx41J/StY/yuiYWLmgpaRZkDuZdTNACtn:JV1JALgvz4ACtn
                                        TLSH:9236197F72D4D22AC29DC63AC0A38B40DA33BD751B32C5E7469412695F36BC09E7E621
                                        File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win64..$7.......................................................................................................................................
                                        Icon Hash:c2e8c4ccccccf4cc
                                        Entrypoint:0x7f8020
                                        Entrypoint Section:.text
                                        Digitally signed:true
                                        Imagebase:0x400000
                                        Subsystem:windows gui
                                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
                                        Time Stamp:0x625A8D90 [Sat Apr 16 09:34:08 2022 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:5
                                        OS Version Minor:2
                                        File Version Major:5
                                        File Version Minor:2
                                        Subsystem Version Major:5
                                        Subsystem Version Minor:2
                                        Import Hash:9a3ae152609425957e9b2d8f50b872a5
                                        Signature Valid:true
                                        Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                                        Signature Validation Error:The operation completed successfully
                                        Error Number:0
                                        Not Before, Not After
                                        • 11/17/2021 1:00:00 AM 11/17/2023 12:59:59 AM
                                        Subject Chain
                                        • CN=CHIP Digital GmbH, O=CHIP Digital GmbH, L=Mnchen, S=Bayern, C=DE, SERIALNUMBER=HRB 104168, OID.1.3.6.1.4.1.311.60.2.1.1=Mnchen, OID.1.3.6.1.4.1.311.60.2.1.2=Bayern, OID.1.3.6.1.4.1.311.60.2.1.3=DE, OID.2.5.4.15=Private Organization
                                        Version:3
                                        Thumbprint MD5:31290AD99CA708B045825C48A6AB55AF
                                        Thumbprint SHA-1:F0B3131CBF220230B163F8BD2829AF4724C89D5F
                                        Thumbprint SHA-256:82AF1C835CD258D4F8789573E0EBD33ADCD8E4F32B4E88355D1719C149EA1502
                                        Serial:04DFC5474923E7F3AD3BDC6904AC55C1
                                        Instruction
                                        push ebp
                                        dec eax
                                        sub esp, 30h
                                        dec eax
                                        mov ebp, esp
                                        dec eax
                                        mov dword ptr [ebp+28h], ebp
                                        nop
                                        dec eax
                                        lea ecx, dword ptr [000000ECh]
                                        call 00007F04E898E06Ch
                                        nop
                                        dec eax
                                        mov eax, dword ptr [00062E1Fh]
                                        dec eax
                                        mov ecx, dword ptr [eax]
                                        call 00007F04E8C1CCDCh
                                        dec eax
                                        mov eax, dword ptr [00062E10h]
                                        dec eax
                                        mov ecx, dword ptr [eax]
                                        mov dl, 01h
                                        call 00007F04E8C1F5DBh
                                        dec eax
                                        mov eax, dword ptr [00062DFFh]
                                        dec eax
                                        mov ecx, dword ptr [eax]
                                        dec eax
                                        mov edx, dword ptr [FFFF2105h]
                                        dec esp
                                        mov eax, dword ptr [00063316h]
                                        call 00007F04E8C1CCDEh
                                        dec eax
                                        mov eax, dword ptr [00062DE2h]
                                        dec eax
                                        mov ecx, dword ptr [eax]
                                        dec eax
                                        mov edx, dword ptr [FFFE5CC8h]
                                        dec esp
                                        mov eax, dword ptr [00063399h]
                                        call 00007F04E8C1CCC1h
                                        dec eax
                                        mov eax, dword ptr [00062DC5h]
                                        dec eax
                                        mov ecx, dword ptr [eax]
                                        dec eax
                                        mov edx, dword ptr [FFFE6D4Bh]
                                        dec esp
                                        mov eax, dword ptr [00062C9Ch]
                                        call 00007F04E8C1CCA4h
                                        dec eax
                                        mov eax, dword ptr [00062DA8h]
                                        dec eax
                                        mov ecx, dword ptr [eax]
                                        dec eax
                                        mov edx, dword ptr [FFFE774Eh]
                                        dec esp
                                        mov eax, dword ptr [0006307Fh]
                                        call 00007F04E8C1CC87h
                                        dec eax
                                        mov eax, dword ptr [00062D8Bh]
                                        dec eax
                                        mov ecx, dword ptr [eax]
                                        call 00007F04E8C1CE68h
                                        jmp 00007F04E8D6D2AAh
                                        nop
                                        nop
                                        call 00007F04E8983BAFh
                                        nop
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x4710000x9b.edata
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x46a0000x48b4.idata
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x4dc0000x4ba00.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x4ad0000x2ee0c.pdata
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x5136000x2440.rsrc
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x4740000x385ec.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x4730000x28.rdata
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x46b2400x1110.idata
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x46f0000x1256.didata
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x10000x40a8180x40aa00unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .data0x40c0000x4f5180x4f600False0.2850086122047244data4.968686152471056IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .bss0x45c0000xd05c0x0False0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .idata0x46a0000x48b40x4a00False0.259765625data4.345737102455069IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .didata0x46f0000x12560x1400False0.2427734375data3.257494677996339IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .edata0x4710000x9b0x200False0.2578125data1.9082599248602587IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .tls0x4720000x2900x0False0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .rdata0x4730000x6d0x200False0.1953125data1.373604921932461IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .reloc0x4740000x385ec0x38600False0.4910312153547672data6.5209745136516215IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                        .pdata0x4ad0000x2ee0c0x2f000False0.4940419298537234SysEx File -6.344672106893594IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .rsrc0x4dc0000x4ba000x4ba00False0.4954319473140496data6.8194764524170495IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountry
                                        RT_CURSOR0x4ddbd00x134Targa image data - Map 64 x 65536 x 1 +32 "\001"EnglishUnited States
                                        RT_CURSOR0x4ddd040x134dataEnglishUnited States
                                        RT_CURSOR0x4dde380x134dataEnglishUnited States
                                        RT_CURSOR0x4ddf6c0x134dataEnglishUnited States
                                        RT_CURSOR0x4de0a00x134dataEnglishUnited States
                                        RT_CURSOR0x4de1d40x134dataEnglishUnited States
                                        RT_CURSOR0x4de3080x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"EnglishUnited States
                                        RT_BITMAP0x4de43c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States
                                        RT_BITMAP0x4de60c0x1e4Device independent bitmap graphic, 36 x 19 x 4, image size 380EnglishUnited States
                                        RT_BITMAP0x4de7f00x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States
                                        RT_BITMAP0x4de9c00x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States
                                        RT_BITMAP0x4deb900x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States
                                        RT_BITMAP0x4ded600x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States
                                        RT_BITMAP0x4def300x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States
                                        RT_BITMAP0x4df1000x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States
                                        RT_BITMAP0x4df2d00x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States
                                        RT_BITMAP0x4df4a00x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States
                                        RT_ICON0x4df6700x10828Device independent bitmap graphic, 128 x 256 x 32, image size 131072EnglishUnited States
                                        RT_ICON0x4efe980x4228Device independent bitmap graphic, 64 x 128 x 32, image size 32768EnglishUnited States
                                        RT_ICON0x4f40c00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 8192EnglishUnited States
                                        RT_ICON0x4f51680x468Device independent bitmap graphic, 16 x 32 x 32, image size 2048EnglishUnited States
                                        RT_STRING0x4f55d00x4a4data
                                        RT_STRING0x4f5a740x810OpenPGP Public Key
                                        RT_STRING0x4f62840xe6cdata
                                        RT_STRING0x4f70f00x6a4data
                                        RT_STRING0x4f77940x53cdata
                                        RT_STRING0x4f7cd00x634data
                                        RT_STRING0x4f83040x400data
                                        RT_STRING0x4f87040x588data
                                        RT_STRING0x4f8c8c0xb8data
                                        RT_STRING0x4f8d440x114data
                                        RT_STRING0x4f8e580x178data
                                        RT_STRING0x4f8fd00x4c0data
                                        RT_STRING0x4f94900x5ecdata
                                        RT_STRING0x4f9a7c0x520data
                                        RT_STRING0x4f9f9c0x64cdata
                                        RT_STRING0x4fa5e80x260data
                                        RT_STRING0x4fa8480x500data
                                        RT_STRING0x4fad480x50cdata
                                        RT_STRING0x4fb2540x534data
                                        RT_STRING0x4fb7880x4b0data
                                        RT_STRING0x4fbc380x534data
                                        RT_STRING0x4fc16c0x1b4data
                                        RT_STRING0x4fc3200xc4data
                                        RT_STRING0x4fc3e40x22cdata
                                        RT_STRING0x4fc6100x440data
                                        RT_STRING0x4fca500x408data
                                        RT_STRING0x4fce580x32cdata
                                        RT_STRING0x4fd1840x44cdata
                                        RT_RCDATA0x4fd5d00x10data
                                        RT_RCDATA0x4fd5e00x148bPNG image data, 64 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States
                                        RT_RCDATA0x4fea6c0x111ePNG image data, 64 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States
                                        RT_RCDATA0x4ffb8c0xd8cPNG image data, 64 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States
                                        RT_RCDATA0x5009180x9b4data
                                        RT_RCDATA0x5012cc0x2dataEnglishUnited States
                                        RT_RCDATA0x5012d00xa38Delphi compiled form 'Tc9BjKsSmiTEe33o'
                                        RT_RCDATA0x501d080x353dDelphi compiled form 'TGuqLjmFWgSFjcqi3C'
                                        RT_RCDATA0x5052480x371Delphi compiled form 'Tl5LCINb0HSbn1m'
                                        RT_RCDATA0x5055bc0x82dDelphi compiled form 'TNvWREsI9pb'
                                        RT_RCDATA0x505dec0x1179PNG image data, 1800 x 24, 8-bit/color RGBA, non-interlacedEnglishUnited States
                                        RT_RCDATA0x506f680x176cPNG image data, 2400 x 32, 8-bit/color RGBA, non-interlacedEnglishUnited States
                                        RT_RCDATA0x5086d40x2cf0PNG image data, 3600 x 48, 8-bit/color RGBA, non-interlacedEnglishUnited States
                                        RT_RCDATA0x50b3c40x3970PNG image data, 4800 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States
                                        RT_RCDATA0x50ed340x1403PNG image data, 1800 x 24, 8-bit/color RGBA, non-interlacedEnglishUnited States
                                        RT_RCDATA0x5101380x18adPNG image data, 2400 x 32, 8-bit/color RGBA, non-interlacedEnglishUnited States
                                        RT_RCDATA0x5119e80x343fPNG image data, 3600 x 48, 8-bit/color RGBA, non-interlacedEnglishUnited States
                                        RT_RCDATA0x514e280x3ea6PNG image data, 4800 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States
                                        RT_RCDATA0x518cd00x509PNG image data, 192 x 24, 8-bit/color RGBA, non-interlacedEnglishUnited States
                                        RT_RCDATA0x5191dc0x64ePNG image data, 256 x 32, 8-bit/color RGBA, non-interlacedEnglishUnited States
                                        RT_RCDATA0x51982c0xb62PNG image data, 384 x 48, 8-bit/color RGBA, non-interlacedEnglishUnited States
                                        RT_RCDATA0x51a3900xe43PNG image data, 512 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States
                                        RT_RCDATA0x51b1d40x62fPNG image data, 192 x 24, 8-bit/color RGBA, non-interlacedEnglishUnited States
                                        RT_RCDATA0x51b8040x6d3PNG image data, 256 x 32, 8-bit/color RGBA, non-interlacedEnglishUnited States
                                        RT_RCDATA0x51bed80xe13PNG image data, 384 x 48, 8-bit/color RGBA, non-interlacedEnglishUnited States
                                        RT_RCDATA0x51ccec0xf5bPNG image data, 512 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States
                                        RT_RCDATA0x51dc480xbc3PNG image data, 16 x 16, 8-bit/color RGBA, non-interlacedEnglishUnited States
                                        RT_RCDATA0x51e80c0xc58PNG image data, 32 x 32, 8-bit/color RGBA, non-interlacedEnglishUnited States
                                        RT_RCDATA0x51f4640xbd1PNG image data, 16 x 16, 8-bit/color RGBA, non-interlacedEnglishUnited States
                                        RT_RCDATA0x5200380xcfaPNG image data, 32 x 32, 8-bit/color RGBA, non-interlacedEnglishUnited States
                                        RT_RCDATA0x520d340x644PNG image data, 384 x 24, 8-bit/color RGBA, non-interlacedEnglishUnited States
                                        RT_RCDATA0x5213780x823PNG image data, 512 x 32, 8-bit/color RGBA, non-interlacedEnglishUnited States
                                        RT_RCDATA0x521b9c0xe08PNG image data, 768 x 48, 8-bit/color RGBA, non-interlacedEnglishUnited States
                                        RT_RCDATA0x5229a40x117cPNG image data, 1024 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States
                                        RT_RCDATA0x523b200x787PNG image data, 384 x 24, 8-bit/color RGBA, non-interlacedEnglishUnited States
                                        RT_RCDATA0x5242a80x89cPNG image data, 512 x 32, 8-bit/color RGBA, non-interlacedEnglishUnited States
                                        RT_RCDATA0x524b440x1189PNG image data, 768 x 48, 8-bit/color RGBA, non-interlacedEnglishUnited States
                                        RT_RCDATA0x525cd00x1251PNG image data, 1024 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States
                                        RT_GROUP_CURSOR0x526f240x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                        RT_GROUP_CURSOR0x526f380x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                        RT_GROUP_CURSOR0x526f4c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                        RT_GROUP_CURSOR0x526f600x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                        RT_GROUP_CURSOR0x526f740x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                        RT_GROUP_CURSOR0x526f880x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                        RT_GROUP_CURSOR0x526f9c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States
                                        RT_GROUP_ICON0x526fb00x3edataEnglishUnited States
                                        RT_VERSION0x526ff00x280dataEnglishUnited States
                                        RT_MANIFEST0x5272700x716XML 1.0 document, ASCII text, with CRLF, LF line terminatorsEnglishUnited States
                                        DLLImport
                                        winspool.drvDocumentPropertiesW, ClosePrinter, OpenPrinterW, GetDefaultPrinterW, EnumPrintersW
                                        comctl32.dllFlatSB_SetScrollInfo, InitCommonControls, ImageList_DragMove, ImageList_Destroy, _TrackMouseEvent, ImageList_DragShowNolock, ImageList_Add, ImageList_GetDragImage, FlatSB_SetScrollProp, ImageList_Create, ImageList_EndDrag, ImageList_DrawEx, ImageList_SetImageCount, FlatSB_GetScrollPos, FlatSB_SetScrollPos, InitializeFlatSB, FlatSB_GetScrollInfo, ImageList_Write, ImageList_SetBkColor, ImageList_GetBkColor, ImageList_BeginDrag, ImageList_GetIcon, ImageList_Replace, ImageList_GetImageCount, ImageList_DragEnter, ImageList_GetIconSize, ImageList_SetIconSize, ImageList_Read, ImageList_DragLeave, ImageList_Draw, ImageList_Remove
                                        shell32.dllSHGetMalloc, SHGetSpecialFolderLocation, Shell_NotifyIconW, SHGetFolderLocation, FindExecutableW, ShellExecuteW, SHGetPathFromIDListW, ShellExecuteExW
                                        user32.dllCopyImage, CreateWindowExW, GetMenuItemInfoW, SetMenuItemInfoW, DefFrameProcW, GetDCEx, PeekMessageW, MonitorFromWindow, GetDlgCtrlID, GetUpdateRect, SetTimer, WindowFromPoint, BeginPaint, RegisterClipboardFormatW, FrameRect, MapVirtualKeyW, OffsetRect, IsWindowUnicode, RegisterWindowMessageW, FillRect, GetMenuStringW, DispatchMessageW, SendMessageA, DefMDIChildProcW, EnumWindows, GetClassInfoW, ShowOwnedPopups, GetSystemMenu, GetScrollRange, GetScrollPos, SetScrollPos, GetActiveWindow, SetActiveWindow, DrawEdge, InflateRect, GetKeyboardLayoutList, LoadBitmapW, DrawFocusRect, EnumChildWindows, GetScrollBarInfo, ReleaseCapture, UnhookWindowsHookEx, LoadCursorW, GetCapture, SetCapture, CreatePopupMenu, ScrollWindow, ShowCaret, GetMenuItemID, GetLastActivePopup, CharLowerBuffW, GetSystemMetrics, PostMessageW, DrawMenuBar, SetParent, IsZoomed, CharUpperBuffW, GetClientRect, IsChild, GetClassLongPtrW, SetClassLongPtrW, ClientToScreen, GetClipboardData, SetClipboardData, SetWindowPlacement, IsIconic, CallNextHookEx, GetMonitorInfoW, ShowWindow, CheckMenuItem, CharUpperW, DefWindowProcW, GetForegroundWindow, SetForegroundWindow, GetWindowTextW, EnableWindow, DestroyWindow, IsDialogMessageW, EndMenu, RegisterClassW, CharNextW, GetWindowThreadProcessId, RedrawWindow, GetDC, GetFocus, SetFocus, EndPaint, ReleaseDC, MsgWaitForMultipleObjectsEx, LoadKeyboardLayoutW, ActivateKeyboardLayout, GetParent, DrawTextW, SetScrollRange, InsertMenuItemW, PeekMessageA, GetPropW, MessageBoxW, MessageBeep, SetPropW, RemovePropW, UpdateWindow, GetSubMenu, MsgWaitForMultipleObjects, DestroyMenu, DestroyIcon, SetWindowsHookExW, EmptyClipboard, IsWindowVisible, DispatchMessageA, UnregisterClassW, GetTopWindow, SendMessageW, AdjustWindowRectEx, DrawIcon, IsWindow, EnumThreadWindows, GetMessageTime, InvalidateRect, GetKeyboardState, DrawFrameControl, ScreenToClient, GetWindowLongPtrW, SetWindowLongPtrW, SetCursor, CreateIcon, CreateMenu, LoadStringW, CharLowerW, SetWindowRgn, SetWindowPos, GetMenuItemCount, RemoveMenu, GetSysColorBrush, GetKeyboardLayoutNameW, GetWindowDC, TranslateMessage, OpenClipboard, DrawTextExW, MapWindowPoints, EnumDisplayMonitors, CallWindowProcW, CloseClipboard, DestroyCursor, GetScrollInfo, SetWindowTextW, GetMessageExtraInfo, EnableScrollBar, GetSysColor, TrackPopupMenu, DrawIconEx, PostQuitMessage, GetClassNameW, ShowScrollBar, EnableMenuItem, GetIconInfo, GetMessagePos, SetScrollInfo, GetKeyNameTextW, GetDesktopWindow, GetCursorPos, SetCursorPos, HideCaret, GetMenu, GetMenuState, SetMenu, SetRect, GetKeyState, FindWindowExW, MonitorFromPoint, SystemParametersInfoW, LoadIconW, GetCursor, GetWindow, GetWindowRect, InsertMenuW, KillTimer, WaitMessage, IsWindowEnabled, IsDialogMessageA, TranslateMDISysAccel, GetWindowPlacement, CreateIconIndirect, FindWindowW, DeleteMenu, GetKeyboardLayout
                                        version.dllGetFileVersionInfoSizeW, VerQueryValueW, GetFileVersionInfoW
                                        oleaut32.dllSysFreeString, VariantClear, VariantInit, GetErrorInfo, SysReAllocStringLen, SafeArrayCreate, GetActiveObject, SysAllocStringLen, SafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, VariantCopy, VariantChangeType
                                        advapi32.dllRegSetValueExW, RegEnumKeyExW, OpenThreadToken, RegOpenKeyExW, RegQueryInfoKeyW, OpenProcessToken, AllocateAndInitializeSid, FreeSid, EqualSid, RegDeleteValueW, RegFlushKey, RegQueryValueExW, GetTokenInformation, RegCloseKey, RegCreateKeyExW
                                        netapi32.dllNetWkstaGetInfo, NetApiBufferFree
                                        msvcrt.dllmemcpy, memset
                                        winhttp.dllWinHttpGetIEProxyConfigForCurrentUser, WinHttpSetTimeouts, WinHttpSetStatusCallback, WinHttpConnect, WinHttpReceiveResponse, WinHttpQueryAuthSchemes, WinHttpGetProxyForUrl, WinHttpReadData, WinHttpCloseHandle, WinHttpQueryHeaders, WinHttpOpenRequest, WinHttpAddRequestHeaders, WinHttpOpen, WinHttpWriteData, WinHttpSetCredentials, WinHttpQueryDataAvailable, WinHttpSetOption, WinHttpSendRequest, WinHttpQueryOption
                                        kernel32.dllRtlUnwindEx, QueryDosDeviceW, GetACP, GetExitCodeProcess, LocalFree, CloseHandle, GetCurrentProcessId, SizeofResource, VirtualProtect, TerminateThread, QueryPerformanceFrequency, IsDebuggerPresent, FindNextFileW, GetFullPathNameW, VirtualFree, ExitProcess, HeapAlloc, GetCPInfoExW, GlobalSize, RtlUnwind, GetCPInfo, EnumSystemLocalesW, GetStdHandle, GetTimeZoneInformation, FileTimeToLocalFileTime, GetModuleHandleW, FreeLibrary, HeapDestroy, FileTimeToDosDateTime, ReadFile, GetUserDefaultLCID, CreateProcessW, GetLastError, GetModuleFileNameW, SetLastError, GlobalAlloc, GlobalUnlock, FindResourceW, CreateThread, CompareStringW, CreateMutexW, LoadLibraryA, ResetEvent, MulDiv, FreeResource, GetVersion, RaiseException, MoveFileW, GlobalAddAtomW, FormatMessageW, OpenProcess, SwitchToThread, GetExitCodeThread, GetCurrentThread, LoadLibraryExW, TerminateProcess, LockResource, FileTimeToSystemTime, GetCurrentThreadId, UnhandledExceptionFilter, VirtualQuery, GlobalFindAtomW, VirtualQueryEx, GlobalFree, Sleep, EnterCriticalSection, SetFilePointer, ReleaseMutex, LoadResource, SuspendThread, GetTickCount, GetStartupInfoW, GlobalDeleteAtom, GetFileAttributesW, InitializeCriticalSection, GetThreadPriority, GetCurrentProcess, SetThreadPriority, GlobalLock, VirtualAlloc, GetTempPathW, GetSystemInfo, GetCommandLineW, LeaveCriticalSection, GetProcAddress, ResumeThread, GetLogicalDriveStringsW, GetVersionExW, VerifyVersionInfoW, HeapCreate, LCMapStringW, GetDiskFreeSpaceW, VerSetConditionMask, FindFirstFileW, GetUserDefaultUILanguage, lstrlenW, QueryPerformanceCounter, SetEndOfFile, HeapFree, WideCharToMultiByte, FindClose, MultiByteToWideChar, LoadLibraryW, SetEvent, CreateFileW, GetLocaleInfoW, EnumResourceNamesW, DeleteFileW, GetSystemDefaultLCID, GetLocalTime, WaitForSingleObject, WriteFile, ExitThread, DeleteCriticalSection, GetDateFormatW, TlsGetValue, SetErrorMode, GetComputerNameW, IsValidLocale, TlsSetValue, CreateDirectoryW, GetSystemDefaultUILanguage, EnumCalendarInfoW, LocalAlloc, RemoveDirectoryW, CreateEventW, WaitForMultipleObjectsEx, GetThreadLocale, SetThreadLocale
                                        SHFolder.dllSHGetFolderPathW
                                        ole32.dllIsAccelerator, CoCreateInstance, CoUninitialize, IsEqualGUID, CreateStreamOnHGlobal, OleInitialize, ProgIDFromCLSID, CLSIDFromProgID, OleUninitialize, CoGetClassObject, CoInitialize, CoTaskMemFree, OleDraw, CoTaskMemAlloc, OleSetMenuDescriptor, StringFromCLSID
                                        gdi32.dllPie, SetBkMode, CreateCompatibleBitmap, GetEnhMetaFileHeader, CloseEnhMetaFile, RectVisible, AngleArc, ResizePalette, SetAbortProc, SetTextColor, StretchBlt, RoundRect, RestoreDC, SetRectRgn, GetTextMetricsW, GetWindowOrgEx, CreatePalette, PolyBezierTo, CreateICW, CreateDCW, GetStockObject, CreateSolidBrush, Polygon, MoveToEx, PlayEnhMetaFile, Ellipse, StartPage, GetBitmapBits, StartDocW, GetSystemPaletteEntries, GetEnhMetaFileBits, GetEnhMetaFilePaletteEntries, CreatePenIndirect, SetMapMode, CreateFontIndirectW, PolyBezier, LPtoDP, EndDoc, GetObjectW, GetWinMetaFileBits, SetROP2, GetEnhMetaFileDescriptionW, ArcTo, CreateEnhMetaFileW, Arc, SelectPalette, ExcludeClipRect, MaskBlt, SetWindowOrgEx, EndPage, DeleteEnhMetaFile, Chord, SetDIBits, SetViewportOrgEx, CreateRectRgn, RealizePalette, SetDIBColorTable, GetDIBColorTable, CreateBrushIndirect, PatBlt, SetEnhMetaFileBits, Rectangle, SaveDC, DeleteDC, BitBlt, FrameRgn, GetDeviceCaps, GetTextExtentPoint32W, GetClipBox, IntersectClipRect, Polyline, CreateBitmap, SetWinMetaFileBits, GetStretchBltMode, CreateDIBitmap, SetStretchBltMode, GetDIBits, CreateDIBSection, LineTo, GetRgnBox, EnumFontsW, CreateHalftonePalette, SelectObject, DeleteObject, ExtFloodFill, UnrealizeObject, CopyEnhMetaFileW, SetBkColor, CreateCompatibleDC, GetBrushOrgEx, GetCurrentPositionEx, GetNearestPaletteIndex, CreateRoundRectRgn, GetTextExtentPointW, ExtTextOutW, SetBrushOrgEx, GetPixel, GdiFlush, SetPixel, EnumFontFamiliesExW, StretchDIBits, GetPaletteEntries
                                        NameOrdinalAddress
                                        TMethodImplementationIntercept30x505790
                                        __dbk_fcall_wrapper20x418ab0
                                        dbkFCallWrapperAddr10x862298
                                        Language of compilation systemCountry where language is spokenMap
                                        EnglishUnited States